HP-UX Reference Section 1: User Commands (A-M) HP-UX 11i Version 2 December 2007 Update Volume 1 of 10 Manufacturing Part Number : B2355-92066 E1207 Printed in USA © Copyright 1983-2007 Hewlett-Packard Development Company LP.
Legal Notices The information in this document is subject to change without notice. Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. U.S. Government License Confidential computer software.
Copyright 1996 Morning Star Technologies, Inc. Copyright 1996 Progressive Systems, Inc. Trademark Notices Intel and Itanium are registered trademarks of Intel Corporation in the US and other countries and are used under license. Java is a US trademark of Sun Microsystems, Inc. Microsoft and MS-DOS are U.S. registered trademarks of Microsoft Corporation. OSF/Motif is a trademark of The Open Group in the US and other countries. UNIX is a registered trademark of The Open Group.
Preface HP-UX is the Hewlett-Packard Company’s implementation of a UNIX operating system that is compatible with various industry standards. It is based on the System V Release 4 operating system and includes important features from the Fourth Berkeley Software Distribution. The ten volumes of this manual contain the system reference documentation, made up of individual entries called manpages, named for the man command (see man (1)) that displays them on the system.
Typographical Conventions audit (5) An HP-UX manpage reference. For example, audit is the name and 5 is the section in the HP-UX Reference. On the web and on the Instant Information CD or DVD, it may be a hyperlink to the manpage itself. From the HP-UX command line, you can enter “man audit” or “man 5 audit” to view the manpage. See man (1). Book Title The title of a book. On the web and on the Instant Information CD or DVD, it may be a hyperlink to the book itself.
Command Syntax Literal A word or character that you enter literally. Replaceable A word or phrase that you replace with an appropriate value. -chars One or more grouped command options, such as -ikx. The chars are usually a string of literal characters that each represent a specific option. For example, the entry -ikx is equivalent to the individual options -i, -k, and -x. The plus character (+) is sometimes used as an option prefix. -word A single command option, such as -help.
Function Synopsis and Syntax HP-UX functions are described in a definition format rather than a usage format. The definition format includes type information that is omitted when the function call is actually included in a program. The function syntax elements are the same as for commands, except for the options; see “Command Syntax” on page 7. Function General Definition The general definition form is: type func ( type param [ , type param ]...
Publishing History Revisions of the HP-UX Reference are published with each initial version release and at significant update milestones for each release. The contents are current as of the publication dates. Since manpages are often updated in software patches, you can find the latest version of a manpage on an appropriately patched system, using the man command. The list below is in reverse order of the date of publication.
B9106-90007-13 HP-UX 11i Version 1.5; June 2001 Release; seven volumes HTML; http://docs.hp.com and Instant Information. B2355-90689-97 HP-UX 11i Version 1; December 2000 Release; nine volumes PDF and HTML; http://docs.hp.com, Instant Information and print. B2355-90680-84 HP-UX 11.0; October 1997 Release; five volumes HTML; http://docs.hp.com. B2355-90166 HP-UX 11.0; October 1997 Release; five volumes PDF; http://docs.hp.com. B2355-90128-31 HP-UX 10.
Volume One Table of Contents Section 1
Volume One Table of Contents Section 1
Table of Contents Volumes One and Two Section 1: User Commands Entry Name(Section): name Description intro(1): intro ..................................................... introduction to command utilities and application programs adb(1): adb ........................................................................................................................... absolute debugger adjust(1): adjust ...........................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description chkey(1): chkey .......................................................................................... change user’s secure RPC key pair chmod(1): chmod ...................................................................................... change file mode access permissions chown(1): chown, chgrp ......................................................................................... change file owner or group chsh(1): chsh ..
Table of Contents Volumes One and Two Entry Name(Section): name Description dosmkdir(1): dosmkdir ................................................................................................. make a DOS directory dosrm(1): dosrm, dosrmdir ............................................................................. remove DOS files or directories dosrmdir: remove DOS directories ................................................................................................. see dosrm(1) du(1): du .....
Table of Contents Volumes One and Two Entry Name(Section): name Description ftpwho(1): ftpwho ............................................................. show current process information for each ftp user gcore(1): gcore ....................................................................................... get core images of running processes gencat(1): gencat ............................................................................ generate a formatted message catalog file genxlt(1): genxlt .........
Table of Contents Volumes One and Two Entry Name(Section): name Description kpasswd(1): kpasswd ................................................................................. change a user’s Kerberos password ksh(1): ksh, rksh ............................................ shell, the standard/restricted command programming language ktutil(1): ktutil ............................................................................... Kerberos keytab file maintenance utility kvno(1): kvno ........................
Table of Contents Volumes One and Two Entry Name(Section): name Description mailstats(1): mailstats ......................................................................................... print mail traffic statistics mailx(1): mailx ............................................................................ interactive mail message processing system make(1): make ............................................................... maintain, update, and regenerate groups of programs makekey(1): makekey ......
Table of Contents Volumes One and Two Entry Name(Section): name Description nslookup(1): nslookup ................................................................................. query name servers interactively nsquery(1): nsquery ........................................................... query the Name Service Switch backend libraries nsupdate(1): nsupdate ....................................................................................... Dynamic DNS update utility od(1): od, xd ....................
Table of Contents Volumes One and Two Entry Name(Section): name Description red: restricted line-oriented text editor ............................................................................................... see ed(1) rehash: recompute internal hash table ................................................................................................ see csh(1) remsh(1): remsh ....................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description strip(1): strip .................................................... strip symbol and line number information from an object file stty(1): stty ................................................................................................ set the options for a terminal port su(1): su ..........................................................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description uncompress: expand compressed data ...................................................................................... see compress(1) uncompressdir: expand compressed files in a directory ........................................................... see compress(1) unexpand: convert spaces to tabs ............................................................................................... see expand(1) unget(1): unget .........
Table of Contents Volumes One and Two Entry Name(Section): name Description ypmatch(1): ypmatch ................................... print values of selected keys in Network Information Service map yppasswd(1): yppasswd .................................... change login password in Network Information System (NIS) ypwhich(1): ypwhich ................................................. list Network Information System server or map master zcat: expand and cat data .................................................
Notes 24 Hewlett-Packard Company HP-UX 11i Version 2: December 2007 Update
Section 1 Part 1 User Commands A-M
Section 1 Part 1 User Commands A-M
intro(1) intro(1) NAME intro - introduction to command utilities and application programs DESCRIPTION This section describes commands accessible by users, as opposed to system calls in Section (2) or library routines in Section (3), which are accessible by user programs.
intro(1) intro(1) NETWORKING FEATURES Information under this heading is applicable only if you are using the networking feature described there (such as NFS). RETURN VALUE DIAGNOSTICS Discusses various values returned upon completion of program calls. ERRORS EXAMPLES WARNINGS DEPENDENCIES Lists error conditions and their corresponding error message or return value. Discusses diagnostics indications that may be produced. Self-explanatory messages are not listed.
adb(1) adb(1) NAME adb - absolute debugger SYNOPSIS adb [-h] adb adb adb adb adb a [-n -o] [-w ] [-I path] kernelfile memfile [-n -o] [-w ] [-I path] kernelfile crashdir [-n -o] [-w ] [-I path] crashdir [-n -o] [-w ] [-I path] [objfile] [corefile] [-n -o] [-w ] [-I path] -P pid [execfile] DESCRIPTION The adb command executes a general-purpose debugging program that is sensitive to the underlying architecture of the processor and operating system on which it is run It can be used to examine files
adb(1) adb(1) -I path path specifies a list of directories where files read with < or << (see below) are sought. This list has the same syntax as, and similar semantics to, the PATH shell variable; the default is .:/usr/lib/adb. -n Specify the normal mode. This is the default on Itanium systems. This option is mutually exclusive with the -o option. The last one specified takes effect. -o Specify backward compatibility mode. This is the default on PA-RISC systems.
adb(1) adb(1) In backward compatibility mode, a variable is a single numeral or alphabet except for registers and the prefix letter is >. Here is a list of variables supported in both modes. 9 b d t e s m The count on the last $< command. a The base address of the data segment. The data segment size. The text segment size. The entry point. The stack segment size. The ‘‘magic’’ number as defined in On entry, b, d, and t are set from the headers in the current memory file.
adb(1) adb(1) Traditional Form Commands The following categories of commands are specified in the traditional command form: • • • • • a File commands Keyword commands Process commands Thread commands Shell commands In backward compatibility mode: • Variable commands File commands These commands operate on the current object file or the current memory file and are used to read, write, etc.
adb(1) adb(1) W It has same behavior as modifier / with an implicit size of 4. It sets dotincr to 4. dot is set as for w. m *m It has same behavior as modifier > with an implicit index of 0. It has same behavior as modifier > with an implicit index of 1. a For these modifiers, no explicit size or index can be mentioned. These modifiers are deprecated. Keyword Commands Run the Keyword Command Form using the traditional command form by prefixing the command with $.
adb(1) adb(1) d [ num | * ] Deletes all breakpoints at address in the current subprocess, if it is specified. If * is specified, it deletes all the current subprocess breakpoints. If num is specified, breakpoint with number num is deleted. en [ num | * ] Enables all breakpoints at address in the current subprocess, if it is specified. If * is specified, it enables all the current subprocess breakpoints. If num is specified, breakpoint with number num is enabled.
adb(1) adb(1) Variable Commands This is supported in backward compatibility mode only. It consists of a > followed by a variable, var and an optional value. This action assigns value to the variable or register named by var. If not specified, value is assumed to be the value of dot . This behavior is deprecated. a Keyword Form Commands All commands in this form consist of a keyword followed by a variable number of arguments. In backward compatibility mode, a $ must precede these keyword form commands.
adb(1) adb(1) d [ radix ] Set the default radix to radix. In backward compatibility mode, this command has a non-standard deprecated behavior. If radix is not mentioned, address is taken as radix. a x q v m The default radix for all integers input is set to hexadecimal. z zt Print a list of signals and how they are handled for the current subprocess. k Print all DLKM modules or shared libraries. Quit adb . Print the value of all variables. Print the address map.
adb(1) adb(1) 1. Conversion Specifier Each conversion specifier consists of an optional count or pspec followed by an optional size specifier character, followed by a conversion specifier character. count This is available only for the traditional style format string. The count specifies the number of times this conversion specifier is to be repeated. If not specified, count is assumed to be 1. pspec This is available only for the printf -style format string.
adb(1) adb(1) Size Specifier Character Same as size specifier character of conversion specifier. Dot operator character This can be one of these a Increment dotincr by count times size. v z Decrement dotincr by count times size. For example: =5bv, =5bv5bz Backward Compatibility Mode In backward compatibility mode, the traditional style can be a conversion specifier, dot operator, spacing specifier, or a literal string. 1.
adb(1) adb(1) a 0 p n The value of dot is printed in symbolic form. The object is printed in symbolic form. The value of n is machine-dependent. For example: main=ba, ’a’=c, main?10box 2. Dot Operator a A dot operator consists of an optional count followed by a dot operator character. count Same as that of count of conversion specifier.
adb(1) adb(1) macropath List of directories to be searched for adb macros. Initial value is .:/usr/lib/adb. pager Pager command used by adb. Initial value is more -c. backcompat Set to 1 if adb is in backward compatibility mode. Initial value depends on the host processor. a Note adb64 is a symbolic link to adb . This symbolic link is maintained for backward compatibility with some old scripts which may be using adb64 .
adjust(1) adjust(1) NAME adjust - simple text formatter SYNOPSIS adjust [-b] [-c|-j|-r ] [-m column ] [-t tabsize ] [ files ... ] DESCRIPTION The adjust command is a simple text formatter for filling, centering, left and right justifying, or only right justifying text paragraphs, and is designed for interactive use. It reads the concatenation of input files (or standard input if none are given) and produces on standard output a formatted version of its input, with each paragraph formatted separately.
adjust(1) adjust(1) adjust also has a rudimentary understanding of tagged paragraphs (such as this one) when * filling. If the second line of a paragraph is indented more than the first, and the first line has a word beginning at the same indentation as the second line, the input column position of the tag word or words (prior to the one matching the second line indentation) is preserved. Tag words are passed through without change of column position, even if they extend beyond the right margin.
adjust(1) adjust(1) WARNINGS This program is designed to be simple and fast. It does not recognize backslash to escape white space or other characters. It does not recognize tagged paragraphs where the tag is on a line by itself. It knows that lines end in newline or null, and how to deal with tabs and backspaces, but it does not do anything special with other characters such as form feed (they are simply ignored). For complex operations, standard text processors are likely to be more appropriate.
admin(1) admin(1) NAME admin - create and administer SCCS files SYNOPSIS admin -i[name] [-n] [-b] [-a login] ... [-d flag[flag-val] ] ... [-f flag[flag-val] ] ... [-m mrlist] ... [-r rel] [-t[name] ] [-y [comment ] ] file ... admin -n [-a login] ... [-d flag[flag-val] ] ... [-f flag[flag-val] ] ... [-m mrlist] ... [-t[name] ] [-y [comment ] ] file ... admin [-a login] ... [-e login] ... [-d flag[flag-val] ] ... [-m mrlist] ... [-r rel] [-t[name] ] file ... admin -h file ... admin -z file ...
admin(1) -f flag admin(1) This option specifies a flag, and possibly a value for the flag, to be placed in the SCCS file. Several -f options can be supplied on a single admin command line. The allowable flags and their values are: b Allows use of the -b option on a get command (see get(1)) to create branch deltas. cceil The highest release (i.e., "ceiling"), a number less than or equal to 9999, which can be retrieved by a get command for editing. The default value for an unspecified c flag is 9999.
admin(1) a -d flag admin(1) v[pgm] Causes delta to prompt for Modification Request (MR) numbers as the reason for creating a delta. The optional value specifies the name of a (MR) number validity checking program (see delta(1)). (If this flag is set when creating an SCCS file, the m option must also be used even if its value is null). x Causes get to create files with execute permissions. Causes removal (deletion) of the specified flag from an SCCS file.
admin(1) admin(1) If LC_CTYPE or LC_MESSAGES is not specified in the environment or is set to the empty string, the value of LANG is used as a default for each unspecified or empty variable. If LANG is not specified or is set to the empty string, a default of C (see lang(5)) is used instead of LANG . If any internationalization variable contains an invalid setting, admin behaves as if all internationalization variables are set to C. See environ(5).
answer(1) answer(1) NAME answer - phone message transcription system SYNOPSIS a answer [-pu] DESCRIPTION The answer interactive program helps you to transcribe telephone (and other) messages into electronic mail. The program uses your personal elm alias database and the system elm alias database, allowing you to use aliases to address the messages. Options answer supports the following options: -p Prompt for phone-slip-type message fields. -u Allow addresses that are not aliases.
answer(1) answer(1) > And here is the message. > ----------------------------------------------------------------- a Message to: albert einstein Sorry, could not find ’albert einstein’ [a_einstein] in list! Message to: john jones address ’mrjones@companybee.com (John P. Jones)’ Enter message for john jones ending with a blank line.
answer(1) $HOME/.elm/aliases.pag $HOME/.elm/aliases.text /var/mail/.elm/aliases /var/mail/.elm/aliases.dir /var/mail/.elm/aliases.pag /var/mail/.elm/aliases.text /tmp/snd. pid a answer(1) User alias database hash table User alias source text System alias database data table System alias database directory table System alias database hash table System alias source text Outbound mail message edit buffer AUTHOR answer was developed by HP. SEE ALSO elm(1), newalias(1).
ar(1) ar(1) NAME ar - create and maintain portable archives and libraries SYNOPSIS ar [-]key [-][modifier ...] [posname] afile [name ...] DESCRIPTION The ar command maintains groups of files combined into a single archive file. Its main use is to create and update library files as used by the link editor (see ld(1)). It can be used, however, for any similar purpose. The magic string and file headers used by ar consist of printable ASCII characters.
ar(1) ar(1) The following list describes the optional modifier characters: a b c a Position the files after the existing positioning file specified by posname . Place the new files before the existing positioning file specified by posname . Suppress the message normally produced when afile is created. For r and q operations, ar normally creates afile if it does not already exist. f Truncate the named file names to 14 bytes before performing operations on an archive.
ar(1) ar(1) p: x: v, f, F, s v, f, F, s, C, T EXTERNAL INFLUENCES Environment Variables The following internationalization variables affect the execution of ar : a LANG Determines the locale category for native language, local customs and coded character set in the absence of LC_ALL and other LC_* environment variables. If LANG is not specified or is set to the empty string, a default of C (see lang(5)) is used instead of LANG .
ar(1) ar(1) f1 f3 f2 f4 Note that the relative order of f2 and f3 has not changed. The second command says "move f3 after f2 in newlib.a", creating the order: f1 f2 f3 f4 a The third command then replaces files f2 and f3 . Since files f2 and f3 both already existed in the archive, this sequence of commands could not be simply replaced by: ar ra f1 newlib.
as(1) as(1) NAME as - assembler SYNOPSIS Remarks For Itanium-based systems, see as_ia(1). a For PA-RISC systems, see as_pa(1). Use the uname command to determine your system type. uname -m returns ia64 on Itanium-based systems. All other values represent PA-RISC systems. SEE ALSO as_ia(1), as_pa(1), uname(1).
as_ia(1) as_ia(1) Integrity Systems Only NAME as_ia: as - assembler for Integrity systems a SYNOPSIS as [-eVw ] [+A32 ] [+A64 ] [+E32 ] [-elf32 ] [-elf64 ] -W num[,num]... -We num[,num]... [file] -H lvl[=what[,what]...] [-o outfile] Remarks This manpage describes as on Integrity systems. For as on PA-RISC systems, see as_pa(1). DESCRIPTION as assembles the named source file file, or the standard input if file is not specified.
as_ia(1) Integrity Systems Only as_ia(1) International Code Set Support Single- and multi-byte character code sets are supported. WARNINGS The assembler does not check dependencies. DIAGNOSTICS When syntactic or semantic errors occur, a single-line diagnostic is displayed on standard error, together with the line number and the file name in which it occurred. FILES /usr/lib/nls/C/as.cat a.out assembler error message catalog default assembler output file SEE ALSO cc(1), ld(1), elf(3E).
as_pa(1) as_pa(1) PA-RISC Systems Only NAME as_pa: as - assembler for PA-RISC systems a SYNOPSIS as [-eflsuV ] [-o objfile] [-p number] [-v xrfile] [-w[number] ]... [file]... [+DA architecture] [+z ] [+Z ] Remarks This manpage describes as on PA-RISC systems. For as on Integrity systems, see as_ia(1). DESCRIPTION The as command assembles source text from files or standard input and produces a relocatable object file suitable for the link editor, ld (see ld(1)).
as_pa(1) as_pa(1) PA-RISC Systems Only The assembler uses the following precedence to determine the target architecture. 1. Use the .LEVEL directive within the assembly source file. 2. Use the +DA command-line specification. 3. Use the default architecture of PA_RISC_1.0 . +z,+Z Both of these options are used in the building of shared libraries. For a more complete discussion regarding these options, see the manual HP-UX Linker and Libraries User’s Guide.
asa(1) asa(1) NAME asa - interpret ASA carriage control characters a SYNOPSIS asa [files] DESCRIPTION asa interprets the output of FORTRAN programs that utilize ASA carriage control characters. It processes either the files whose names are given as arguments, or the standard input if - is specified or if no file names are given. The first character of each line is assumed to be a control character.
at(1) at(1) NAME at, batch - execute batched commands immediately or at a later time SYNOPSIS Enter commands from standard input to run at a specified time: at [-m] [ -q queue] -t spectime commands eof a at [-m] [-q queue] time [date] [next timeunit +count timeunit] commands eof Enter commands from a file to run at a specified time: at -f job-file [-m] [-q queue] -t spectime at -f job-file [-m] [-q queue] time [date] [next timeunit +count timeunit] List scheduled jobs: at -d job-id ...
at(1) at(1) privileges is able to display information about all jobs. -f job-file -l [job-id ...] -m a Read in the commands contained in job-file instead of using standard input. List the jobs specified. If no job-ids are given, all jobs are listed. Send mail to the invoking user after the job has run, announcing its completion. Unless redirected elsewhere within the job, standard output and standard error produced by the job are automatically mailed to the user as well.
at(1) at(1) comma (,). If defined in langinfo(5), special date unit characters can be present. A field having a value greater than 31 is treated as the year field and the remaining two fields in the date string are treated as month and day fields. Otherwise, if a given date is ambiguous (such as 2/5 or 2/5/10 ), the D_T_FMT string (if defined in langinfo(5)) is used to resolve the ambiguity. Two special days, today and tomorrow , are also recognized.
at(1) at(1) of BATCH_MAXTRYS can be any positive number or the string INFINITE (the default value). If the value is set to INFINITE , batch requests a unique job-id until it successfully receives one. The at command can schedule only one job per queue for a given time. If a job is already scheduled for a given time, the at command schedules the new job for the next second. You can remove this limitation by setting the MULTI_JOB_SUPPORT variable to 1 in the /etc/default/cron file.
at(1) at(1) at -f $HOME/future -t201312271220.00 Redirect standard error to a pipe (useful in a shell procedure). Note that the sequence of the output redirection specifications is significant. Standard error is redirected to where standard output is going; standard output is redirected to a file; the original "standard output" (which now consists of the former standard error) is piped to the mail program.
at(1) at(1) AUTHOR at was developed by AT&T and HP. FILES /etc/default/cron /usr/bin/sh /usr/lib/cron/at.allow /usr/lib/cron/at.deny /var/adm/cron /var/adm/cron/.proto a /var/adm/cron/queuedefs /var/spool/cron/atjobs Configuration file POSIX shell List of allowed users List of denied users Main cron directory This file contains a set of shell commands which are added to the at job file to make the environment for the at job same as the current environment. See proto(4).
attributes(1) attributes(1) NAME attributes - describe an audio file SYNOPSIS /opt/audio/bin/attributes filename DESCRIPTION This command provides information about an audio file, including file format, data format, sampling rate, number of channels, data length and header length. EXAMPLE The following is an example of using attributes on an audio file supplied with HP-UX. $ /opt/audio/bin/attributes /opt/audio/sounds/welcome.au File Name: /opt/audio/sounds/welcome.
awk(1) awk(1) NAME awk - pattern-directed scanning and processing language a SYNOPSIS awk [-Ffs] [-v var =value] [program {-f progfile}...] [file]... DESCRIPTION awk scans each input file for lines that match any of a set of patterns specified literally in program or in one or more files specified as -f progfile. With each pattern there can be an associated action that is to be performed when a line in a file matches the pattern.
awk(1) awk(1) The print statement prints its arguments on the standard output (or on a file if >file or >> file is present or on a pipe if |cmd is present), separated by the current output field separator, and terminated by the output record separator. file and cmd can be literal names or parenthesized expressions. Identical string values in different statements denote the same open file. The printf statement formats its expression list according to the format (see printf(3)).
awk(1) awk(1) A pattern can consist of two patterns separated by a comma; in this case, the action is performed for all lines from an occurrence of the first pattern though an occurrence of the second. A relational expression is one of the following: expression matchop regular-expression expression relop expression expression in array-name (expr,expr,... ) in array-name a where a relop is any of the six relational operators in C, and a matchop is either ˜ (matches) or !˜ (does not match).
awk(1) awk(1) The arguments in ARGV can be modified or added to; ARGC can be altered. As each input file ends, awk will treat the next non-null element of ARGV , up to the current value of ARGC -1, inclusive, as the name of the next input file. Thus, setting an element of ARGV to null means that it will not be treated as an input file. The name - indicates the standard input.
awk(1) awk(1) NLSPATH PATH Determines the location of message catalogues for the processing of LC_MESSAGES . Determines the search path when looking for commands executed by system(cmd) , or input and output pipes. In addition, all environment variables will be visible via the awk variable ENVIRON .
banner(1) banner(1) NAME banner - make posters in large letters SYNOPSIS banner strings DESCRIPTION banner prints its arguments (each up to 10 characters long) in large letters on the standard output. b Each argument is printed on a separate line. Note that multiple-word arguments must be enclosed in quotes in order to be printed on the same line.
basename(1) basename(1) NAME basename, dirname - extract portions of path names SYNOPSIS basename string [ suffix ] dirname [ string ] b DESCRIPTION basename deletes any prefix ending in / and the suffix (if present in string) from string, and prints the result on the standard output. If string consists entirely of slash characters, string is set to a single slash character. If there are any trailing slash characters in string, they are removed.
bc(1) bc(1) NAME bc - arbitrary-precision arithmetic language SYNOPSIS bc [-c] [-l] [file...] DESCRIPTION bc is an interactive processor for a language that resembles C but provides unlimited-precision arithmetic. It takes input from any files given, then reads the standard input. Options bc recognizes the following command-line options: -c Compile only. bc is actually a preprocessor for dc which bc invokes automatically (see dc(1)).
bc(1) bc(1) Statements E { S ; ... ; S } if ( R ) S while ( R ) S for ( E ; R ; E ) S null statement break quit b Function Definitions define L ( L ,..., L ) { auto L, ... , L S; ... S return ( E ) } Functions in − l Math Library Functions in the -l math library include: s(x) c(x) e(x) l(x) a(x) j(n,x) sine cosine exponential log arctangent Bessel function All function arguments are passed by value. Trigonometric angles are in radians where 2 pi radians = 360 degrees.
bc(1) bc(1) WARNINGS There are currently no && (AND) or || (OR) comparisons. The for statement must have all three expressions. quit is interpreted when read, not when executed. bc’s parser is not robust in the face of input errors. Some simple expression such as 2+2 helps get it back into phase. The assignment operators: =+ =- =* =/ =% and =ˆ are obsolete. Any occurences of these operators cause a syntax error with the exception of =- which is interpreted as = followed by a unary minus.
bdiff(1) bdiff(1) NAME bdiff - diff for large files SYNOPSIS bdiff file1 file2 [ n ] [-s] b DESCRIPTION bdiff compares two files and produces output identical to what would be produced by diff (see diff(1)), specifying changes that must be made to make the files identical. bdiff is designed for handling files that are too large for diff , but it can be used on files of any length. bdiff processes files as follows: • Ignore lines common to the beginning of both files.
bdiff(1) bdiff(1) FILES /tmp/bd?????? SEE ALSO diff(1).
bs(1) bs(1) NAME bs - a compiler/interpreter for modest-sized programs SYNOPSIS bs [file [args] ] b DESCRIPTION bs is a remote descendant of BASIC and SNOBOL4, with some C language added. bs is designed for programming tasks where program development time is as important as the resulting speed of execution. Formalities of data declaration and file/process manipulation are minimized. Line-at-a-time debugging, the trace and dump statements, and useful run-time error messages all simplify program testing.
bs(1) bs(1) does not cause stored statements to execute (see run below). for name = expression expression statement for name = expression expression ... next for expression , expression , expression statement for expression , expression , expression b ... next The for statement repetitively executes a statement (first form) or a group of statements (second form) under control of a named variable.
bs(1) bs(1) stop Execution of internal statements is stopped. bs reverts to immediate mode. trace [expression] The trace statement controls function tracing. If the expression is null (or evaluates to zero), tracing is turned off. Otherwise, a record of user-function calls/returns is printed. Each return decrements the trace expression value. while expression statement while expression b ... next while is similar to for except that only the conditional expression for loop-continuation is given.
bs(1) bs(1) ++ name -- name !expression Increments the value of the variable (or array reference). The result is the new value. expression operator expression Common functions of two arguments are abbreviated by the two arguments separated by an operator denoting the function. Except for the assignment, concatenation, and relational operators, both operands are converted to numeric form before the function is applied. Decrements the value of the variable. The result is the new value.
bs(1) bs(1) format( f , a ) returns the formatted value of a. f is assumed to be a format specification in the style of printf(3S). Only the %...f , %...e , and %...s types are safe. Since it is not always possible to know whether a is a number or a string when the format call is coded, coercing a to the type required by f by either adding zero (for e or f format) or concatenating (_) the null string (for s format) should be considered.
bs(1) bs(1) item( name , i ) key() The item function accesses table elements sequentially (in normal use, there is no orderly progression of key values). Where the item function accesses values, the key function accesses the ‘‘subscript’’ of the previous item call. It fails (or in the absence of an interrogate operator, returns null) if there was no valid subscript for the previous item call. The name argument should not be quoted.
bs(1) bs(1) plot(10, string ) plot(11, x1, y1, x2, y2 ) sets the line mode to string. plot(12, x1, y1, x2, y2 ) causes subsequent x (y) coordinates to be multiplied by x1 (y1) and then added to x2 (y2) before they are plotted. The initial scaling is plot(12, 1.0, 1.0, 0.0, 0.0) . makes (x1,y1) the lower left corner of the plotting area and (x2,y2) the upper right corner of the plotting area. b Some requests do not apply to all plotters.
bs(1) bs(1) exit # last input line: run Input/Output examples: # Copy file oldfile to file newfile. open("read", "oldfile", "r") open("write", "newfile", "w") ... while ?(write = read) ... # close "read" and "write": close("read") close("write") # Pipe between commands. open("ls", "!ls *", "r") open("pr", "!pr -2 -h ’List’", "w") while ?(pr = ls) ... ... # be sure to close (wait for) these: close("ls") close("pr") b WARNINGS The graphics mode (plot ...
cal(1) cal(1) NAME cal - print calendar SYNOPSIS cal [ [ month ] year ] c DESCRIPTION cal prints a calendar for the specified year. If a month is also specified, a calendar just for that month is printed. If neither is specified, a calendar for the present month is printed. year can be between 1 and 9999. month is a decimal number between 1 and 12. The calendar produced is a Gregorian calendar.
calendar(1) calendar(1) NAME calendar - reminder service SYNOPSIS calendar [-] DESCRIPTION calendar consults the file calendar in the current directory and prints out lines containing today’s or tomorrow’s date anywhere in the line. On weekends, ‘‘tomorrow’’ extends through Monday. When a - command-line argument is present, calendar searches for the file calendar in each user’s home directory, and sends any positive results to the user by mail (see mail(1)).
calendar(1) calendar(1) Jim’s birthday is on the 3. February 30/3/87 - quarter end review 26-4 Management council meeting at 1:00 pm It is first of the month ( 1/* ); status report due. c WARNINGS To get reminder service, either your calendar must be public information or you must run calendar from your personal crontab file, independent of any calendar - run systemwide. Note that if you run calendar yourself, the calendar file need not reside in your home directory.
caliper(1) caliper(1) For Integrity Systems Only Caliper 4.3 Caliper 4.3 (Requires Optional HP Caliper Software) NAME caliper - measure, report, and analyze program performance data SYNOPSIS caliper caliper caliper caliper caliper caliper caliper caliper caliper measurement [collect_options] [report_options] program [program_args ] measurement [collect_options] [report_options] pid [pid]... measurement [collect_options] [report_options] -w {report |merge |diff } [report_options] [database]...
caliper(1) For Integrity Systems Only Caliper 4.3 caliper(1) Caliper 4.
caliper(1) For Integrity Systems Only caliper(1) Caliper 4.3 Caliper 4.3 (Requires Optional HP Caliper Software) performance picture on a system, before "drilling down" using caliper in per-process mode. caliper can measure programs which are built 32-bit or 64-bit, shared bound or minshared bound, optimized or debug. Applications can be written in C, C++, Fortran 9x, assembly (if standard runtime conventions are followed) or a mixture of these languages.
caliper(1) For Integrity Systems Only Caliper 4.3 caliper(1) Caliper 4.3 (Requires Optional HP Caliper Software) You can also write your own rules customized to your application. This is an iterative process where you first make one or more caliper performance runs saving the results in databases, run caliper advise on those databases, review the suggestions, make changes to your program and/or how it is built, and repeat. Note that because every program is unique, not all of the suggestions will apply.
caliper(1) caliper(1) For Integrity Systems Only Caliper 4.3 Caliper 4.3 (Requires Optional HP Caliper Software) Options There are a number of command line options available which alter caliper ’s operation. Option names and literal arguments can be abbreviated to their shortest, non-ambiguous spelling. Although the command line synopsis above shows caliper options following measurement, in reality they can precede and/or follow it.
caliper(1) For Integrity Systems Only Caliper 4.3 caliper(1) Caliper 4.3 (Requires Optional HP Caliper Software) unwind while collecting call stack samples. The default depth is 32. --metrics= EVENT_SET[:all |:user |:kernel ][,EVENT_SET]... --metrics= CPU_EVENT[:EVENT_PARAM]...[ ,CPU_EVENT]... (Can also be specified with the -m option.) Specifies the event set or CPU events to measure. If no event is specified (or --metrics= is specified), then no metrics will be reported.
caliper(1) caliper(1) For Integrity Systems Only Caliper 4.3 Caliper 4.3 (Requires Optional HP Caliper Software) (Can also be specified with the -s option). Controls the sampling rate and the event that triggers samples. The first form (--sampling-spec=TIME_PERIOD) is used only for the cpu and cstack measurements. The second form is used for all other sample-based measurements (fprog , dcache , icache , etc.).
caliper(1) For Integrity Systems Only Caliper 4.3 caliper(1) Caliper 4.3 (Requires Optional HP Caliper Software) Reporting of call paths stops when, for the given sort metric, a call path is encountered whose associated metric percentage is below PERC_CUTOFF (default 1.0) or when the CUM_PERCENT_CUTOFF has been met or exceeded (default 100.0). The MIN_COUNT argument sets the minimum number of call paths to be displayed (default: 5) regardless of the settings for PERC_CUTOFF and CUM_PERC_CUTOFF.
caliper(1) caliper(1) For Integrity Systems Only Caliper 4.3 Caliper 4.3 (Requires Optional HP Caliper Software) ENTRIES_PER_PAGE specifies the number of entries on each web page (default: 20). The --html option is supported for the following reports: alat , branch , cgprof , cycles , dcache , dtlb , fprof , icache , itlb , scgprof , and traps . --info Causes HP Caliper to append help information to the end of textual reports.
caliper(1) For Integrity Systems Only Caliper 4.3 caliper(1) Caliper 4.3 (Requires Optional HP Caliper Software) Settings in an initialization file take precedence over measurement configuration file settings. Command-line options take precedence over settings in an initialization file. --report-details={all |none |statement |instruction |statement:instruction} (Can also be specified with the -r option). For PMU histogram reports only. Specifies level of program detail reported (default: statement ).
caliper(1) caliper(1) For Integrity Systems Only Caliper 4.3 Caliper 4.
caliper(1) For Integrity Systems Only Caliper 4.3 caliper(1) Caliper 4.3 (Requires Optional HP Caliper Software) --jre Specify the location of the Java Runtime Environment (JRE) that will run the GUI. If --jre is not specified, caliper will first check if the environment variable JAVA_HOME is set to a JRE; if not, caliper will attempt to find a JRE via the PATH environment variable.
caliper(1) caliper(1) For Integrity Systems Only Caliper 4.3 Caliper 4.3 (Requires Optional HP Caliper Software) Specifying Settings with an Initialization File You can save settings in a file, named .caliperinit , that HP Caliper automatically uses at start-up. Putting the options in an initialization file simplifies the command line you use to launch HP Caliper. For example, you can specify global settings for all of your reports, such as system libraries to exclude and output file locations.
caliper(1) For Integrity Systems Only caliper(1) Caliper 4.3 Caliper 4.3 (Requires Optional HP Caliper Software) Process Selection When dealing with multi-process applications, it is important to be able to select processes to be measured in a process tree. This section explains how to do this selection by using the --process option. Caliper has a choice between three behaviors when considering what to do with a process: c measure The process is measured.
caliper(1) caliper(1) For Integrity Systems Only Caliper 4.3 Caliper 4.3 (Requires Optional HP Caliper Software) For keyword families measure |track |ignore , glob|regexp and file |arg0 |arg1 , only the last keyword used in each family is considered. For the keyword family root |fork |exec , multiple keywords will be considered as specifying a logical OR operation between the keywords.
caliper(1) For Integrity Systems Only Caliper 4.3 caliper(1) Caliper 4.3 (Requires Optional HP Caliper Software) By default, traps are always sorted on the first trap specified with --traps-reported (or ITLB if --traps-reported is not used). Specifying --sort-by=samples sorts based on values in the "Trap Samples" column. Cutoff settings are based on the same metric as the sort, by default. Use --summary-cutoff or --detail-cutoff to override the default behavior.
caliper(1) caliper(1) For Integrity Systems Only Caliper 4.3 Caliper 4.3 (Requires Optional HP Caliper Software) The default is TRUE (exclude). Note that this option is not available on Linux and the behavior there is equivalent to a setting of FALSE (include Caliper). --exclude-idle=TRUE|FALSE The option is only valid when -w (--scope=system ) is specified. exclude/include the idle task as part of the measurement. This option is used to The default is TRUE (exclude).
caliper(1) For Integrity Systems Only Caliper 4.3 caliper(1) Caliper 4.3 (Requires Optional HP Caliper Software) --system-usage={all |runstatus |syscalls |runstatus:syscalls} Controls the collection and reporting of system usage data. Two types of system usage data can be collected: runstatus (how much time each process spent running, eligible to run but not running, and waiting), syscalls (the count and time spent in every syscall called by a process), or all (the default).
caliper(1) caliper(1) For Integrity Systems Only Caliper 4.3 Caliper 4.3 (Requires Optional HP Caliper Software) l1icache l2cache Provides miss and prefetch usage information for the L1 instruction cache. l2dcache Provides miss rate information for the L2 data cache. Only available on dual-core processors. l2icache Provides miss rate information for the L2 instruction cache. Only available on dualcore processors. l3cache overview Provides miss rate information for the L3 unified cache.
caliper(1) For Integrity Systems Only caliper(1) Caliper 4.3 Caliper 4.3 (Requires Optional HP Caliper Software) If you do not specify the --user-regions=rum-sum option, CALIPER_PMU_ENABLE() and CALIPER_PMU_DISABLE() do not have any effect and the instructions behave as no-ops. Metrics for Sorts/Cutoffs Specific to HP-UX Here is additional information on "Metrics for Sorts/Cutoffs" specific to HP-UX.
caliper(1) caliper(1) For Integrity Systems Only Caliper 4.3 Caliper 4.3 (Requires Optional HP Caliper Software) caliper pmu_trace --sampling-spec=10000,0,CPU_CYCLES program This will run program, measuring and reporting the number of Itanium instructions executed (IA64_INST_RETIRED), the number of nops executed (NOPS_RETIRED) and the number of CPU cycles (CPU_CYCLES) every 10,000 cpu cycles (with no sampling variation. The pmu_trace measurement default is to sample every 50,000,000 cpu cycles.
caliper(1) caliper(1) For Integrity Systems Only Caliper 4.3 Caliper 4.3 (Requires Optional HP Caliper Software) AUTHOR HP Caliper was developed by the Hewlett-Packard Company. FILES caliper_root caliper_root /LICENSE Anchor location of caliper installation, default /opt/caliper (HPUX) or /opt/hp-caliper (Linux). The caliper license terms. caliper_root /THIRDPARTYLICENSEREADME.txt Contains the license terms for third-party software used by caliper . c caliper_root /bin/caliper caliper executable.
cat(1) cat(1) NAME cat - concatenate, copy, and print files SYNOPSIS cat [-benrstuv ] file ... DESCRIPTION cat reads each file in sequence and writes it on the standard output. Thus: cat file c prints file on the default standard output device; cat file1 file2 > file3 concatenates file1 and file2, and places the result in file3. If - is appears as a file argument, cat uses standard input. To combine standard input and other files, use a combination of - and file arguments.
cat(1) cat(1) International Code Set Support Single- and multi-byte character code sets are supported. RETURN VALUE Exit values are: 0 >0 c Successful completion. Error condition occurred.
cc_bundled(1) cc_bundled(1) (Bundled C Compiler - Limited Functionality) NAME cc_bundled: cc - bundled C compiler SYNOPSIS cc [options] files DESCRIPTION cc invokes the HP-UX bundled C compiler. C source code is compiled directly to object code. The command uses the ctcom (Itanium(R)-based systems) or ccom (PA-RISC, Precision Architecture) compiler for preprocessing, syntax and type checking, as well as for code generation. cc accepts several types of arguments as files: .
cc_bundled(1) cc_bundled(1) (Bundled C Compiler - Limited Functionality) -c -Dname=def -Dname -E -Idir c Suppress the link edit phase of the compilation, and force an object (.o ) file to be produced for each .c or .i file even if only one program is compiled. Object files produced from C programs must be linked before being executed. Define name to the preprocessor pass, as if by ’#define’. Preprocess named C files and send the result to standard output.
cc_bundled(1) cc_bundled(1) (Bundled C Compiler - Limited Functionality) Itanium-based Systems Only Options -.suffix Instead of using standard output for the -E option, place the output from each .c file into a file with the corresponding .suffix. -z Do not bind anything to address zero. This ld(1) option allows run-time detection of null pointers. See the note on pointers below.
cc_bundled(1) cc_bundled(1) (Bundled C Compiler - Limited Functionality) Pointers Accessing the object of a NULL (zero) pointer is technically illegal, but many systems have permitted it in the past. The following is provided to maximize portability of code. If the hardware is able to return zero for reads of location zero (when accessing at least 8- and 16-bit quantities), it must do so unless the -z flag is present.
cc_bundled(1) cc_bundled(1) (Bundled C Compiler - Limited Functionality) /usr/ccs/lbin/cpp preprocessor, to assemble .s files /usr/lib/nls/msg/$LANG/aCC.cat C compiler message catalog (Itanium-based systems) /usr/lib/nls/msg/$LANG/cc.cat C compiler message catalog (PA-RISC systems) /usr/ccs/bin/as assembler, as(1) /usr/ccs/bin/ld link editor, ld(1) /usr/ccs/lib/crt0.o Runtime startup (PA-RISC systems) /usr/include Standard directory for #include files c Other Libraries /usr/lib/hpux32/libc.
cc_bundled(1) cc_bundled(1) (Bundled C Compiler - Limited Functionality) end(3C) exit(2) symbol of the last locations in program termination of a process Tutorials and Standards Documents American National Standard for Information Systems - Programming language C, ANS X3.159-1989. See the HP C Online help.
cd(1) cd(1) NAME cd - change working directory SYNOPSIS cd [ directory ] DESCRIPTION If directory is not specified, the value of shell parameter HOME is used as the new working directory. If directory specifies a complete path starting with /, ., or .. , directory becomes the new working directory. If neither case applies, cd tries to find the designated directory relative to one of the paths specified by the CDPATH shell variable.
cd(1) cd(1) SEE ALSO csh(1), pwd(1), ksh(1), sh-posix(1), sh(1), chdir(2). STANDARDS CONFORMANCE cd: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
cdc(1) cdc(1) NAME cdc - change the delta commentary of an SCCS delta SYNOPSIS cdc -r SID [-m[ mrlist ] ] [-y[ comment ] ] files DESCRIPTION The cdc command changes the delta commentary, for the SID specified by the -r option, of each named SCCS file. Delta commentary is defined to be the Modification Request (MR) and comment information normally specified via the delta(1) command (-m and -y options).
cdc(1) cdc(1) International Code Set Support Single- and multi-byte character code sets are supported. DIAGNOSTICS Use sccshelp(1) for explanations. c EXAMPLES Add bl78-12345 and bl79-00001 to the MR list, remove bl77-54321 from the MR list, and add the comment trouble to delta 1.6 of s.file : cdc -r1.6 -m"bl78-12345 !bl77-54321 bl79-00001" -ytrouble s.file The following does the same thing: cdc -r1.6 s.
chacl(1) chacl(1) NAME chacl - add, modify, delete, copy, or summarize access control lists (ACLs) of files SYNOPSIS /usr/bin/chacl acl file ... chacl -r acl file ... chacl -d aclpatt file ... chacl -f fromfile tofile ... chacl - [ z Z F ] file... c DESCRIPTION chacl extends the capabilities of chmod(1), by enabling the user to grant or restrict file access to additional specific users and/or groups.
chacl(1) chacl(1) continues, and eventually returns non-zero. -f fromfile tofile Copy the ACL from fromfile to the specified tofile, transferring ownership, if necessary (see acl(5), chown(2), or chownacl(3C)). fromfile can be - to represent standard input. This option implies the -r option. If the owner and group of fromfile are identical to those of tofile, chacl -f is identical to: chacl -r ‘lsacl fromfile‘ tofile ...
chacl(1) chacl(1) chacl -r ’(@.%,rw-)’ - test Delete from file myfile the specific access rights, if any, for user 165 in group 13. Note that this is different from adding an ACL entry that restricts access for that user and group. The user’s resulting access rights depend on the entries remaining in the ACL. The command also deletes all entries for user jpc that have a read bit turned on (the asterisk can be used as a wildcard in the ACL pattern for user, group, or access mode): chacl -d ’165.13, jpc.
chatr(1) chatr(1) NAME chatr - change program’s internal attributes SYNOPSIS Remarks For Itanium-based systems, see chatr_ia(1). For PA-RISC systems, see chatr_pa(1). Use the uname command to determine your system type. uname -m returns ia64 on Itanium-based systems. All other values represent PA-RISC systems. c SEE ALSO chatr_ia(1), chatr_pa(1), uname(1).
chatr_ia(1) chatr_ia(1) Integrity Systems Only NAME chatr_ia: chatr - change program’s internal attributes on Integrity systems SYNOPSIS Format 1: for files with a single text segment and a single data segment chatr [-s] [-z|Z] [-l library] [-B mode] [+as mode] [+b flag] [+cd flag] [+ci flag] [+dbg flag] [+dynopt flag] [+es flag] [+gst flag] [+gstsize size] [+id flag] [+k flag] [+l library] [+md flag] [+mem_check flag] [+mergeseg flag] [+mi flag] [+o flag] [+pd size] [+pi size] [+s flag] [+z flag] [+I fl
chatr_ia(1) Integrity Systems Only chatr_ia(1) disable , respectively enable and disable use of the embedded path list. However, you cannot use disable on an ELF file, and a warning message is issued. See the +s option. You can use the +b option to enable the embedded path for filter libraries. c +c flag (Format 2 only.) Enable or disable the code bit for a specified segment. If this is enabled, it is denoted by the c flag for the segment listing in the chatr output.
chatr_ia(1) chatr_ia(1) Integrity Systems Only +mergeseg flag Enable or disable the shared library segment merging features. When enabled, all data segments of shared libraries loaded at program startup are merged into a single block. Data segments for each dynamically loaded library will also be merged with the data segments of its dependent libraries. Merging of these segments increases run-time performance by allowing the kernel to use larger size page table entries.
chatr_ia(1) Integrity Systems Only chatr_ia(1) display a message referring to this manual page section, and log an error message to the system message log (use dmesg to view the error message). The message logged by the kernel is: WARNING: UID # may have attempted a buffer overflow attack. PID # (program_name) has been terminated. See the ’+es enable’ option of chatr(1).
chatr_ia(1) chatr +es enable disable or chatr is not run enable disable or chatr is not run enable disable or chatr is not run chatr_ia(1) Integrity Systems Only executable_stack 1 1 Action program runs normally program runs normally 0 0 program runs normally program is killed 2 2 program runs normally program runs normally with warning displayed c RETURN VALUE chatr returns zero on success.
chatr_ia(1) Integrity Systems Only chatr_ia(1) EXAMPLES Change a.out to demand-loaded chatr -q a.out Change binding mode of program file that uses shared libraries to immediate and nonfatal. Also enable usage of SHLIB_PATH environment variable: chatr -B immediate -B nonfatal +s enable a.out Disallow run-time path lookup for the shared library /usr/lib/libc.sl that the shared library libfoo.sl depends on: chatr +l /usr/lib/libc.sl libfoo.
chatr_ia(1) chatr_ia(1) Integrity Systems Only AUTHOR chatr was developed by HP. SEE ALSO System Tools ld(1) dld.so(5) Miscellaneous a.
chatr_pa(1) PA-RISC Systems Only chatr_pa(1) NAME chatr_pa: chatr - change program’s internal attributes on PA-RISC systems c SYNOPSIS PA-RISC 32-bit SOM chatr chatr [-nqsMN [z|Z] ] [-l library] [-B mode] [+b flag] [+dbg flag] [+es flag] [+mergeseg flag] [+gst flag] [+gstbuckets size] [+gstsize size] [+k flag] [+l library] [+mem_check flag] [+pd size] [+pi size] [+plabel_cache flag] [+q3p flag] [+q4p flag] [+r flag] [+s flag] [+z flag] file ...
chatr_pa(1) PA-RISC Systems Only chatr_pa(1) disable , respectively enable and disable use of the embedded path list. However, you cannot use disable on an ELF (PA-RISC 64-bit) file and a warning message is issued. See the +s option. You can use the +b option to enable the embedded path for filter libraries. +dbg flag Controls the mapping of shared library text segments privately. The flag values, enable and disable , toggle the request on and off.
chatr_pa(1) c PA-RISC Systems Only chatr_pa(1) +z Enable lazy swap on all data segments (using PA-RISC 32-bit chatr or PA-RISC 64-bit chatr FORMAT 1) or on a specific segment (using PA-RISC 64-bit ELF chatr FORMAT 2). May not be used with non-data segments. -z Enable null pointer dereference trap. Run-time dereference of null pointers will produce a SIGSEGV signal. (This is the complement of the -Z option.) -Z Disable null pointer dereference trap. (This is the complement of the -z option.
chatr_pa(1) chatr_pa(1) PA-RISC Systems Only Options For PA-RISC 64-bit ELF chatr PA-RISC 64-bit ELF chatr is similar to SOM chatr but supports new options (and obsoletes others). New options: OPTIONS FOR PA-RISC 64-bit ELF chatr (FORMAT 1) Set the code bit for the file’s data segment(s). +cd +ci Set the code bit for the file’s text segments(s). +md Set the modification bit for the file’s data segment(s). +mi Set the modification bit for the file’s text segment(s).
chatr_pa(1) PA-RISC Systems Only chatr_pa(1) a shared mapping (MAP_SHARED ). In order to use this new feature, the maxdsiz kernel configurable variable will need to be increased appropriately; see maxdsiz(5). Also, the system will have to enable enough swap space to support processes with large private address spaces. c Compatibility issues Processes that enable a private 3rd quadrant (q3p processes) will reduce the amount of address space available for shared objects by 1GB.
chatr_pa(1) chatr_pa(1) PA-RISC Systems Only minimize the need for manual intervention by whomever installs the program. An alternate method is setting the kernel tunable parameter, executable_stack, to set a system-wide default for whether stacks are executable. Setting the executable_stack parameter to 1 (one) with sam (see sam(1M)) tells the HP-UX kernel not to execute protect program stack(s). This is the preferred setting if compatibility with older releases is more important than security.
chatr_pa(1) PA-RISC Systems Only chatr_pa(1) Invalid arguments If you use an invalid argument with a valid option and you do not specify a file name, both PA-RISC 32-bit and 64-bit chatr return 0. chatr +b returns 0. For PA-RISC 32-bit chatr , if you specify a file name (regardless of whether or not the file exists), chatr returns number of words in the command line. chatr +b c file returns 4.
chatr_pa(1) chatr_pa(1) PA-RISC Systems Only AUTHOR chatr was developed by HP. SEE ALSO System Tools ld(1) Miscellaneous a.
checknr(1) checknr(1) NAME checknr - check nroff/troff files SYNOPSIS checknr [-s] [-f] [-a. x1 .y1.x2 .y2 ... c .xn .yn ] [-c. x1 .x2 .x3 ...c .xn ] [ file ... ] DESCRIPTION checknr searches a list of nroff or troff input files for certain kinds of errors involving mismatched opening and closing delimiters and unknown commands. If no files are specified, checknr searches the standard input. checknr looks for the following: • Font changes using \fx ... \fP . • Size changes using \sx ... \s0 .
chfn(1) chfn(1) NAME chfn - change user information; used by finger SYNOPSIS chfn chfn chfn chfn chfn [login-name] -r -r -r -r files [login-name] nis [login-name] nisplus [login-name] dce [login-name] c DESCRIPTION The chfn command changes the user information that is stored in the repository for the current logged-in user or for the user specified by login-name (see passwd(1)). The information is organized as four comma-separated subfields within the reserved (5th) field of the password file entry.
chfn(1) chfn(1) WARNINGS The encoding of office and extension information is installation-dependent. For historical reasons, the user’s name, etc., are stored in the /etc/passwd file. This is an inappropriate place to store the information. Because two users may try to write the passwd file at once, a synchronization method was developed. On rare occasions, chfn prints a message that the password file is busy. When this occurs, chfn sleeps for a short time, then tries to write to the passwd file again.
chkey(1) chkey(1) NAME chkey - change user’s secure RPC key pair SYNOPSIS chkey [ -p ] [ -s nisplus | nis | files | ldap ] DESCRIPTION chkey is used to change a user’s secure RPC public key and secret key pair. chkey prompts for the old secure-rpc password and verifies that it is correct by decrypting the secret key. If the user has not already keylogged in, chkey registers the secret key with the local keyserv daemon.
chmod(1) chmod(1) NAME chmod - change file mode access permissions SYNOPSIS /usr/bin/chmod [-A] [-R] symbolic_mode_list file ... Obsolescent form: /usr/bin/chmod [-A] [-R] numeric_mode file ... c DESCRIPTION The chmod command changes the permissions of one or more files according to the value of symbolic_mode_list or numeric_mode. You can display the current permissions for a file with the ls -l command (see ls(1)).
chmod(1) chmod(1) Numeric Mode (Obsolescent) Absolute permissions can be set by specifying a numeric_mode, an octal number constructed from the logical OR (sum) of the following mode bits: Miscellaneous mode bits: 4000 2000 1000 (= u=s ) (= g=s ) (= u=t ) Set user ID on file execution (file only) Set group ID on file execution (file only) Set sticky bit; see below and chmod(2) Permission mode bits: 0400 0200 0100 0040 0020 0010 0004 0002 0001 (= (= (= (= (= (= (= (= (= u=r ) u=w ) u=x ) g=r ) g=w )
chmod(1) chmod(1) chmod a+x file Assign read and execute permission to everybody, and set the set-user-ID bit: chmod a=rx,u+s file Assign read and write permission to the file owner, and read permission to everybody else: chmod u=rw,go=r file or the obsolescent form: c chmod 644 file Traverse a directory subtree making all regular files readable by user and group only, and all executables and directories executable (searchable) by everyone: chmod -R ug+r,o-r,a+X pathname If the current value of umask
chown(1) chown(1) NAME chown, chgrp - change file owner or group SYNOPSIS chown [-h] [-R] owner[:group] file ... chgrp [-h] [-R] group file ... DESCRIPTION The chown command changes the owner ID of each specified file to owner and optionally the group ID of each specified file to group. The chgrp command changes the group ID of each specified file to group. owner can be either a decimal user ID or a login name found in the /etc/passwd file.
chown(1) chown(1) RETURN VALUE chown and chgrp return the following values: 0 Successful completion. >0 An error condition occurred. EXAMPLES The following command changes the owner of the file jokes to sandi : chown sandi jokes c The following command searches the directory design_notes and changes each file in that directory to owner mark and group users : chown -R mark:users design_notes WARNINGS The default operation of chown and chgrp for symbolic links has changed as of HP-UX release 10.0.
chsh(1) chsh(1) NAME chsh - change default login shell SYNOPSIS chsh chsh chsh chsh chsh login-name [shell] -r -r -r -r files login-name [shell] nisplus login-name [shell] nis login-name [shell] dce login-name [shell] c DESCRIPTION The chsh command changes the login-shell for a user’s login name in the repository (see passwd(1)). The DCE repository (-r dce ) is only available if Integrated Login has been configured, see auth.adm(1M).
chsh(1) chsh(1) AUTHOR chsh was developed by HP and the University of California, Berkeley. FILES /etc/shells /etc/ptmp c SEE ALSO chfn(1), csh(1), ksh(1), passwd(1), sh(1), sh-posix(1), getusershell(3C), pam(3), passwd(4), shells(4).
ci(1) ci(1) NAME ci - check in RCS revisions SYNOPSIS ci [options] file... DESCRIPTION ci stores new revisions into RCS files. Each file name ending in ,v is treated as an RCS file; all others are assumed to be working files. ci deposits the contents of each working file into the corresponding RCS file (see rcsintro(5)). If the RCS file does not exist, ci creates it and deposits the contents of the working file as the initial revision. The default number is "1.1". The access list is initialized to empty.
ci(1) ci(1) -q[rev] Quiet mode; diagnostic output is not printed. A revision that is not different from the preceding one is not deposited unless -f is given. -r[rev] Assigns the revision number rev to the checked-in revision, releases the corresponding lock, and deletes the working file. This is the default. If rev is omitted, ci derives the new revision number from the caller’s last lock.
ci(1) ci(1) A file with approximately 240 revisions may cause a hash table overflow. ci cannot add another revision to the file until some of the old revisions have been removed. Use the rcs -o (obsolete) command option to remove old revisions. RCS is designed to be used with TEXT files only. Attempting to use RCS with non-text (binary) files results in data corruption. AUTHOR ci was developed by Walter F. Tichy.
ckconfig(1) ckconfig(1) NAME ckconfig - verify the path names of all the FTP configuration files. SYNOPSIS /usr/bin/ckconfig [-V] DESCRIPTION The ckconfig utility is used /etc/ftpd/ftpusers, /etc/ftpd/ftpgroups, /etc/ftpd/pids/*. c to verify the path names of the FTP configuration files, /etc/ftpd/ftpaccess, /etc/ftpd/ftpconversions, /etc/ftpd/ftphosts, /var/adm/syslog/xferlog, and This utility checks to see that all the FTP configuration files are in the path specified.
cksum(1) cksum(1) NAME cksum - print file checksum and sizes SYNOPSIS cksum [file ...] DESCRIPTION The cksum command calculates and prints to standard output a checksum for each named file, the number of octets in the file and the filename. cksum uses a portable algorithm based on a 32-bit Cyclic Redundancy Check. This algorithm finds a broader spectrum of errors than the 16-bit algorithms used by sum (see sum(1)). The CRC is the sum of the following expressions, where x is each byte of the file.
clear(1) clear(1) NAME clear - clear terminal screen SYNOPSIS clear c DESCRIPTION clear clears the terminal screen if it is possible to do so. It reads the TERM environment variable for the terminal type, then reads the appropriate terminfo database to determine how to clear the screen. FILES /usr/share/lib/terminfo/?/* terminal database files AUTHOR clear was developed by the University of California, Berkeley. SEE ALSO terminfo(4).
cmp(1) cmp(1) NAME cmp - compare two files SYNOPSIS cmp [-l] [-s] file1 file2 [skip1 [skip2]] DESCRIPTION cmp compares two files (if file1 or file2 is -, the standard input is used). Under default options, cmp makes no comment if the files are the same; if they differ, it announces the byte and line number at which the difference occurred. If one file is an initial subsequence of the other, that fact is noted.
co(1) co(1) NAME co - check out RCS revisions SYNOPSIS co [ options ] file ... c DESCRIPTION co retrieves revisions from RCS files. Each file name ending in ,v is taken to be an RCS file. All other files are assumed to be working files. co retrieves a revision from each RCS file and stores it in the corresponding working file (see also rcsintro(5)). Revisions of an RCS file can be checked out locked or unlocked. Locking a revision prevents overlapping updates.
co(1) co(1) For 2-digit year input (yy) without the presence of the century field, the following interpretation is taken: [70 -99 , 00 -69 (1970-1999, 2000-2069)]. -r[ rev ] Retrieves the latest revision whose number is less than or equal to rev. If rev indicates a branch rather than a revision, the latest revision on that branch is retrieved. rev is composed of one or more numeric or symbolic fields separated by . .
co(1) co(1) Access Control Lists (ACLs) Optional ACL entries should not be added to RCS files because they might be deleted. DIAGNOSTICS The RCS file name, the working file name, and the revision number retrieved are written to the diagnostic output. The exit status always refers to the last file checked out, and is 0 if the operation was successful, 1 if unsuccessful. c EXAMPLES Assume the current directory contains a subdirectory named RCS with an RCS file named io.c,v .
col(1) col(1) NAME col - filter reverse linefeeds and backspaces SYNOPSIS col [-blfxp ] DESCRIPTION col reads from the standard input and writes onto the standard output. It performs the line overlays implied by reverse line feeds (ASCII code ESC-7 ), and by forward and reverse half-linefeeds (ESC-9 and ESC-8 ). col is particularly useful for filtering multicolumn output made with the nroff .rt command, and output resulting from use of the tbl preprocessor (see nroff(1) and tbl(1)).
col(1) col(1) International Code Set Support Single- and multibyte character code sets are supported. EXAMPLES col is used most often with nroff and tbl . A common usage is: tbl filename | nroff -man | col | more -s (very similar to the usual man(1) command). This command allows vertical bars and outer boxes to be printed for tables. The file is run through the tbl preprocessor, and the output is then piped through nroff , formatting the output using the -man macros.
comb(1) comb(1) NAME comb - combine SCCS deltas SYNOPSIS comb [-p SID ] [-clist ] [-o] [-s] file ... DESCRIPTION The comb command generates a shell procedure (see sh(1)) which, when run, reconstructs the given SCCS files. The reconstructed files are usually smaller than the original files. Arguments can be specified in any order, but all options apply to all named SCCS files.
comb(1) comb(1) FILES s.COMB????? comb????? Temporary file Temporary file SEE ALSO admin(1), delta(1), get(1), sccshelp(1), prs(1), sh(1), sccsfile(4).
comm(1) comm(1) NAME comm - select or reject lines common to two sorted files SYNOPSIS comm [-[123 ] ] file1 file2 DESCRIPTION comm reads file1 and file2, which should be ordered in increasing collating sequence (see sort(1) and Environment Variables below), and produces a three-column output: Column 1: Column 2: Column 3: Lines that appear only in file1, Lines that appear only in file2, Lines that appear in both files. If - is used for file1 or file2, the standard input is used.
command(1) command(1) NAME command - execute a simple command SYNOPSIS command command_name [argument]... c DESCRIPTION command enables the shell to treat the arguments as a simple command, suppressing the shell function lookup. If command_name is not the name of the function, the effect of command is the same as omitting command. Operands command recognizes the following operands: command_name The name of a HP-UX command or a shell built-in command.
command(1) command(1) STANDARDS CONFORMANCE command : XPG4, POSIX.
compact(1) compact(1) NAME compact, uncompact, ccat - compact and uncompact files, and cat them SYNOPSIS compact [name]... uncompact [name]... ccat [file]... c DESCRIPTION compact compresses the named files using an adaptive Huffman code. If no file names are given, standard input is compacted and sent to the standard output. compact operates as an on-line algorithm. Each time a byte is read, it is encoded immediately according to the current prefix code.
compress(1) compress(1) NAME compress, uncompress, zcat, compressdir, uncompressdir - compress and expand data SYNOPSIS Compress Files compress [-d] [-f|-z ] [-z] [-v] [-c] [-V] [-b maxbits ] [ file ... ] uncompress [-f] [-v] [-c] [-V] [ file ... ] zcat [-V] [ file ... ] c Compress Entire Directory Subtrees compressdir [ options ] [ directory ... ] uncompressdir [ options ] [ directory ...
compress(1) compress(1) uncompress -c. -V -b maxbits Print the current version and compile options onto the standard error. Specify the maximum number of bits the compress algorithm will use. The default is 16 and the range can be any integer between 9 and 16. compress uses the modified Lempel-Ziv algorithm popularized in A Technique for High Performance Data Compression , Terry A. Welch, IEEE Computer, vol. 17, no. 6 (June 1984), pages 8-19.
compress(1) compress(1) uncompress: corrupt input A SIGSEGV violation was detected which usually means that the input file has been corrupted. Compression: xx .xx % Percentage of the input saved by compression. (Relevant only for -v .) -- not a regular file: unchanged When the input file is not a regular file (a directory for example), it is left unaltered. -- has xx other links: unchanged The input file has links which are not symbolic links and has been left unchanged. See ln(1) for more information.
convert(1) convert(1) NAME convert - convert an audio file SYNOPSIS /opt/audio/bin/convert [source_file] [target_file] [-sfmt format] [-dfmt format] [-ddata data_type] [-srate rate] [-drate rate] [-schannels number] [-dchannels number] c DESCRIPTION This command converts audio files from one supported file format, data format, sampling rate, and number of channels to another. The unconverted file is retained as a source file.
convert(1) cd /opt/audio/bin convert beep.l16 convert(1) beep.au Convert a raw data file to a headered file when the source has no extension, was sampled at 11,025 per second, and has stereo data. cd /opt/audio/bin convert beep beep.au -sfmt l16 -srate 11025 -schannels 2 To save disk space, convert an audio file with CD quality sound to voice quality sound. c cd /opt/audio/bin convert idea.au idea2.au -ddata u -drate 8k -dchannels 1 AUTHOR convert was developed by HP.
cp(1) cp(1) NAME cp - copy files and directory subtrees SYNOPSIS cp [-f-i] [-p] [-S] [-e extarg ] file1 new_file cp [-f-i] [-p] [-S] [-e extarg ] file1 [file2 ... ] dest_directory cp [-f-i] [-p] [-S] [-R-r] [-e extarg ] directory1 [ directory2 ... ] dest_directory c DESCRIPTION cp copies: • • • • • file1 to new or existing new_file, file1 to existing dest_directory, file1, file2, ... to existing dest_directory, directory subtree directory1, to new or existing dest_directory.
cp(1) cp(1) Under UNIX95 flag set, cp will exit with error if multiple sources are being copied to a nonexisting directory. -R (recursive subtree copy) The -R option is identical to the -r option. With the -R and -r options, in addition to regular files and directories, cp also copies FIFOs, character and block device files and symbolic links. Only superusers can copy device files. All other users get an error. Symbolic links are copied so the target points to the same location that the source did.
cp(1) cp(1) This example is equivalent to: mv sourcedir targetdir To copy all files and directory subtrees in the current directory to an existing targetdir, use: cp -r * targetdir To copy all files and directory subtrees in sourcedir to targetdir, use: cp -r sourcedir /* targetdir c Note that directory pathnames can precede both sourcedir and targetdir.
cpio(1) cpio(1) NAME cpio - copy file archives in and out; duplicate directory trees SYNOPSIS cpio -o [-e extarg] [achvxABC ] cpio -i[bcdfmrstuvxBPRSU6] [pattern...] cpio -p [-e extarg] [adlmruvxU ] directory DESCRIPTION The cpio command saves and restores archives of files on magnetic tape, other devices, or a regular file, and copies files from one directory to another while replicating the directory tree structure. When cpio completes processing the files, it reports the number of blocks written.
cpio(1) cpio(1) system that does not support extent attributes. If -e is not specified, the default value for extarg is warn . c f h Copy in all files except those selected by pattern.... l Whenever possible, link files rather than copying them. This option does not destroy existing files. Use only with -p. m Retain previous file modification time. This option does not affect directories that are being copied. r s Rename files interactively. If the user types a null line, the file is skipped.
cpio(1) cpio(1) U Use the process’s file-mode creation mask (see umask(2)) to modify the mode of files created, in the same manner as creat(2). 6 Process a UNIX Sixth-Edition-format file. Use only with -i. Note that cpio archives created using a raw device file must be read using a raw device file. When the end of the tape is reached, cpio prompts the user for a new special file and continues.
cpio(1) cpio(1) cd olddir find . -depth -print | cpio -pd newdir The trivial case find . -depth -print | cpio -oB >/dev/rmt/c0t0d0BEST can be handled more efficiently by: find . -cpio /dev/rmt/c0t0d0BEST c WARNINGS Because of industry standards and interoperability goals, cpio does not support the archival of files larger than 2 GB or files that have user/group IDs greater than 60 K. Files with user/group IDs greater than 60 K are archived and restored under the user/group ID of the current process.
cpp(1) cpp(1) NAME cpp - the C language preprocessor SYNOPSIS /usr/ccs/lbin/cpp [option ...] [ifile [ofile] ] DESCRIPTION cpp is the C language preprocessor which is invoked as the first pass of any C compilation using the cc command (see cc(1)). Its purpose is to process #include and conditional compilation instructions and macros. Thus the output of cpp is designed to be in a form acceptable as input to the next pass of the C compiler.
cpp(1) -Uname cpp(1) Remove any initial definition of name, where name is a reserved symbol that is predefined by the particular preprocessor.
cpp(1) cpp(1) Only these operators, integer constants, and names that are known by cpp should be used in constant-expression. In particular, the sizeof operator is not available. #ifdef name The lines following appear in the output if and only if name has been the subject of a previous #define without being the subject of an intervening #undef .
cpp(1) cpp(1) FILES /usr/include Standard directory for #include files SEE ALSO m4(1).
crontab(1) crontab(1) NAME crontab - user job file scheduler SYNOPSIS crontab crontab crontab crontab [file] -e [username] -l [username] -r [username] c DESCRIPTION The crontab command manages a crontab file for the user. You can use a crontab file to schedule jobs that are executed automatically by cron (see cron(1M)) on a regular basis.
crontab(1) crontab(1) Blank lines and those whose first non-blank character is # will be ignored. cron invokes the command from the user’s HOME directory with the POSIX shell, (/usr/bin/sh ). It runs in the c queue (see queuedefs(4)). cron supplies a default environment for every shell, defining: HOME= user’s-home-directory LOGNAME= user’s-login-id PATH=/usr/bin:/usr/sbin:. SHELL=/usr/bin/sh Users who desire to have their .
crypt(1) crypt(1) NAME crypt - encode and decode files SYNOPSIS crypt [password] DESCRIPTION crypt reads from the standard input and writes on the standard output. password is a key that selects a particular transformation. If no password is given, crypt demands a key from the terminal and turns off printing while the key is being typed in. crypt encrypts and decrypts with the same key: crypt key cypher crypt key
crypt(1) crypt(1) SEE ALSO ed(1), makekey(1), stty(1).
csh(1) csh(1) NAME csh - a shell (command interpreter) with C-like syntax SYNOPSIS csh [-cefinstvxTVX] [ command_file ] [ argument_list ... ] DESCRIPTION csh is a command language interpreter that incorporates a command history buffer, C-like syntax, and job control facilities. Command Options Command options are interpreted as follows: -c Read commands from the (single) following argument which must be present. Any remaining arguments are placed in argv .
csh(1) csh(1) [1] 1234 indicating that the job which was started asynchronously was job number 1 and had one (top-level) process, whose process id was 1234. If you are running a job and want to do something else, you can type the currently defined suspend character (see termio(7)) which sends a stop signal to the current job. csh then normally indicates that the job has been ‘Stopped’, and prints another prompt.
csh(1) csh(1) breaksw Causes a break from a switch , resuming after the endsw . case label : A label in a switch statement as discussed below. cd cd directory_name chdir chdir directory_name Change the shell’s current working directory to directory_name. If not specified, directory_name defaults to your home directory. If directory_name is not found as a subdirectory of the current working directory (and does not begin with /, ./, or ..
csh(1) csh(1) the output. Useful in programs that use the shell to perform file name expansion on a list of words. goto word The specified word is file name and command expanded to yield a string of the form label . The shell rewinds its input as much as possible and searches for a line of the form label: possibly preceded by blanks or tabs. Execution continues after the specified line.
csh(1) csh(1) coredumpsize cputime datasize Size of the largest core dump that is created descriptors filesize memoryuse stacksize Maximum number of open files for each process Maximum number of CPU seconds to be used by each process Maximum growth of the data region allowed beyond the end of the program text Largest single file that can be created Maximum size to which a process’s resident set size can grow c Maximum size of the automatically extended stack region The maximum_use argument can be s
csh(1) csh(1) the top. A synonym for popd , called rd , is provided for historical reasons. Its use is not recommended because it is not part of the standard BSD csh and may not be supported in future releases. pushd [ name ] [ +n ] With no arguments, pushd exchanges the top two elements of the directory stack. Given a name argument, pushd changes to the new directory (using cd) and pushes the old current working directory (as in csw) onto the directory stack.
csh(1) csh(1) ... breaksw ... default: ... breaksw endsw Each case label (str1) is successively matched against the specified string which is first command and file name expanded. The form of the case labels is the Pattern Matching Notation with the exception that non-matching lists in bracket expressions are not supported (see regexp(5)). If none of the labels match before a default label is found, the execution begins after the default label.
csh(1) csh(1) The operators *= , += , etc., are available as in C. White space can optionally separate the name from the assignment operator. However, spaces are mandatory in separating components of expression which would otherwise be single words. Special postfix ++ and - - operators increment and decrement name, respectively (e.g., @ i++). c Non-Built-In Command Execution When a command to be executed is not a built-in command, csh attempts to execute the command via exec(2).
csh(1) csh(1) These forms, without further modification, simply reintroduce the words of the specified events, each separated by a single blank. As a special case, !! is a re-do; it refers to the previous command. To select words from a command, use a colon (:) and a designator for the desired words after the event specification. The words of an input line are numbered from zero. The basic word designators are: 0 First word (i.e., the command name itself). n nth word. ^ First argument.
csh(1) csh(1) ls -ld ˜paul one could execute !{l}a to do ls -ld ˜paula while !la would look for a command starting with la . c Quoting with Single and Double Quotes The quotation of strings by single quotes (’) and double quotes (") can be used to prevent all or some of the remaining substitutions. Strings enclosed in single quotes are protected from any further interpretation. Strings enclosed in double quotes are still variable- and command-expanded as described below.
csh(1) csh(1) r w x e o z f d read access write access execute access existence ownership zero size plain file directory The specified filename is command- and file-name expanded then tested to see if it has the specified relationship to the real user. If the file does not exist or is inaccessible, all inquiries return false (0). Command executions succeed, returning true, if the command exits with status 0; otherwise they fail, returning false.
csh(1) csh(1) unset commands. Some of the variables are Boolean, that is, the shell does not care what their value is, only whether they are set or not. Some operations treat variables numerically. The at sign (@) command permits numeric calculations to be performed and the result assigned to a variable. The null string is considered to be zero, and any subsequent words of multi-word values are ignored.
csh(1) csh(1) $$ $< Substitutes the (decimal) process number of the (parent) shell. Substitutes a line from the standard input, with no further interpretation thereafter. It can be used to read from the keyboard in a shell script. Pre-Defined and Environment Variables The following variables have special meaning to the shell. Of these autologout , argv , cwd , home , path , prompt , shell , and status are always set by the shell.
csh(1) csh(1) nonomatch If set, it is no longer an error for a file name expansion to not match any existing files. If there is no match, the primitive pattern is returned. It is still an error for the primitive pattern to be malformed. For example, ’echo [’ still gives an error. notify If set, csh notifies you immediately (through your standard output device) of background job completions. The default is unset (indicate job completions just before printing a prompt).
csh(1) csh(1) Matching Notation defined by regexp(5) with the following exceptions: • Non-matching lists in bracket expressions are not supported. • In a list of words specifying file name substitution it is an error for no pattern to match an existing file name, but it is not required for each pattern to match. • The metanotation a{b,c,d}e is a shorthand for "abe ace ade". Left to right order is preserved, with results of matches being sorted separately at a low level to preserve this order.
csh(1) csh(1) Diagnostic output can be directed through a pipe with the standard output. Simply use the form |& rather than | by itself. c CSH UTILITIES File Name Completion In typing file names as arguments to commands, it is no longer necessary to type a complete name, only a unique abbreviation is necessary. When you want the system to try to match your abbreviation, press the ESC key. The system then completes the file name for you, echoing the full name on your terminal.
csh(1) csh(1) Sanity C shell restores your terminal to a sane mode if it appears to return from some command in raw, cbreak, or noecho mode. Saving Your History Buffer csh has the ability to save your history list between login sessions. If the shell variable savehist is set to a number, that number of command events from your history list is saved. For example, placing the line set history=10 savehist=10 in your .
csh(1) csh(1) Commands within loops, prompted for by ?, are not placed in the history list. Control structure should be parsed rather than being recognized as built-in commands. This would allow control commands to be placed anywhere, to be combined with |, and to be used with & and ; metasyntax. It should be possible to use the : modifiers on the output of command substitutions. All and more than one : modifier should be allowed on $ substitutions.
csh(1) csh(1) /etc/csh.login A csh script sourced (executed) before ˜/.cshrc and ˜/.login when starting a csh login (analogous to /etc/profile in the POSIX shell). /tmp/sh* Temporary file for << . SEE ALSO cd(1), echo(1), kill(1), nice(1), sh(1), umask(1), access(2), exec(2), fork(2), pipe(2), umask(2), wait(2), a.out(4), environ(5), lang(5), regexp(5), tty(7). C Shell tutorial in Shells Users Guide.
csplit(1) csplit(1) NAME csplit - file context split SYNOPSIS csplit [-s] [-k] [-f prefix] [-n number] file arg1 ... [argn] c DESCRIPTION csplit reads file, separates it into n+1 sections as defined by the arguments arg1 ... argn, and places the results in separate files. The maximum number of arguments (arg1 through argn) allowed is 99 unless the -n number option is used to allow for more output file names.
csplit(1) csplit(1) Enclose in appropriate quotes all regexp arguments containing blanks or other characters meaningful to the shell. Regular expressions must not contain embedded new-lines. csplit does not alter or remove the original file; it is the user’s responsibility to remove it when appropriate. EXTERNAL INFLUENCES Environment Variables LC_COLLATE determines the collating sequence used in evaluating regular expressions.
ct(1) ct(1) NAME ct - spawn getty to a remote terminal (call terminal) SYNOPSIS ct [-w n] [-x n] [-h] [-v] [-s speed] telno... c DESCRIPTION ct dials telno, the telephone number of a modem that is attached to a terminal, and spawns a getty(1M) process to that terminal. ct tries each line listed in file /etc/uucp/Devices until it finds an available line with appropriate attributes or runs out of entries.
ctags(1) ctags(1) NAME ctags - create a tags file SYNOPSIS ctags [-xvFBatwu ] files ... DESCRIPTION ctags makes a tags file for ex(1) (or vi(1)) from the specified C, Pascal and FORTRAN sources. A tags file gives the locations of specified objects (for C, functions, macros with argments, and typedefs; Pascal, procedures, programs and functions; FORTRAN, subroutines, programs and functions) in a group of files.
ctags(1) ctags(1) DIAGNOSTICS Too many entries to sort. An attempt to get additional heap space failed; the sort could not be performed. Unexpected end of function in file file , line line . The tags file may be incorrect. A } character was found unexpectedly in the first column. This can lead to incorrect entries in the tags file. Duplicate entry in file file , line line : name. c Second entry ignored. The same name was detected twice in the same file.
ctags(1) ctags(1) SEE ALSO ex(1), vi(1).
cu(1) cu(1) NAME cu - call another (UNIX) system; terminal emulator SYNOPSIS cu [-s speed ] [-l line ] [-h] [-q] [-t] [-d level ] [-e-o] [-m] [-n] [ telno systemname dir ] XPG4 Syntax: cu [-s speed ] [-l line ] [-h] [-q] [-t] [-d] [-e-o] [-m] [-n] [ telno systemname dir ] c DESCRIPTION cu calls up another system, which is usually a UNIX operating system, but can be a terminal or a nonUNIX operating system. cu manages all interaction between systems, including possible transfers of ASCII files.
cu(1) cu(1) Normally, an automatic DC3/DC1 protocol is used to control input from the remote to ensure that the buffer is not overrun. "Prompt handshaking" can be used to control transfer of ASCII files to systems that have no type-ahead capability but require data to be sent only after a prompt is given. This is described in detail below. Lines beginning with ˜ have special meanings. Transmit Process Commands The transmit process interprets the following commands: ~., ˜.. Terminate the conversation.
cu(1) cu(1) form where a circumflex (ASCII 94) precedes the character, as in ˆX . A null character can be specified with ˆ@. (A null first character in the prompt implies a "null" prompt, which always appears to be satisfied.) A circumflex is specified by ˆ ˆ. ~%> [>]file Divert output from the remote system to the specified file until another ˜%> command is given. When an output diversion is active, typing ˜%> terminates it, whereas ˜%> anotherfile terminates it and begins a new one.
cu(1) cu(1) EXAMPLES To dial a system whose number is 9 201 555 1212 using 1200 baud: cu -s1200 9=2015551212 If the speed is not specified, 300 is the default value.
cut(1) cut(1) NAME cut - extract (cut out) selected fields from each line of a file SYNOPSIS cut -c list [file]... cut -b list [-n] [file]... cut -f list [-d char] [-s] [file]... c DESCRIPTION cut cuts out (extracts) columns from a table or fields from each line in a file; in data base parlance, it implements the projection of a relation.
cut(1) cut(1) International Code Set Support cut supports both single- and multibyte character code sets. International code set characters may be specified in the char given to the -d option. cut recognizes the international code set characters according to the locale specified in the LC_CTYPE environment variable. DIAGNOSTICS line too long Line length must not exceed LINE_MAX characters or fields, including the newline character (see limits(5).
date(1) date(1) NAME date - display or set the date and time SYNOPSIS date date date date d [-u] [-u] +format [-u] [mmddhhmm[[cc]yy]] [-a [-]sss[.fff]] DESCRIPTION The date command displays or sets the current HP-UX system clock date and time. Since the HP-UX system operates in Coordinated Universal Time (UTC), date automatically converts to and from local standard or daylight/summer time, based on your TZ environment variable. See Environment Variables in EXTERNAL INFLUENCES below.
date(1) date(1) do you really want to run time backwards?[yes/no] Type yes or the equivalent for your locale to set the clock backwards; anything else to cancel the command. When date is used to set the date, a pair of date change records is written to the file /var/adm/wtmps. (XPG4 only.) No warning is generated if date is set backwards. Formatting Directives The following formatting directives, shown without the optional field width and precision specification, are replaced by the indicated characters.
date(1) date(1) %w Weekday as a one-digit decimal number [0-6 (Sunday-Saturday)]. For example, 3. %W Week number of the year (Monday as the first day of the week) as a two-digit decimal number [00 -53 ]. All days that precede the first Monday in the year are considered to be in week 00 . For example, 02. %x Current date representation. For example, 01/12/94 . %X Current time representation. For example, 19:45:58 . %y Year without century as a two-digit decimal number [00-99]. For example, 93.
date(1) date(1) %Oy Year (offset from %C) in alternate representation. Field Width and Precision An optional field width and precision specification can immediately follow the initial % of a formatting directive in the following order: [-0]width The decimal digit string width specifies a minimum field width in which the result of the conversion is right- or left-justified. The default is right-justified with space padding on the left.
date(1) date(1) The character c is not a valid format directive, field width specifier, or precision specifier. do you really want to run time backwards?[yes/no] The date/time you specified is earlier than the current clock value. Type yes (or the equivalent for your locale) to set the clock backwards; anything else to cancel the command. no permission You need the superuser privilege to change the date. d EXAMPLES Date in Different Languages Display the date.
date(1) date(1) SEE ALSO locale(1), stime(2), ctime(3C), strftime(3C), tztab(4), environ(5), lang(5), langinfo(5). STANDARDS CONFORMANCE date : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
dc(1) dc(1) NAME dc - desk calculator SYNOPSIS dc [ file ] d DESCRIPTION dc is an arbitrary precision arithmetic package. Ordinarily it operates on decimal integers, but one may specify an input base, output base, and a number of fractional digits to be maintained. (See bc(1), a preprocessor for dc that provides infix notation and a C-like syntax that implements functions. bc also provides reasonable control structures for programs.) The overall structure of dc is a stacking (reverse Polish) calculator.
dc(1) dc(1) o The top value on the stack is popped and used as the number radix for further output. See below for notes on output base. O k pushes the output base on the top of the stack. K z Z ? ; and : Y pushes the scale factor on the top of the stack. the top of the stack is popped, and that value is used as a non-negative scale factor: the appropriate number of places are printed on output, and maintained during multiplication, division, and exponentiation.
dd(1) dd(1) NAME dd - convert, reblock, translate, and copy a (tape) file SYNOPSIS dd [option=value] ... DESCRIPTION dd copies the specified input file to the specified output file with possible conversions. The standard input and output are used by default. Input and output block size can be specified to take advantage of raw physical I/O. Upon completion, dd reports the number of whole and partial input and output records.
dd(1) dd(1) Swap every pair of input bytes. swab noerror Do not stop processing on an input error. If the sync conversion symbol is also specified, missing input is replaced with null bytes and processed normally; otherwise, the input block is omitted from the output. notrunc Do not truncate existing output file. Blocks in the output file not overwritten by this invocation of dd are preserved. sync Pad every input block to size ibs .
dd(1) dd(1) Note the use of the raw magnetic tape device file. dd is especially suited to I/O on raw physical devices because it allows reading and writing in arbitrary block sizes. WARNINGS Some devices, such as 1/2-inch magnetic tapes, are incapable of seeking. Such devices may be positioned prior to running dd by using mt(1) or some other appropriate command. The skip , seek , iseek and oseek options do work for such devices.
delta(1) delta(1) NAME delta - make a delta (change) to an SCCS file SYNOPSIS delta [-r SID] [-s] [-n] [-g list] [-m mrlist] [-y comment ] [-p] files DESCRIPTION The delta command is used to permanently introduce into the named file changes that were made to the file retrieved by get (called the g-file, or generated file). See get(1). delta makes a delta to each named SCCS file.
delta(1) delta(1) LC_MESSAGES determines the language in which messages are displayed. If LC_CTYPE or LC_MESSAGES is not specified in the environment or is set to the empty string, the value of LANG is used as a default for each unspecified or empty variable. If LANG is not specified or is set to the empty string, a default of "C" (see lang(5)) is used instead of LANG . If any internationalization variable contains an invalid setting, delta behaves as if all internationalization variables are set to "C".
deroff(1) deroff(1) NAME deroff - remove nroff, tbl, and neqn constructs SYNOPSIS deroff [-mx ] [-w] [-i] [ file ... ] DESCRIPTION deroff reads each file in sequence and removes all nroff requests, macro calls, backslash constructs, neqn constructs (between .EQ and .EN lines, and between delimiters — see neqn(1)), and tbl descriptions (see tbl(1)), replacing them with white space (blanks and blank lines), and writes the remainder of the file on the standard output.
dhcpv6client_ui(1) dhcpv6client_ui(1) NAME dhcpv6client_ui - DHCPv6 client interface for requesting configuration parameters from the DHCPv6 server.
dhcpv6client_ui(1) dhcpv6client_ui(1) This option cannot be used with the -n option. RETURN VALUES dhcpv6client_ui returns 0 on success and 1 on failure. EXAMPLES dhcpv6client_ui obtains two IP addresses for the lan0 interface: dhcpv6client_ui -m lan0 -n 2 dhcpv6client_ui obtains two IP addresses for the lan0 interface and additional configuration parameters: d dhcpv6client_ui -m lan0 -n 2 -o dns_sa dns_sx FILES /etc/dhcpv6client.
diff(1) diff(1) NAME diff - differential file and directory comparator SYNOPSIS diff [-C n ] [-S name ] [-lrs ] [-bcefhintw ] dir1 dir2 diff [-C n ] [-S name ] [-bcefhintw ] file1 file2 diff [-D string ] [-biw ] file1 file2 d DESCRIPTION Comparing Directories If both arguments are directories, diff sorts the contents of the directories by name, then runs the regular file diff algorithm (described below) on text files that have the same name in each directory but are different.
diff(1) diff(1) -C n -h Output format similar to -c but with n lines of context. Do a fast, half-hearted job. This option works only when changed stretches are short and well separated, but can be used on files of unlimited length.
diff(1) diff(1) WARNINGS Editing scripts produced by the -e or -f option are naive about creating lines consisting of a single dot (.). When comparing directories with the -b , -w , or -i options specified, diff first compares the files in the same manner as cmp , then runs the diff algorithm if they are not equal. This may cause a small amount of spurious output if the files are identical except for insignificant blank strings or uppercase/lowercase differences.
diff3(1) diff3(1) NAME diff3 - 3-way differential file comparison SYNOPSIS diff3 [-exEX3 ] file1 file2 file3 DESCRIPTION diff3 compares three versions of a file, and prints disagreeing ranges of text flagged with these codes: ==== ====1 ====2 ====3 all three files differ file1 is different file2 is different file3 is different d The type of change required to convert a given range of a given file to some other is indicated in one of these ways: f :n1 a Text is to be appended after line number n1 in
diffmk(1) diffmk(1) NAME diffmk - mark changes between two different versions of a file SYNOPSIS diffmk prevfile currfile markfile d DESCRIPTION diffmk compares the previous version of a file with the current version and creates a file that includes nroff /troff ‘‘change mark’’ commands. prevfile is the name of the previous version of the file and currfile is the name of the current version of the file.
dircmp(1) dircmp(1) NAME dircmp - directory comparison SYNOPSIS dircmp [-d] [-s] [-wn ] dir1 dir2 DESCRIPTION dircmp examines dir1 and dir2 and generates various tabulated information about the contents of the directories. Sorted listings of files that are unique to each directory are generated for all the options. If no option is entered, a sorted list is output indicating whether the filenames common to both directories have the same contents.
dmpxlt(1) dmpxlt(1) NAME dmpxlt - dump iconv translation tables to a readable format SYNOPSIS /usr/bin/dmpxlt [-f output_filename] [input_filename] DESCRIPTION dmpxlt dumps the compiled version of the iconv codeset conversion tables into an ASCII-readable format that can be modified and used as input to genxlt(1) to regenerate the table for iconv(1). d Options dmpxlt recognizes the following options: -f output_filename If this option is not selected, the data will be sent to standard output.
dnssec-keygen(1) dnssec-keygen(1) NAME dnssec-keygen - key generation tool for DNSSEC SYNOPSIS dnssec-keygen [-a algorithm] [-b keysize] [-e] [-g generator] [-h] [-n nametype] [-p protocol-value] [-r randomdev] [-s strength-value] [-t type] [-v level] name DESCRIPTION dnssec-keygen generates keys for Secure DNS (DNSSEC) as defined in RFC2535. It also generates keys for use in Transaction Signatures (TSIG) which is defined in RFC2845.
dnssec-keygen(1) d dnssec-keygen(1) -t type This option indicates if the key is used for authentication or confidentiality. type can be either AUTHCONF , NOAUTHCONF , NOAUTH or NOCONF . The default is AUTHCONF . If type is AUTHCONF , the key can be used for authentication and confidentiality. Setting type to NOAUTHCONF indicates that the key cannot be used for authentication or confidentiality. A value of NOAUTH means the key can be used for confidentiality but not for authentication.
dnssec-makekeyset(1) dnssec-makekeyset(1) NAME dnssec-makekeyset - used to produce a set of DNSSEC keys SYNOPSIS dnssec-makekeyset [-a] [-h help] [-s start-time ] [-e end-time] [-t TTL] [-r randomdev] [-p] [-v level] keyfile... DESCRIPTION dnssec-makekeyset generates a key set from one or more keys created by dnssec-keygen. It creates a file containing KEY and SIG records for some zone which can then be signed by the zone’s parent if the parent zone is DNSSEC-aware.
dnssec-makekeyset(1) dnssec-makekeyset(1) If dnssec-makekeyset is successful, it creates a file name of the form nnnn.keyset. This file contains the KEY and SIG records for domain nnnn, the domain name part from the key file identifier produced when dnssec-keygen created the domain’s public and private keys. The .keyset file can then be transferred to the DNS administrator of the parent zone for them to sign the contents with dnssec-signkey.
dnssec-signkey(1) dnssec-signkey(1) NAME dnssec-signkey - DNSSEC keyset signing tool SYNOPSIS dnssec-signkey [-a] [-c class] [-e end-time] [-h] [-p] [-r randomdev] [-s start-time ] [-v level] keyset keyfile ... DESCRIPTION dnssec-signkey is used to sign a key set for a child zone. Typically this would be provided by a .keyset file generated by the dnssec-makekeyset utility. This provides a mechanism for a DNSSEC-aware zone to sign the keys of any DNSSEC-aware child zones.
dnssec-signkey(1) dnssec-signkey(1) next gets signed with dnssec-signzone. A copy of the generated signedkey file should be kept by the parent zone’s DNS administrator, since it will be needed when signing the parent zone. EXAMPLE The DNS administrator for a DNSSEC-aware .com zone would use the following command to make dnssec-signkey sign the .keyset file for example.com created in the example shown in the man page for dnssec-makekeyset: dnssec-signkey example.com.keyset Kcom.+003+51944 where Kcom.
dnssec-signzone(1) dnssec-signzone(1) NAME dnssec-signzone - DNSSEC zone signing tool SYNOPSIS dnssec-signzone [-a] [-c cycle-time ] [-d directory] [-e end-time] [-f output-file] [-h] [-i interval] [-n ncpus] [-o origin] [-p ] [-r randomdev] [-s start-time ] [-t ] [-v level] zonefile keyfile .... DESCRIPTION dnssec-signzone is used to sign a zone. Any .signedkey files for the zone to be signed should be present in the current directory, along with the keys that will be used to sign the zone.
dnssec-signzone(1) dnssec-signzone(1) -o origin This option specifies the zone origin. If not specified, the name of the zone file is assumed to be the origin. -p This option instructs dnssec-signkey to use pseudo-random data when signing the keys. This is faster, but less secure, than using genuinely random data for signing. This option may be useful when there are many child zone key sets to sign or if the entropy source is limited.
domainname(1) domainname(1) NAME domainname - set or display name of Network Information Service domain SYNOPSIS domainname [ name_of_domain ] DESCRIPTION Network Information Service (NIS) uses domain names to refer collectively to a group of hosts. Without an argument, domainname displays the name of the NIS domain. Only superuser can set the domain name by providing name_of_domain. The domain name is usually set in the configuration file /etc/rc.config.d/namesvrs, by setting the NIS_DOMAIN variable.
dos2ux(1) dos2ux(1) NAME dos2ux, ux2dos - convert ASCII file format SYNOPSIS dos2ux file... ux2dos file... d DESCRIPTION dos2ux and ux2dos read each specified file in sequence and write it to standard output, converting to HP-UX format or to DOS format, respectively. Each file can be either DOS format or HP-UX format for either command. A DOS file name is recognized by the presence of an embedded colon (:) delimiter; see dosif(4) for DOS file naming conventions.
doschmod(1) doschmod(1) (TO BE OBSOLETED) NAME doschmod - change attributes of a DOS file SYNOPSIS doschmod [-mu ] mode device : file ... DESCRIPTION The doschmod command is targeted for removal from HP-UX; see the WARNINGS below. doschmod is the DOS counterpart of chmod (see chmod(1)). Options doschmod recognizes one option: -m If an ordinary file with the same name as volume label exists, operation will be performed on the file instead of volume label. -u Disable argument case conversion.
doscp(1) doscp(1) (TO BE OBSOLETED) NAME doscp - copy to or from DOS files SYNOPSIS doscp [-fmvu ] file1 file2 doscp [-fmvu ] file1 [ file2 ... ] directory DESCRIPTION The doscp command is targeted for removal from HP-UX; see the WARNINGS below. doscp is the DOS counterpart of cp (see cp(1)). doscp copies a DOS file to a DOS or HP-UX file, an HPUX file to an HP-UX or DOS file, or HP-UX or DOS files to an HP-UX or DOS directory. The last name in the d argument list is the destination file or directory.
doscp(1) doscp(1) (TO BE OBSOLETED) SEE ALSO cp(1), dos2ux(1), doschmod(1), dosdf(1), dosls(1), dosmkdir(1), dosrm(1), ioscan(1M) dosif(4).
dosdf(1) dosdf(1) (TO BE OBSOLETED) NAME dosdf - report number of free disk clusters SYNOPSIS dosdf device[:] DESCRIPTION The dosdf command is targeted for removal from HP-UX; see the WARNINGS below. dosdf is the DOS counterpart of the df command (see df(1)). It prints the cluster size in bytes and the number of free clusters on the specified DOS volume. d WARNINGS Use of dosdf is discouraged because it is targeted for removal from HP-UX.
dosls(1) dosls(1) (TO BE OBSOLETED) NAME dosls, dosll - list contents of DOS directories SYNOPSIS dosls [-aAmudl ] device :[ file ] ... dosll [-aAmudl ] device :[ file ] ... DESCRIPTION The dosls and dosll commands are targeted for removal from HP-UX; see the WARNINGS below. dosls is the DOS counterpart of ls (see ls(1)). For each directory named, dosls lists the contents of that directory. For each file named, dosls repeats its name and any other information requested.
dosmkdir(1) dosmkdir(1) (TO BE OBSOLETED) NAME dosmkdir - make a DOS directory SYNOPSIS dosmkdir [-mu ] device :directory ... DESCRIPTION The dosmkdir command is targeted for removal from HP-UX; see the WARNINGS below. dosmkdir is the DOS counterpart of the mkdir command (see mkdir(1)). It creates specified directories. The standard entries, . for the directory itself and .. for its parent, are made automatically.
dosrm(1) dosrm(1) (TO BE OBSOLETED) NAME dosrm, dosrmdir - remove DOS files or directories SYNOPSIS dosrm [-fmriu ] device :file ... dosrmdir [-mu ] device :file ... DESCRIPTION The dosrm and dosrmdir commands are targeted for removal from HP-UX; see the WARNINGS below. dosrm and dosrmdir are DOS counterparts of rm and rmdir (see rm(1) and rmdir(1), respectively). dosrm removes the entries for one or more files from a directory.
du(1) du(1) NAME du - summarize disk usage SYNOPSIS du [-a-s] [-bkrx ] [-t type ] [ name ... ] d DESCRIPTION The du command gives the number of 512-byte blocks allocated for all files and (recursively) directories within each directory and file specified by the name operands. The block count includes the indirect blocks of the file. A file with two or more links is counted only once. If name is missing, the current working directory is used.
echo(1) echo(1) NAME echo - echo (print) arguments SYNOPSIS echo [ arg ] ... DESCRIPTION echo writes its arguments separated by blanks and terminated by a new-line on the standard output.
ed(1) ed(1) NAME ed, red - line-oriented text editor SYNOPSIS ed [-p string] [-s-] [-x] [file] red [-p string] [-s-] [-x] [file] DESCRIPTION The ed command executes a line-oriented text editor. It is most commonly used in scripts and noninteractive editing applications because, even though it can be used interactively, other editors such as vi and ex are typically easier to use in an interactive environment.
ed(1) ed(1) s/s1/s2 s/s1/s2/p g/s1 g/s1/p ?s1 ?s1? Line Addresses To understand line addressing, remember that ed maintains a pointer to the current line. Generally speaking, the current line is the last line affected by a command. The exact effect of a given command on the current line is discussed under the description of each command. Addresses are interpreted according to the following rules: 1. The character . refers to the current line. 2. The character $ refers to the last line of the buffer.
ed(1) (.,. )c text . (.,. )d e file ed(1) The c (change) command deletes the addressed lines then accepts input text to replace the deleted lines. Upon completion, the new current line is the last line in text or, if no text was provided, at the first line after the deleted line or lines. The d (delete) command deletes the addressed lines from the buffer.
ed(1) ed(1) Long lines are folded with the point of folding indicated by writing a backslash character followed by a newline. The end of each line is marked with a $. An l (ell) command can be appended to any command other than e, E, f, q, Q, r, w, or !. The current line number is set to the address of the last line written. Escape Sequence \\ \a \b \f (.,.
ed(1) ed(1) When the character % is the only character in replacement, the replacement used in the most recent substitute command is used as the replacement in the current substitute command. The % loses its special meaning when it is in a replacement string containing more than one character or when preceded by a \. A line can be split by substituting a newline character into it. The newline in replacement must be escaped by preceding it by \.
ed(1) ed(1) If an interrupt signal (ASCII DEL or BREAK) is sent, ed prints a ? and returns to its command level. The following size limitations apply: 256 characters per global command list, 64 characters per file name, and 32 MB characters in the buffer. The limit on the number of lines depends on the amount of user memory: each line takes 1 word. EXTERNAL INFLUENCES Environment Variables SHELL determines the preferred command-line interpreter for use in all !-style commands.
ed(1) ed(1) If the editor input is coming from a command file (e.g., ed file < ed-cmd-file) , the editor exits at the first failure of a command in the command file. When reading a file, ed discards ASCII NUL characters and all characters after the last newline. This can cause unexpected behavior when using regular expressions to search for character sequences containing NUL characters or text near end-of-file. AUTHOR ed was developed by HP and OSF. FILES /tmp/e p ed.
elfdump(1) elfdump(1) (ELF Applications Only) NAME elfdump - dump information contained in object files. SYNOPSIS elfdump [-acCdfghHjkLopqrsStuUvV] [-dc ] [-dl ] [-tx ] [-tv ] [-D num ] [+D num2 ] [+interp ] [+linkmap ] [+linkmap_bss ] [+linkmap_file] [-n name ] [+objdebug ] [+s section ] [-T num ] [+T num2 ] files... DESCRIPTION elfdump takes one or more object files or libraries and dumps information about them.
elfdump(1) elfdump(1) (ELF Applications Only) e -n name (Modifier) Dumps information about the specified section or symbol name. This option is valid with -h, -r , -s, and -t . If used with -t , name pertains to a symbol name and elfdump will only dump the symbol entry whose name matches name. If used with the other options, name pertains to a section name and elfdump will only dump the section whose name matches it.
elfdump(1) elfdump(1) (ELF Applications Only) Texts and Tutorials HP-UX Linker and Libraries Online User Guide (See the +help option) HP-UX Linker and Libraries User’s Guide (See manuals(5) for ordering information) HP-UX Software Transition Toolkit (STK) -- ELF Object Formats http://www.software.hp.
elm(1) elm(1) NAME elm - process electronic mail through a screen-oriented interface SYNOPSIS elm [-aKkmtVz ] [-f folder] elm elm elm elm e [-s subject] address-list -c [alias-list] -h -v DESCRIPTION The elm program is a screen-oriented electronic mail processing system. It supports the industry-wide MIME standard for nontext mail, a special forms message and forms reply mechanism, and an easy-to-use alias system for individuals and groups.
elm(1) elm(1) Set menu=OFF . Do not display the command menus on several Interactive Mode screens. This overrides the setting of the menu boolean variable (see the ELM CONFIGURATION section). -m -s subject -t Subject. Specify the subject for a File Mode or Message Mode message. Set usetite=OFF . Do not use the termcap ti /te and terminfo cup cursorpositioning entries. This overrides the setting of the usetite boolean variable (see the ELM CONFIGURATION section). -V Verbose transmission.
elm(1) elm(1) mail transport agent (MTA) The program that sends and receives mail messages to and from other systems. On HP-UX systems, the MTA is sendmail (see sendmail(1M)). mailcap A file that contains information on how to compose and display mail messages that are not just seven- and eight-bit ASCII characters. metamail A system program that processes nontext mail messages. message In a folder, a sequence of text lines comprised of a message delimiter, a header, and a body.
elm(1) elm(1) When you leave your editor, you enter the Send Menu, as described for Interactive Mode. If you choose the Send Menu s (send) command, the message is sent and the program terminates. If you select the Send Menu f (forget) command, the message is stored in $HOME/Canceled.mail and the program terminates. If you select other commands, the appropriate action occurs. See the EXAMPLES section.
elm(1) elm(1) INTERACTIVE MODE MENUS AND COMMANDS This section begins with the Message Menu, which is the main screen for Interactive Mode. The rest of the menus are presented alphabetically. Message Menu The Message Index is displayed on the Message Menu. You can use the following commands to manipulate and send messages. Some commands use a series of prompts to complete their action. You can use Ctrl-D to cancel their operations. The commands are: e !command Shell Escape.
elm(1) elm(1) c Change folder. This command is used to change the file whose messages are displayed on the Message Menu. You are asked for a file name. The file must be in message format; otherwise, elm aborts. You can use the customary wildcards for your shell, as well as the following special names: ! > < . @alias =filename Your incoming mail folder. Your received folder, defined by the receivedmail string variable. Your sent folder, defined by the sentmail string variable.
elm(1) elm(1) subject string to string Restrict to entries that contain string in the Subject: header. Restrict to entries that contain string in the To: header. You can add limiting criteria by repeating the l command. Ctrl-L Redraw the screen. m Mail. Send mail to one or more addresses. You are prompted for To: recipients, a Subject: and, if the askcc boolean variable is ON, Cc: recipients.
elm(1) elm(1) If you answer n, all undeleted unread messages will be moved to the folder defined by the receivedmail string variable. If the ask boolean variable is OFF , the answers to the questions (which are not displayed) are taken automatically from the values of the alwaysdelete , alwaysstore , and alwayskeep boolean variables, respectively. Q Quick quit. This is equivalent to executing the q command with the ask boolean variable set to OFF . r Reply to the sender of the current message.
elm(1) elm(1) num The ordinal message index number. mmm The month from the last Date: header entry, or from the From message header. d The day from the last Date: header entry, or from the From message header. from Either the sender name from the last From: header entry or from the From message header. lines The number of lines in the message. subject The subject description from the first Subject: header entry, truncated to fit your screen.
elm(1) elm(1) + Tagged. Tagged messages are handled as a group by some commands. See t and other commands in the Message Menu subsection. Blank. The message is not tagged. Built-In Editor When you are composing an outbound message with the builtin built-in editor, it prompts you for text lines with an empty line. Enter a period (.) to end the message and continue with the Send Menu. Built-in editor commands are lines that begin with an escape character, defined by the escape string variable.
elm(1) elm(1) + /pattern Display the next alias index page, when applicable. //pattern Pattern match. Search for pattern through all the fields of the alias list (alias, user name, comment, and address). The search starts at the current alias and wraps around to the beginning of the alias list. The current alias pointer is set to the first alias that matches. Uppercase and lowercase are treated as equivalent. /pattern Pattern match.
elm(1) elm(1) You can add limiting criteria by repeating the l command. Ctrl-L Redraw the screen. m Mail to the current alias or to the set of tagged aliases. The corresponding expanded addresses are placed in the To: header entry, and processing continues as for the Message Menu m (mail) command. The tags are cleared. n Make a user alias. elm prompts for a unique alias name, then for an address. The information provided is added to your individual alias_text file ($HOME/.elm/aliases.
elm(1) elm(1) num The index number of the alias. fullname The full name for the alias, as it will be used in an expanded address. It has the form: firstname lastname firstname The first name, from the alias database. lastname The last name, from the alias database. comment Comment, from the alias database. e type Type of alias. This is Person for an alias with a single address or Group for an alias with two or more addresses. (S) If present, the entry is from the elm system alias database.
elm(1) elm(1) application/octet-stream This is a catch-all for files such as program binary, or files that contain control characters or characters with high-order bits set. application/postscript The file can be displayed with a PostScript-equipped printer or viewer. message/rfc822 This specifies that the file is in message format, as described in the Terminology subsection. image/jpeg , image/gif These are picture formats that require a display program.
elm(1) elm(1) defined as: e num The index number of the attachment. filename The name of the attached file. size The size of the attachment in bytes, computed from the file or the message. type /subtype The type and subtype of the attachment. This value is placed or found in a Content-Type: header. encoding The encoding type. This value is placed or found in a Content-TransferEncoding: header.
elm(1) elm(1) Mail Archive This feature is the ability to specify the message content that needs to be archived (assuming copy is enabled). To indicate the last line of the message to be archived, you need to have either the [nosave] or [no save] key line in the body of your message. The saved mail will not contain the message following the [nosave] or [no save] key line. However, the outgoing mail will contain all the messages except the key line.
elm(1) elm(1) Options Menu The Options Menu is invoked with the Message Menu o command. It displays a list of the options, defined by the configoptions string variable, that you can modify while elm is running. Enter the appropriate letter (in upper- or lowercase) that is followed with a right parenthesis ()) and follow the directions on the screen. The full set of option prompts and the corresponding variables is listed below. The default options are marked with an *.
elm(1) elm(1) s Send. Send the message. FORMS MESSAGES A feature that is unique to elm is the ability to compose and reply to forms messages. Creating a Forms Message • In your elmrc file, set forms=ON . • Set your userlevel numeric variable to 1 (moderately experienced) or 2 (expert). You can do this in your elmrc file or on the default Options Menu.
elm(1) elm(1) headers of all outbound mail. Entries in the elmheaders file should have the following format: header-name : header-string header-name : must not contain blanks. header-string can be continued over several lines by preceding each continuation line with blanks, as indicated by the output below.
elm(1) elm(1) alteditor The name of the editor to use for messages that have initial text (a copied message in a reply, a signature in any outbound message, etc.). when the editor string variable is set to none or builtin . The default is the value of the EDITOR environment variable, if set and nonnull, or /usr/bin/vi otherwise. See also the editor string variable. alternatives A list of other machine and user name combinations that you receive forwarded mail from.
elm(1) elm(1) n o p r s t u v w y z The names boolean variable. * The sentmail string variable. * The print string variable. * The autocopy boolean variable. The sortby string variable. * The easyeditor string variable. The userlevel numeric variable. * The visualeditor string variable. * The askcc boolean variable. The fullname string variable. * The sigdashes boolean variable. displaycharset The name of the character set supported by the display. This is independent of the charset string variable.
elm(1) elm(1) In elm , you can use the = metacharacter to specify this directory. For example, if you save a message to file =/archive , the = is expanded to the current value of maildir . (The slash (/) is optional.) When you start elm , if the directory specified by maildir does not exist, you are asked if you want to create it. If you answer y (yes), the directory is created, with access permissions set to 700 . pager The program to display each message.
elm(1) elm(1) savecharset The character set to be used to save a message in a folder. Possible values are JIS , SJIS , and EUC . If a value is not specified, the message will be saved according to your locale (given by the LC_TYPE and/or LANG environmental variables). This option is applicable only for the Japanese locale. The default is none. See also the jisconversion boolean variable. sentmail The file where copies of outbound mail can be saved.
elm(1) elm(1) There are two special values: *clear-weed-list* Clear the default list. The default headers are removed from the weedout list, allowing you to completely define your own list. *end-of-user-headers* Mark the end of the weedout list, in case any following lines could be mistaken for headers in the list. The default value of weedout is *end-of-user-headers*. The underscore (_) character can be used to specify a space. Note that From weeds out both From and From: .
elm(1) elm(1) 0 Novice user (the default). Command menus are a small verbose subset of the available commands. 1 Moderately experienced user. Command menus are a larger terse subset of the available commands. Outbound message commands allow you to recover previously unsent messages as the text of the current outbound message. 2 Expert. The features are the same as for 1. Level 1 or 2 is required if you want to send a forms message.
elm(1) elm(1) confirmcreate and confirmfolders Operation below. The default is OFF . confirmfiles If ON, you are asked to confirm before messages are appended to an existing file that is not in your mail directory. This does not affect files in your mail directory. If OFF , see confirmappend and confirmfiles Operation below. The default is OFF . confirmfolders If ON, you are asked to confirm before a new file is created in your mail directory. This does not affect files in other directories.
elm(1) e elm(1) keepempty If ON, keep folders from which all the messages are deleted. If OFF , delete empty folders. The default is OFF . keypad If ON, enable the HP 2622 terminal cursor keys. If OFF , disable the cursor keys. If the program is invoked with the -K command line option, keypad is set to OFF . See also the softkeys boolean variable. The default is ON . menu If OFF , this inhibits the menu display on all program screen displays. If ON, the menus are displayed.
elm(1) elm(1) command line option, softkeys is set to OFF . See also the keypad boolean variable. The default is OFF . titles If ON, title a displayed message with a line in the form: Message number /total sendername date time sendername, date, and time are extracted from the message headers in the manner described in Message Index. This is useful if you have suppressed the relevant header entries with the weedout list. If OFF , the message is not titled. The default is ON .
elm(1) elm(1) RFC 1521 defines a number of Content-Types that elm leaves for metamail to handle: text/richtext multipart/alternative multipart/parallel multipart/digest message/partial message/external-body image/jpeg image/gif audio/basic video/mpeg application/octet-stream application/postscript Check the system mailcap file for entries that handle many of them. e EXTERNAL INFLUENCES Environment Variables HOME Your home (login) directory.
elm(1) elm(1) File Mode with a Pipe To mail the output of a command and include a subject line: $ ls -a | elm -s "Directory Listing" j_doe WARNINGS Using two separate mail programs to access the same mail file simultaneously (usually inadvertently from two separate windows) can cause unpredictable results. The length of the subject string (used with the -s command line option) and filenames (used with the -f and -i command line options) is limited to 255 characters.
elmalias(1) elmalias(1) NAME elmalias - display and verify elm user and system aliases SYNOPSIS elmalias [-dersu ] [-a-f format-n-v-V] [alias-name-list] Remarks The former functionality of the elmalias command has been taken over by the newalias command (see newalias(1)). DESCRIPTION The elmalias command displays and verifies user and system elm aliases. The system database must have been created by the newalias command (see newalias(1)).
elmalias(1) elmalias(1) %a %c %l %n %t %v The alias name. The comment field. The lastname field. The fullname value. The alias type: person , group , or unknown . The address-list field. -n -r Change the display to address-list followed by fullname, if any, in parentheses. -s -u -v Use the system alias database only, unless -u is also specified. -V Use a very verbose, multiline output format with the following titles, corresponding to the format codes of the -f option.
elmalias(1) elmalias(1) mom dad father pop parents siblings brother1 my_mother@a.computer (My Mommy) host!otherhost!dad (Dear Father) host!otherhost!dad (Dear Father) host!otherhost!dad (Dear Father) mom,dad,parent@host (The Folks) brother1,brother2,sister (The Kids) bro1@kid.
enable(1) enable(1) NAME enable, disable - enable/disable LP printers SYNOPSIS enable printers disable [-c] [-r[reason] ] printers DESCRIPTION The enable command activates the named printers, enabling them to print requests taken by lp . Use lpstat to find the status of printers (see lp(1) and lpstat(1)). disable deactivates the named printers, disabling them from printing requests taken by lp.
env(1) env(1) NAME env - set environment for command execution SYNOPSIS env [-] [-i] [ name = value ] ... [ command [ arguments ... ] ] DESCRIPTION env obtains the current environment, modifies it according to its arguments, then executes the command with the modified environment. Arguments of the form name =value are merged into the inherited environment before the command is executed.
eucset(1) eucset(1) NAME eucset - set and get code widths for ldterm SYNOPSIS eucset [-p] eucset [ [-c HP15-codeset] or [-c UTF8] or [-c GB18030] or [cswidth] ] DESCRIPTION The eucset command sets or gets (reports) the encoding and display widths of the Extended UNIX Code (EUC), and UCS Transformation Format (UTF8), and GB18030 characters processed by the current input terminal. EUC is an encoding method for codesets composed of single or multiple bytes.
eucset(1) eucset(1) 1:1,0:0,0:0 This default string designates that the environment uses a single byte EUC codeset that has characters in the EUC codeset 1 format. If the environment uses a multibyte EUC codeset in the codeset 1 format, single byte or multibyte EUC codesets in the codeset 2 or 3 format, or both, the default setting cannot be used. EXTERNAL INFLUENCES Environment Variables LANG Provide a default value for the internationalization variables that are unset or null.
ex(1) ex(1) NAME ex, edit - extended line-oriented text editor SYNOPSIS ex [-] [-l] [-r] [-R] [-t tag] [-v] [-wsize] [-x] [-C] [+command] [file ...] XPG4 Synopsis ex [-rR ] [-s -v] [-c command] [-t tag] [-w size] [file ...] Obsolescent Options ex [-rR ] [- -v] [+command] [-t tag] [-w size] [file ...] edit [-] [-l] [-r] [-R] [-t tag] [-v] [-wsize] [-x] [-C] [+command] [file ...] Remarks The program names ex, edit , vi, view , and vedit are separate personalities of the same program.
ex(1) ex(1) -x Set encryption mode. You are prompted for a key to initiate the creation or editing of an encrypted file (see the crypt command in Command Descriptions below). -C Encryption option. Same as the -x option, except that all text read in is assumed to have been encrypted. -c command +command (XPG4 only.) (Obsolescent) Begin editing by executing the specified ex search or positioning command. file Specify the file or files to be edited.
ex(1) ex(1) +n, +[+]... -n, -[-]... /re / ?re ? An offset relative to the current line or the preceding line specification. + means forward; - means backward. For example, the forms .+3 , +3 , and +++ are equivalent. ’x Lines can be marked using single lowercase letters (see the mark command in Command Descriptions below). ’x refers to the line marked with x. In addition, the previous current line is marked before each nonrelative motion.
ex(1) ex(1) The sequence \u (\l ) causes the immediately following character in the replacement to be converted to uppercase (lowercase), if the character is a letter. The sequence \U (\L ) turns case conversion on, until the sequence \E or \e is encountered, or the end of the replacement string is reached. Command Names and Abbreviations The following table summarizes the line-mode commands. The commands whose names are enclosed in parentheses are available only in their abbreviated forms.
ex(1) ex(1) There are also numbered buffers, 1 through 9, which shall be accessible only from visual mode. These buffers are special in that, in the visual mode, when deleted text is placed in the unnamed buffer, it also shall be placed in buffer 1, the previous contents buffer 1 shall be placed in buffer 2 and so on. Any text in the buffer 9 shall be lost. Text that is yanked into the unnamed buffer shall not modify the numbered buffers.
ex(1) ex(1) A copy of the specified lines (range) is placed after the specified destination line; line 0 specifies that the lines are to be placed at the beginning of the work area. (The letter t is an alternative abbreviation for the copy command.) crypt cr[ypt ] X The user is prompted for a key with which to enter encryption mode. This command can also be used to change the key entered from a previous crypt command or the -x command line option.
ex(1) ex(1) terminated by the visual-mode Q command in order to proceed to the next marked line.) The global command itself and the undo command are not allowed in command. The editor options autoprint , autoindent , and report are inhibited. Appending a ! to the global command (that is, g! ...) or using the alternate name v causes command to be run on the lines within range that do not match the pattern. insert line i[nsert ][!] Enter input mode; the input text is placed before the specified line.
ex(1) ex(1) (The # character is an alternative abbreviation for the number command.) Print the lines, each preceded by its line number (the only useful flag is l). The last line printed becomes the current line. open line o[pen ] /re / flags Enter open mode, which is similar to visual mode with a one-line window. All the visual-mode commands are available. If a match is found in line for the optional regular expression, the cursor is placed at the start of the matching pattern.
ex(1) ex(1) current indicator line shall be affected by the editor options, autowrite and writeany . set se[t] [all ] se[t] [no]boolean-option? se[t] value-option[?] se[t] boolean-option se[t] noboolean-option se[t] value-option =value Set and display the values of the editor options (see Editor Options below). With no arguments, the command prints those editor options whose values have been changed from the default settings. If all is specified, it prints all current option values.
ex(1) ex(1) The form s\& repl is equivalent to s/ subs-re /repl /, where subs-re is the previous substitution string. suspend stop su[spend ][!] st[op][!] susp Suspend the editor job and return to the calling shell. stop and susp are equivalent to suspend . susp is the user process control suspend character, which is typically the character ˆZ (ASCII SUB) (see stty(1)). This command is disabled if the calling shell does not support job control or has disabled it.
ex(1) ex(1) If an alternate file is specified and the file exists, the write fails, but can be forced by appending ! to the command. To append to an existing file, append >> to the command. If the file does not exist, an error is reported. If the file is specified as !string, string is interpreted as a system command, the command interpreter is invoked, and the specified lines are passed as standard input to the command. The command wq is equivalent to a w followed by a q.
ex(1) ex(1) If type is specified, it must be one of the following characters: + . ^ = Display a window of lines following the addressed line. Place the addressed line at the bottom of the window of displayed lines. Place the addressed line at the center of the window. Display a window of lines that is two windows prior to the addressed line. Display the addressed line at the center of the window with a line of dashes above and below the addressed line.
ex(1) ex(1) If the specified directory is set from EXINIT or a .exrc file and is not writable by the user, the editor quits; if set interactively by the user, the editor issues an error message. doubleescape When set, two consecutive ESC (escape) characters are required to leave input mode. In input mode, a single ESC character followed by a different character causes vi to issue an audible or visual warning (see the flash editor option) and insert both characters into the work area.
ex(1) ex(1) list Display all printed lines with tabs shown as ˆI , and the end of line marked by a $. Reversed by nolist . The default is nolist . magic Affect the interpretation of characters in regular expressions and substitution replacement strings (see Regular Expressions and Replacement Strings above). Reversed by nomagic . The ex, vi, and view default is magic . The edit and vedit default is nomagic .
ex(1) scroll= n ex(1) The value of n determines the number of lines scrolled by a ˆD command and the number of lines displayed by the z command (twice the value of scroll). The default is half the value of the window option. sections= pair-string The value of this option is a string, in that successive pairs of characters specify the names of text-processing macros that begin sections. See the paragraphs editor option above. The default is sections=NHSHH\ HUuhsh+c.
ex(1) ex(1) timeoutlen option in order to be accepted as a match for the macro name. If not set, no limit is placed on how long to wait for the completion of a macro name. Reversed by notimeout (noto ). The default is timeout . timeoutlen= n Set, in milliseconds (ms), the length of the macro timeout period (see the timeout editor option). This option has no effect unless timeout is set. The value of n must be at least 1. The default is timeoutlen=500 (half a second).
ex(1) ex(1) HOME shall be interpreted as a pathname of a directory that shall be searched for an editor startup file name .exrc . LC_COLLATE determines the collating sequence used in evaluating regular expressions and in processing the tags file. If it is not specified or is null, it defaults to the value of LANG .
ex(1) ex(1) the home directory of the user, any .exrc file shall only be processed once. No .exrc shall be read unless it is owned by the same user ID as the effective user ID of the process. After any .exrc files are processed, any commands specified by the -c option shall be processed. By default, ex shall start in the command mode, which shall be indicated by the ":" prompt. The input mode can be entered by append , insert , or change commands.
expand(1) expand(1) NAME expand, unexpand - expand tabs to spaces, and vice versa SYNOPSIS expand [-t tablist ] [ file ... ] unexpand [-a] [-t tablist ] [ file ... ] Obsolescent: expand [-tabstop ] [-tab1,tab2,... , tabn ] [ file ... ] DESCRIPTION expand processes the named files or the standard input and writes to the standard output with tabs changed into spaces. Backspace characters are preserved in the output, and the column count is decreased by one column for tab calculations.
expand(1) expand(1) STANDARDS CONFORMANCE expand : XPG4, POSIX.2 unexpand : XPG4, POSIX.
expand_alias(1) expand_alias(1) NAME expand_alias - recursively expands the sendmail aliases SYNOPSIS expand_alias [-rmax_recursion] [-t] [-tt ] alias DESCRIPTION Expand_alias is a shell script that recursively expands the sendmail aliases. Through use of telnet host 25 and the expn command, each alias is recursively expanded into its destination(s). Indentation is used to show each level of recursion. Because of the recursive use of telnet , expand_alias is slow.
expr(1) expr(1) NAME expr - evaluate arguments as an expression SYNOPSIS expr arguments DESCRIPTION expr takes arguments as an expression, evaluates, then writes the result on the standard output. Terms in the expression must be separated by blanks. Characters special to the shell must be escaped. Note that 0, rather than the null string, is returned to indicate a zero value. Strings containing blanks or other special characters should be quoted.
expr(1) expr(1) International Code Set Support Single- and multi-byte character code sets are supported. RETURN VALUE As a side effect of expression evaluation, expr returns the following exit values: 0 1 2 >2 Expression is neither null nor zero. Expression is null or zero. Invalid expression. An error occurred while evaluating the expression.
factor(1) factor(1) NAME factor, primes - factor a number, generate large primes SYNOPSIS factor [ number ] primes [ start [ stop ] ] DESCRIPTION If no arguments are provided on the command line, factor waits for a number to be typed in. If a positive number is typed, it factors the number and print its prime factors; each one is printed the proper number of times. It then waits for another number. factor exits if it encounters a zero or any nonnumeric character.
fastbind(1) fastbind(1) NAME fastbind - Prepare an incomplete executable for faster program start-up SYNOPSIS fastbind [-nu] incomplete-executable... DESCRIPTION fastbind is a tool that can improve the start-up time of programs that use shared libraries (incomplete executables) by storing information about needed shared library symbols in the executable file.
fastbind(1) fastbind(1) LC_CTYPE Determines the locale category for character handling functions. NLSPATH Determines the location of message catalogs for the processing of LC_MESSAGES . If any internationalization variable contains an invalid setting, fastbind behaves as if all internationalization variables are set to C. See environ(5). In addition, the following environment variable affects fastbind : TMPDIR Specifies a directory for temporary files (see tmpnam(3S)).
fastmail(1) fastmail(1) NAME fastmail - quick batch mail interface SYNOPSIS fastmail [-b bcc-list] [-c cc-list] [-C comments ] [-f from-name] [-F from-addr] [-i in-reply-to] [-r reply-to] [-R references] [-s subject] filename address-list DESCRIPTION The fastmail command is a simple interface to the mail system that allows you to send a message without the overhead of an interactive mailer. It is particularly efficient in batch-processing mail to very large groups of people.
fastmail(1) fastmail(1) -d \ -F me@anotherhost.com \ -f My Name \ -i "Your recent message" \ -R REF:13579 \ -r oscar \ -s "Testing fastmail" \ message-file \ addr1 addr2 addr3 addr4 The online execution displays the following debug messages: Mailing to addr1,addr2,addr3,addr4 cc1,cc2,cc3,cc4 bcc1,bcc2,bcc 3,bcc4 [via sendmail] cat /tmp/fastmail.
fastmail(1) fastmail(1) FILES /etc/mail/aliases /usr/sbin/sendmail /tmp/fastmail.pid sendmail aliases file. Mail transport agent. Temporary file. AUTHOR fastmail was developed by HP. SEE ALSO elm(1), sendmail(1M).
file(1) file(1) NAME file - determine file type SYNOPSIS file [-m mfile ] [-c ] [-f ffile ] [-h ] file ... DESCRIPTION file performs a series of tests on each file in an attempt to classify it. If file appears to be an ASCII file, file examines the first 512 bytes and tries to guess its language. If file is an executable a.out file, file prints the version stamp, provided it is greater than 0 (see the description of the -V option in ld(1)).
find(1) find(1) NAME find - find files SYNOPSIS find pathname_list [expression] DESCRIPTION The find command recursively descends the directory hierarchy for each path name in pathname_list (that is, one or more path names) seeking files that match a Boolean expression written in the primaries given below. By default, find does not follow symbolic links (see EXTERNAL INFLUENCES section for UNIX95 behavior). The Boolean expression is evaluated using short-circuit evaluation.
find(1) find(1) with the exception that the first character must not be the - operator. When using the symbolic form of mode, the starting template is assumed to have all file mode bits cleared. If the leading minus is omitted, this primary is true when the file permission bits exactly match the value of mode. Bits associated with the symbolic attributes s (set-user-ID, set-group-ID) and t (sticky bit) are ignored when the minus is omitted.
find(1) -newer [tv1[tv2] ] file find(1) True if the indicated time value (tv1) of the current file is newer than the indicated time value (tv2) of file. The time values tv1 and tv2 are each selected from the set of characters: a c m The time the file was last accessed The time the inode of the file was last modified The time the file was last modified If the tv2 character is omitted, it defaults to m. Note that the -newer option is equivalent to -newermm .
find(1) find(1) Primaries can be combined by using the following operators (in order of decreasing precedence): ! expression expression [-a] expression expression -o expression Logical NOT operator. True if expression is not true. Logical AND operator. True if both of the expressions are true. Logical OR operator. True if either or both of the expressions are true. If expression is omitted, or if none of -print , -print0 , -ok , -exec , -cpio , or -ncpio is specified, -print is assumed.
find(1) find(1) As a special case, if aclpatt is the word opt , the primary is true for files with optional access control list entries. EXTERNAL INFLUENCES Environment Variables If UNIX95 is set, find follows symbolic links in pathname_list if the links have trailing slashes. If an internationalization variable is not specified or is null, it defaults to the value of LANG . If LANG is not specified or is null, it defaults to C (see lang(5)).
find(1) find(1) cd /; find . -xdev -print | cpio -pdm /Disk Change permissions on all regular files in a directory subtree to mode 444, and permissions on all directories to 555: find pathname -type f -print | xargs chmod 444 find pathname -type d -print | xargs chmod 555 Note that output from find was piped to xargs(1) instead of using the -exec primary.
findmsg(1) findmsg(1) NAME findmsg, dumpmsg - create message catalog file for modification SYNOPSIS findmsg [-aiv ] [ [-D sym ] [-U sym ]] file ... dumpmsg file ... DESCRIPTION The findmsg command extracts messages from a C program source file and writes them to the standard output in a format suitable for input to gencat (see gencat(1)). The input file will be preprocessed using cpp (see cpp(1)) in order to select print specifiers and handle ifdef , ifndef ... conditional cpp primitives.
findmsg(1) findmsg(1) WARNINGS The findmsg and dumpmsg commands are HP proprietary, not portable to other vendors’ systems, and will not be provided in future HP-UX releases. AUTHOR findmsg and dumpmsg were developed by HP. SEE ALSO findstr(1), gencat(1), insertmsg(1), catgets(3C).
findstr(1) findstr(1) NAME findstr - find strings for inclusion in message catalogs SYNOPSIS findstr file ... DESCRIPTION findstr examines files of C source code for uncommented string constants which it places, along with the surrounding quotes, on the standard output, preceding each by the file name, start position, and length. This information is used by insertmsg (see insertmsg(1)). findstr does not output strings that are parameters of the catgets() routine (see catgets(3C)).
finger(1) finger(1) NAME finger - user information lookup program SYNOPSIS finger [ options ] user_name ... DESCRIPTION By default, finger lists for each user_name on the system: • • • • • • • • • • f Login name, Full given name, Terminal write status (if write permission is denied), Idle time, Login time, User’s home directory and login shell, Any plan the user has placed in file .plan in their home directory, Project on which they are working from the file .
finger(1) finger(1) SEE ALSO chfn(1), who(1), utmpd(1M).
fmt(1) fmt(1) NAME fmt - format text SYNOPSIS fmt [-cs] [-w width] [file...] DESCRIPTION The fmt command is a simple text formatter that fills and joins lines to produce output lines of (up to) the number of characters specified in the -w width option. The default width is 72. fmt concatenates the file arguments. If none are given, fmt formats text from the standard input. Blank lines are preserved in the output, as is the spacing between words. fmt does not fill lines beginning with a period (.
fold(1) fold(1) NAME fold - fold long lines for finite width output device SYNOPSIS fold [-b] [-s] [-w width ] [ file ... ] Obsolete form: fold [-s] [-width ] [ file ... ] DESCRIPTION The fold command is a filter that folds the contents of the specified files, breaking the lines to have a maximum of width column positions (or bytes, if the -b option is specified).
fold(1) fold(1) SEE ALSO expand(1). STANDARDS CONFORMANCE fold : XPG4, POSIX.
footprints(1) footprints(1) NAME footprints - summarize information from compiler footprint records SYNOPSIS /usr/ccs/bin/footprints [-V] [-v] [-w] filename... DESCRIPTION The footprints command scans the named object files, analyzes the compiler footprint records stored in those files, and generates a summary report. This report is intended for use by HP support and lab engineers to assist in problem diagnosis. The report contains the following information: • Total number of compilation units found.
footprints(1) Total size: f footprints(1) 425.8K (text) 24.8K (data) version architecture -O PBO -g debugopt [A.06.11/ANSI C 51] [ipf32 51] [01 1] [02 [off 51] [off 51] [off 51] +Ointeger_overflow +Olit +eh -fpeval -inline -link_type -mt -rodata ... [moderate [const [off [float [1 [dynamic [(off) [cond 51] 51] 51] 51] 1] [2 51] 51] 51] 50] 50] The version line shows that all 51 compilation units were compiled with Version A.06.11 of the ANSI C compiler.
forder(1) forder(1) NAME forder - convert file data order SYNOPSIS forder [-a] [-l] [-n] [ file ... ] DESCRIPTION The text orientation (mode) of a file can be right-to-left (non-Latin) or left-to-right (Latin). This text orientation can affect the way data is arranged in the file. The data arrangements that result are called screen order and keyboard order. forder converts the order of characters in the file from screen order to keyboard order or vice versa.
forder(1) forder(1) SEE ALSO environ(5), strord(3C), nljust(1).
from(1) from(1) NAME from - who is my mail from? SYNOPSIS from [-s sender] [user] DESCRIPTION from prints the mail header lines in your mailbox file to show who sent you mail. If user is specified, user’s mailbox is examined instead of your own. If the -s option is given, only headers of mail from sender are printed. EXAMPLES List header lines for all current mail in your mailbox that was sent by ken .
fruled(1) fruled(1) NAME fruled - flash/turn off attention LEDs (cell, cabinet and I/O chassis attention LEDs) SYNOPSIS fruled -c cell [-c cell]... [-f|-o] [-B] [ [ -u username :[passwd] -h IPaddress|hostname ] | [ -g [passwd] -h IPaddress|hostname ] ] fruled -i I/Ochassis [-i I/Ochassis]... [-f|-o] [-B] [ [ -u username :[passwd] -h IPaddress|hostname ] | [ -g [passwd] -h IPaddress|hostname ] ] fruled -b cabinet [-b cabinet]...
fruled(1) fruled(1) instead allow the command to prompt for the password. Note: Specifying passwd on the command line will not be supported in future releases. -h IPaddress|hostname This option should only be used in combination with either the -u or -g option. IPaddress|hostname specifies the IP address or hostname of the target partition (-u ) or complex (-g). -g [passwd ] Allows access to the complex specified by the -h option. The accessed complex is then considered the target complex.
fruled(1) fruled(1) No LED associated with specified object. 2 EXAMPLES Flash the attention LED of the cell located in cabinet 0 slot 4 and also flash the attention LED of the cabinet in which it is contained. fruled -o -B -c 0/4 Turn off the attention LEDs of 2 cells located in cabinet 0, slot 4 and cabinet 0, slot 6. fruled -f -c 0/4 -c 0/6 WARNINGS HP-UX 11i Version 2 is the last HP-UX release on which passing passwd for the -u and -g options is supported.
ftio(1) ftio(1) NAME ftio - faster tape I/O SYNOPSIS ftio -o-O [achpvxAELM ] [-B blksize] [-D type] [-e extarg] [-K comment ] [-L filelist] [-N datefile] [-S script] [-T tty] [-Z nobufs] tapedev [pathnames] [-F ignorenames] ftio -i-I [cdfmptuvxAEMPR] [-B blksize] [-S script] [-T tty] [-Z nobufs] tapedev [patterns] ftio -g [v] tapedev [patterns] DESCRIPTION ftio is a tool designed specifically for copying files to tape drives.
ftio(1) ftio(1) the files are those of the previous -o operation. -I Extract (copy into the file system) files in the same way as for ftio -icdmv , when no modifiers are used with the -I . However, if the .ftiorc file exists in the user’s home directory, ftio opens this file, and scans for lines preceded by I= . Options defined on matching lines are passed to ftio as if they had been specified on the command line. See EXAMPLES section. -g Read the file list in tapedev.
ftio(1) ftio(1) -Z nobufs Specify the number of blksize chunks of memory to use as buffer space between the two processes, where blksize is the size of blocks written to the tape. More chunks is usually better, but a point is reached where no improvement is gained, and performance might deteriorate as buffer space is swapped out of main memory. A default value of 16 is set for nobufs, but using 32 or 64 might improve performance if your system is not heavily loaded.
ftio(1) ftio(1) cpio Compatibility ftio uses the same archive format as cpio . However, by default ftio creates tape headers and uses a tape block size of 16KB. cpio by default uses 512-byte blocks. When used with the -B option, cpio uses 5120 byte blocks. To achieve full compatibility with cpio in either input or output mode, the user should specify the M modifier. ftio -oM creates a single- or multi-tape archive that has no tape headers, and, by default, the same block size as cpio -[oi]B.
ftio(1) ftio(1) ftio operates using System V shared memory and semaphores. The resources committed to these functions are not freed automatically by the system when the process terminates. ftio does this only when it terminates normally, or when it terminates after receiving one the following signals: SIGHUP , SIGINT , SIGTERM . Any other signal is handled in the default manner described by signal(2). Note that the behavior for SIGKILL is to terminate the process without delay.
ftp(1) ftp(1) NAME ftp - file transfer program SYNOPSIS ftp [-g] [-i] [-n] [-c] [-v] [-p] [-P] [-l] [-B size] [ server-host ] DESCRIPTION ftp is a user interface to the File Transfer Protocol. ftp copies files over a network connection between the local ‘‘client’’ host and a remote ‘‘server’’ host. ftp runs on the client host. Options The ftp command supports the following options: -g Disable file name ‘‘globbing’’; see the glob command, below.
ftp(1) ftp(1) COMMANDS ftp supports the following commands. Command arguments with embedded spaces must be enclosed in quotes (for example, "argument with embedded spaces"). ![ command [ args ] ] Invoke a shell on the local host. The SHELL environment variable specifies which shell program to invoke. ftp invokes /usr/bin/sh if SHELL is undefined. If command is specified, the shell executes it and returns to ftp . Otherwise, an interactive shell is invoked. When the shell terminates, it returns to ftp .
ftp(1) ftp(1) longaddr Toggle the use of the LPRT/LPSV commands for data connection in the IPv6 environment. By default, the EPRT/EPSV commands are used in the IPv6 environment. In the IPv4 environment PORT/PASV commands are used. form format Set the file transfer form to format. The only supported format is non-print get remote-file [ local-file ] Copy remote-file to local-file.
ftp(1) ftp(1) mls remote-files local-file Write an abbreviated listing of remote-files to local-file. If globbing is enabled, globbing metacharacters are expanded. If interactive prompting is on, ftp prompts the user to verify that the last argument is indeed the target local file for mls output. mode [ mode-name ] Set the FTP file transfer mode to mode-name. The only supported mode is stream . modtime remote-file Show the last modification time of remote-file.
ftp(1) ftp(1) prompt Toggle interactive prompting. By default, ftp prompts the user for a yes or no response for each output file during multiple-file commands. If interactive prompting is disabled, ftp performs the command for all specified files. proxy ftp-command Execute an ftp command on a secondary control connection. This command allows simultaneous connection to two remote FTP servers for transferring files between the two servers.
ftp(1) ftp(1) send local-file [ remote-file ] A synonym for put . sendport Toggle the use of PORT commands. By default, ftp attempts to use a PORT command when establishing a connection for each data transfer. If the PORT command fails, ftp uses the default data port. When the use of PORT commands is disabled, ftp makes no attempt to use PORT commands for each data transfer. This is useful for certain FTP implementations that ignore PORT commands but (incorrectly) indicate that they’ve been accepted.
ftp(1) ftp(1) the remote server, including violations of the FTP protocol. If the delay results from unexpected remote server behavior, the local ftp program must be killed manually. File Naming Conventions Files specified as arguments to ftp commands are processed according to the following rules. • If the file name - is specified, ftp uses the standard input (for reading) or standard output (for writing).
ftpcount(1) ftpcount(1) NAME ftpcount - show current number of users for each class SYNOPSIS /usr/bin/ftpcount [-V] DESCRIPTION The ftpcount command shows the current number of users (and the limit) for each class defined in the ftpaccess file. If the ftpaccess file does not exist, the ftpcount command will not display anything. However, if the ftpaccess file exists and it is of zero bytes, ftpcount will display an error message: ftpcount:no service classes defined, no usage count kept.
ftprestart(1) ftprestart(1) NAME ftprestart - remove the shutdown message file created by ftpshut SYNOPSIS /usr/bin/ftprestart [-V] DESCRIPTION The ftprestart command removes all the shutdown message files from the real, anonymous, and virtual user accounts. The message files are created by the ftpshut utility in the path as specified by the shutdown directive in the /etc/ftpd/ftpaccess file (see ftpshut(1) for more details). This command is always used after the ftpshut command is executed.
ftpshut(1) ftpshut(1) NAME ftpshut - create shutdown message file to shut down the ftp servers at a given time SYNOPSIS /usr/bin/ftpshut [-V] [-l min] [-d min] time [warning-message] DESCRIPTION The ftpshut command provides an automated shutdown procedure that a superuser can use to notify ftp users when the ftp server is shutting down.
ftpshut(1) ftpshut(1) AUTHOR ftpshut was developed by the Washington University, St. Louis, Missouri. SEE ALSO ftprestart(1), ftpaccess(4).
ftpwho(1) ftpwho(1) NAME ftpwho - show current process information for each ftp user. SYNOPSIS /usr/bin/ftpwho [-V] DESCRIPTION The ftpwho command shows the current process information for each user logged into the ftp server. If the ftpaccess file does not exist, this command will not display anything. However, if the ftpaccess file exists and it is of zero bytes then this command will display an error message: ftpwho: no service classes defined, no usage count kept.
gcore(1) gcore(1) NAME gcore - get core images of running processes SYNOPSIS gcore [-o filename] process-id... DESCRIPTION The gcore command creates a core image of each specified process. By default, the name of the core image file for process-id is core. process-id. The process information in the core file can be obtained by using debuggers. When the gcore command creates a core image of each specified process, the process is temporarily stopped.
gcore(1) gcore(1) gcore -o /tmp/testgcore 1030 WARNINGS The behavior of gcore is not defined if a non-regular file with the identical name and directory path as the core image is created while gcore is executing. FILES core. process-id Core image file for process-id. AUTHOR gcore was developed by Chris Bertin at Hewlett-Packard. SEE ALSO adb(1), gdb(1), kill(1), ttrace(2), a.out(4), core(4).
gencat(1) gencat(1) NAME gencat - generate a formatted message catalog file SYNOPSIS gencat [-l] catfile msgfile ... DESCRIPTION Message catalogs allow a program to process input and produce output according to local customs and languages. For details, see Native Language Support Users Guide. The gencat command merges each message source msgfile into a formatted message catalog catfile that can be accessed by catgets() (see catgets(3C)). If catfile does not exist, it is created.
gencat(1) $ comment gencat(1) A $ followed by a space or tab is treated as a comment and can appear anywhere in a file. A line consisting of zero or more spaces or tabs is treated as a comment line. NL_TEXTMAX , NL_SETMAX , and NL_MSGMAX are defined in . NL_SETD is defined in . MAX_BUFLEN is defined in . EXTERNAL INFLUENCES Environment Variables LANG provides a default value for the internationalization variables that are unset or null.
genxlt(1) genxlt(1) NAME genxlt - generate iconv translation tables SYNOPSIS genxlt [ -f output_filename ] [ input_filename ] DESCRIPTION genxlt generates a compiled, non-readable binary version of the iconv table that is suitable for use by iconv(1) and iconv(3C). If input_filename or output_filename is not supplied, standard input and/or standard output will be used.
genxlt(1) genxlt(1) This is an example of the input_file: #What: CodesetA to CodesetB: version 1.0 #Galley: 0xffff # the conversion data is as follows: 0x01 0x01 0x02 0x42 ... 0xff87 0x4567 ... etc. WARNINGS Because genxlt will write over the existing table, it is wise to save the existing table into another file before using genxlt . Warnings are not given for incorrect data in the input_file. You must have super-user privileges to install files in /usr/lib/nls/iconv/tables.
get(1) get(1) NAME get - get a version of an SCCS file SYNOPSIS get [-r SID] [-c cutoff] [-e] [-b] [-i list] [-x list] [-k] [-l[p] ] [-p] [-s] [-m] [-n] [-g] [-t] [-w string] [-a seq-number] file ... DESCRIPTION The get command generates an ASCII text file from each named SCCS file according to the specifications given by its option arguments, which begin with -. The arguments can be specified in any order, but all option arguments apply to all named SCCS files.
get(1) get(1) SID, the SCCS Identification of a delta, can be in any form shown in the "SID Specified" column of Table 1. Partial SIDs are interpreted as shown in the "SID Retrieved" column of Table 1. See WARNINGS. -xlist A list of deltas to be excluded (forced not to be applied) in the creation of the generated file. See the -i option for the list format. -k Suppresses replacement of identification keywords (see below) in the retrieved text by their value. The -k option is implied by the -e option.
get(1) get(1) Table 1. Determination of SCCS Identification String SID* − b Option Specified Used % g Other Conditions SID Retrieved SID of Delta to be Created none %% none %% no yes R defaults to mR R defaults to mR mR.mL mR.mL mR.(mL+1) mR.mL.(mB+1).1 R R R R R no no yes yes - mR.mL mR.mL mR.mL mR.mL hR.mL** R.1*** mR.(mL+1) mR.mL.(mB+1).1 mR.mL.(mB+1).1 hR.mL.(mB+1).1 R - R > mR R = mR R > mR R = mR R < mR and R does not exist Trunk succ.# in release > R and R exists R.mL R.mL.(mB+1).
get(1) get(1) %R% %L% %B% %S% %D% %H% %T% %E% %G% %U% %Y% %F% %P% %Q% %C% Release. %Z% %W% The 4-character string @(#) recognizable by what (see what(1)). %A% Another shorthand notation for constructing what(1) strings for non-HP-UX system program files. Level. Branch. Sequence. Current date (YY/MM/DD). Current date (MM/DD/YY). Current time (HH:MM:SS). Date newest applied delta was created (YY/MM/DD). Date newest applied delta was created (MM/DD/YY). Time newest applied delta was created (HH:MM:SS).
get(1) get(1) files are named by replacing the leading s with the tag. The g-file is an exception to this scheme: the g-file is named by removing the s. prefix. For example, s.xyz.c , the auxiliary file names would be xyz.c , l.xyz.c , p.xyz.c , and z.xyz.c , respectively. The g-file, which contains the generated text, is created in the current directory (unless the -p option is used). A g-file is created in all cases, whether or not any lines of text were generated by the get .
getaccess(1) getaccess(1) NAME getaccess - list access rights to file(s) SYNOPSIS getaccess [-u user ] [-g user ] group [, group ] ... ] [-n] file ... getaccess -r [-n] file ... DESCRIPTION getaccess lists for the specified files the effective access rights of the caller (that is, for their effective user ID, effective group ID, and supplementary groups list).
getaccess(1) 2 getaccess(1) A file is nonexistent or unreachable (by the caller). getaccess prints an appropriate message to standard error, continues, then returns a value of 2 upon completion. EXAMPLES The following command prints the caller’s access rights to file1 using the file’s group ID instead of the caller’s effective group ID and groups list.
getacl(1) getacl(1) NAME getacl - list access control lists (ACLs) for files (JFS File Systems only) SYNOPSIS /usr/bin/getacl [-ad ] file... DESCRIPTION For each argument that is a regular file, special file, or named pipe, getacl displays the owner, group, and the Access Control List (ACL). For each directory argument, getacl displays the owner, group, and the ACL and/or the default ACL. Only directories contain default ACLs.
getacl(1) getacl(1) In order to indicate that the file group class permission bits restrict an ACL entry, getacl will display, after each affected entry, text in the form #effective: perm, where perm will show only the permissions actually granted.
getacl(1) getacl(1) NOTICES The output from getacl will be in the correct format for input to the setacl command. If the output from getacl is redirected to a file, the file may be used as input to setacl . In this way, a user may easily assign one file’s ACL to another file. FILES /etc/passwd /etc/group for user IDs for group IDs SEE ALSO acl(2), aclsort(3C), chmod(1), ls(1), setacl(1).
getconf(1) getconf(1) NAME getconf - get system configuration values SYNOPSIS getconf [-v specification ] system_var getconf [-v specification ] system_var pathname DESCRIPTION The getconf command provides an interface to the confstr(3C), pathconf(2), and sysconf(2) library routines and system calls. The system_var argument specifies the configuration value desired in confstr() , pathconf() , or sysconf() .
getconf(1) getconf(1) getconf gives the following output: 1 If the implementation supports multiple locality domains. undefined If the implementation doesn’t support multiple locality domains.
getconf(1) POSIX_CHOWN_RESTRICTED getconf(1) POSIX_NO_TRUNC POSIX_VDISABLE Note For a complete list of parameters supported by getconf , look into the manual pages of sysconf() , pathconf() , and confstr() . AUTHOR getconf was developed by HP and POSIX. SEE ALSO pathconf(2), sysconf(2), confstr(3C). STANDARDS CONFORMANCE getconf : POSIX.
getopt(1) getopt(1) NAME getopt - parse command options SYNOPSIS getopt optstring args DESCRIPTION getopt is used to break up options in command lines for easy parsing by shell procedures and to check for legal options. optstring is a string of recognized option letters (see getopt(3C)). If a letter is followed by a colon, the option is expected to have an argument, which may or may not be separated from it by whitespace. The positional parameters ($1, $2, ...
getopt(1) getopt(1) done This code accepts any of the following as equivalent: cmd cmd cmd cmd -aoarg file file -a -o arg file file -oarg -a file file -a -oarg -- file file WARNINGS getopt option arguments must not be null strings nor contain embedded blanks. SEE ALSO getopts(1), sh(1), getopt(3C).
getopts(1) getopts(1) NAME getopts - parse utility (command) options SYNOPSIS getopts optstring name [ arg ... ] DESCRIPTION getopts is used to retrieve options and option-arguments from a list of parameters. Each time it is invoked, getopts places the value of the next option in the shell variable specified by the name operand and the index of the next argument to be processed in the shell variable OPTIND . Whenever the shell is invoked, OPTIND is initialized to 1.
getopts(1) getopts(1) getopts by default parses positional parameters passed to the invoking shell procedures. If args are given, they are parsed instead of the positional parameters. EXTERNAL INFLUENCES Environment Variable The following environment variable affects the execution of the getopts utility: OPTIND Used by getopts as the index of the next argument to be processed.
getopts(1) getopts(1) SEE ALSO getopt(1), ksh(1), sh-posix(1), sh(1), getopt(3C). STANDARDS CONFORMANCE getopts : XPG4, POSIX.
getprivgrp(1) getprivgrp(1) NAME getprivgrp - get special attributes for group SYNOPSIS getprivgrp [-g group_name ] DESCRIPTION getprivgrp lists the access privileges of privileged groups set by setprivgrp (see setprivgrp (1M)). If group_name is supplied, access privileges are listed for that group only. If the caller is not a member of group_name, no information is displayed. If -g is used, getprivgrp lists access privileges that have been granted to all groups.
gprof(1) gprof(1) NAME gprof - display call graph profile data SYNOPSIS gprof [ options ] [ a.out [ gmon.out ... ] ] DESCRIPTION The gprof command produces an execution profile of C++, C and FORTRAN programs. The effect of called routines is incorporated into the profile of each caller. Profile data is taken from the call graph profile file (gmon.out default) that is created by programs compiled with the -G option of aCC , cc , and f90 .
gprof(1) gprof(1) or mcrt0.o . This turns on profiling of a.out , which is not compatible with profiling of shared libraries. You can either profile your executable or a shared library, but not both. Set LD_PROFILE to the exact string with which you call shl_load . If the library is implicitly loaded, LD_PROFILE must match the path encoded in the a.out . You can find this value by running the ldd command on the executable.
gprof(1) gprof(1) EXAMPLES To profile a.out and libtest.so on Itanium-based systems: $ cat > test.c void a() { printf("I in a\n"); } $ cc -c +Z -G test.c $ ld -b -o libtest.so.1 test.o $ ln -s ./libtest.so.1 libtest.so $ cat > main.c extern void a(); main() { printf("Hello world\n"); a(); } g $ cc -G main.c -L. -ltest $ export LD_PROFILE=a.out:libtest.so $ export LD_PROFILEBUCKET_SIZE=16 $ ./a.out hello world I in a $ unset LD_PROFILE $ unset LD_PROFILEBUCKET_SIZE $ ls gmon.out gmon.
gprof(1) gprof(1) Parents that are not profiled have the time of their profiled children propagated to them, but they appear to be spontaneously invoked in the call graph listing, and do not have their time propagated further. Similarly, signal catchers, even though profiled, appear to be spontaneous (although for more obscure reasons).
grep(1) grep(1) NAME grep, egrep, fgrep - search a file for a pattern SYNOPSIS Plain call with pattern grep [-E -F] [-c-l-q] [-bhinsvwx ] pattern [ file ... ] Call with (multiple) − e pattern grep [-E -F] [-c-l-q] [-bhinsvwx ] -e pattern ... [-e pattern ] ... [ file ... ] Call with − f file grep [-E -F] [-c-l-q] [-bhinsvwx ] [-f pattern_ file ] [ file ... ] Obsolescent: egrep [-cefilnsv ] [ expression ] [ file ... ] fgrep [-cefilnsvx ] [ strings ] [ file ...
grep(1) grep(1) -q (Quiet) Do not write anything to the standard output, regardless of matching lines. Exit with zero status upon finding the first matching line. Overrides any options that would produce output. -s -v -w Error messages produced for nonexistent or unreadable files are suppressed. -x (eXact) Matches are recognized only when the entire input line matches the fixed string or regular expression. All lines but those matching are printed.
grep(1) Ken Judy Ann grep(1) 112 Warring St. Apt. A 387 Bowditch Apt. 12 429 Sixth St. the command: grep Judy address prints: Judy 387 Bowditch Apt.
groups(1) groups(1) NAME groups - show group memberships SYNOPSIS groups [-p] [-g] [-l] [ user ] DESCRIPTION groups shows the groups to which the caller or the optionally specified user belong. If invoked with no arguments, groups prints the current access list returned by getgroups() (see getgroups(2)). Each user belongs to a group specified in the password file /etc/passwd and possibly to other groups as specified in the files /etc/group and /etc/logingroup.
head(1) head(1) NAME head - give first few lines SYNOPSIS head [-c-l] [-n count ] [ file ... ] Obsolescent: head [-count ] [ file ... ] DESCRIPTION head prints on standard output the first count lines of each of the specified files, or of the standard input. If count is omitted it defaults to 10. If multiple files are specified, head outputs before each file a line of this form: ==> file <== Options -c -count The quantity of output is measured in bytes.
host(1) host(1) NAME host - DNS lookup utility SYNOPSIS host [-aCdlnrTwv ] [-c class] [-N ndots] [-R number] [-t type] [-W wait] name server DESCRIPTION host is a simple utility for performing DNS lookups. It is normally used to convert names to IP addresses and vice versa. When no arguments or options are given, host prints a short summary of its command line arguments and options. Arguments name server h This is the domain name that is to be looked up.
host(1) host(1) automatically selects an appropriate query type. By default it looks for A records, but if the C option was given, queries will be made for SOA records; and if name is a dotted-decimal IPv4 address or colon-delimited IPv6 address, host will query for PTR records. W wait The time to wait for a reply can be controlled through the W option. This option makes host wait for wait seconds. If wait is less than 1, the wait interval is set to one second.
hostname(1) hostname(1) NAME hostname - set or display name of current host system SYNOPSIS hostname [name_of_host ] DESCRIPTION The hostname command displays the name of the current host, as given in the gethostname() system call (see gethostname(2)). Users who have appropriate privileges can set the hostname by giving the argument name_of_host ; this is usually done in the startup script /sbin/init.d/hostname.
hp(1) hp(1) NAME hp - handle special functions of HP 2640 and HP 2621-series terminals SYNOPSIS hp [-e] [-m] DESCRIPTION hp supports special functions of the Hewlett-Packard HP 2640 and HP 2621 series of terminals, with the primary purpose of producing accurate representations of most nroff output. A typical use is: nroff -h files ... | hp Regardless of the hardware options on a given terminal, hp tries to do sensible things with underlining and reverse line-feeds.
hyphen(1) hyphen(1) NAME hyphen - find hyphenated words SYNOPSIS hyphen [ files ] DESCRIPTION hyphen finds all the hyphenated words ending lines in files and prints them on the standard output. If no arguments are given, the standard input is used; thus, hyphen can be used as a filter. EXAMPLES Prepare an nroff hyphenation proofreading file for textfile. mm textfile | hyphen WARNINGS hyphen cannot cope with hyphenated italics (i.e., underlined) words; it often misses them completely or mangles them.
iconv(1) iconv(1) NAME iconv - character code set conversion SYNOPSIS iconv -f fromcode -t tocode [file]... DESCRIPTION iconv converts the encoding of characters in the input files from the fromcode code set to the tocode code set, and writes the results on standard output. If no input files are given, iconv reads from standard input. If - appears as an input file name, iconv reads standard input at that point. -- can be used to delimit the end of options (see getopt(3C)).
iconv(1) iconv(1) AUTHOR iconv was developed by HP. SEE ALSO getopt(3C), iconv(3C).
id(1) id(1) NAME id - print user and group IDs and names SYNOPSIS id [-u] [-nr ] [user] id [-g] [-nr ] [user] id [-G] [-n] [user] id [-P] DESCRIPTION The id command writes a message to standard output, giving the user and group IDs and names for the process. If the effective and real IDs are different, both are printed. If the process has supplementary group affiliations (see groups(1)), the supplementary group affiliations are also written.
id(1) id(1) To display the group name for the current process: id -gn produces: users To display the user and group data for another user: id ralford produces: uid=329(ralford) gid=20(users) To display the PRM group ID for the current process: id -P produces: uid=329(ralford) gid=20(users) prmid=1(OTHERS) i DEPENDENCIES HP Process Resource Manager The -P option requires that the optional HP Process Resource Manager (PRM) software be installed and configured.
ident(1) ident(1) NAME ident - identify files in RCS SYNOPSIS ident file ... DESCRIPTION ident searches the named files for all occurrences of the pattern $keyword :...$, where keyword is one of the following: Author Date Header Locker Log Revision Source State These patterns are normally inserted automatically by the RCS co command, but can also be inserted manually (see co(1)). ident works on text files as well as object files. For example, if the C program in file f.
idlookup(1) idlookup(1) NAME idlookup - identify the user of a particular TCP connection SYNOPSIS idlookup host-or-ip-number local-port foreign-port DESCRIPTION idlookup can be used to identify the user at the remote end of a TCP connection, assuming the host at the other end is running an Identification Server. host-or-ip-number is the name of the host at the other end of the connection, or its IP address.
ied(1) ied(1) NAME ied - input editor and command history for interactive programs SYNOPSIS ied [-dirt ] [-h file] [-k charmap] [-p prompt] [-s size] utility [arguments]... DESCRIPTION The ied utility command is intended to act as an interface between the user and an interactive program such as bc, bs, or a shell, providing most of the line editing and history functionality found in the Korn shell.
ied(1) ied(1) \t \b tab backspace \v vertical tab Three- and four-character sequences must be \nn or \nnn, giving the octal value for the character. If charmap is less than 256 lines long, the remaining characters are mapped to themselves. i -p prompt Many commands do not prompt when ready for input. ied approximates a prompting mechanism for such commands. This is not always perfectly successful, but for many commands it helps.
ied(1) ied(1) ESC ,*,= @ (File name expansion). Not supported. Macro expansion. Not supported. Note however that ksh has a rarely-used function _ that substitutes words from the previous line (this is not the macro $_ , but rather an editor command). If a preceding count is given, it uses the countth word of the last line. This is much more useful with ied . In emacs /gmacs mode: M-* , M-= , M-ESC (file name expansion) Not supported. Note that the command M-.
insertmsg(1) insertmsg(1) NAME insertmsg - use findstr output to insert calls to catgets() SYNOPSIS insertmsg [-h] [-iamount] [-nnumber] [-snumber] stringlist DESCRIPTION insertmsg examines the file stringlist, which is assumed to be the output of findstr after subsequent editing to remove any strings that do not need to be localized (see findstr(1)).
insertmsg(1) insertmsg(1) The insertmsg command is HP proprietary, not portable to other vendors’ systems, and will not be provided in future HP-UX releases. AUTHOR insertmsg was developed by HP. SEE ALSO findstr(1), gencat(1), catgets(3C), catopen(3C).
iostat(1) iostat(1) NAME iostat - report I/O statistics SYNOPSIS iostat [-t] [ interval [ count ] ] DESCRIPTION iostat iteratively reports I/O statistics for each active disk on the system. Disk data is arranged in a four-column format: Column Heading Interpretation device Device name bps Kilobytes transferred per second sps Number of seeks per second msps Milliseconds per average seek If two or more disks are present, data is presented on successive lines for each disk.
iostat(1) iostat(1) AUTHOR iostat was developed by the University of California, Berkeley, and HP. FILES /usr/include/sys/param.h SEE ALSO vmstat(1).
ipcrm(1) ipcrm(1) NAME ipcrm - remove a message queue, semaphore set, or shared memory identifier SYNOPSIS ipcrm [option]... DESCRIPTION The ipcrm command removes one or more specified message queue, semaphore set, or shared memory identifiers. Options The identifiers are specified by the following options: -m shmid Remove the shared memory identifier shmid from the system. The shared memory segment and data structure associated with it are destroyed after the last detach.
ipcs(1) ipcs(1) NAME ipcs - report status of interprocess communication facilities SYNOPSIS ipcs [-mqs ] [-abcopt ] [-C core] [-N namelist] DESCRIPTION ipcs displays certain information about active interprocess communication facilities. With no options, ipcs displays information in short format for the message queues, shared memory segments, and semaphores that are currently active in the system. Options The following options restrict the display to the corresponding facilities.
ipcs(1) ipcs(1) R S D C - A process is waiting on a msgrcv() . A process is waiting on a msgsnd() . The associated shared memory segment has been removed. It will disappear when the last process attached to the segment detaches it. The associated shared memory segment is to be cleared when the first attach is executed. The corresponding special flag is not set. The next 9 characters are interpreted as three sets of three characters each.
ipcs(1) ipcs(1) FILES /dev/kmem /etc/group /etc/passwd /stand/vmunix Kernel virtual memory Group names User names System namelist SEE ALSO msgop(2), semop(2), shmop(2).
join(1) join(1) NAME join - relational database operator SYNOPSIS join [ options ] file1 file2 DESCRIPTION join forms, on the standard output, a join of the two relations specified by the lines of file1 and file2. If file1 or file2 is -, the standard input is used. file1 and file2 must be sorted in increasing collating sequence (see Environment Variables below) on the fields on which they are to be joined; normally the first in each line.
join(1) join(1) EXAMPLES The following command line joins the password file and the group file, matching on the numeric group ID, and outputting the login name, the group name, and the login directory. It is assumed that the files have been sorted in the collating sequence defined by the LC_COLLATE or LANG environment variable on the group ID fields. join -1 4 -2 3 -o 1.1 2.1 1.
kdestroy(1) kdestroy(1) NAME kdestroy - destroy Kerberos tickets SYNOPSIS kdestroy [-q] [-c cache_filename] DESCRIPTION The kdestroy utility destroys the user’s active Kerberos authorization tickets by writing zeros to the specified credentials cache that contains them. If the credentials cache is not specified, the default credentials cache is destroyed. Options -q Run quietly. Normally kdestroy beeps if it fails to destroy the user’s tickets. The -q flag suppresses this behavior.
kermit(1) kermit(1) (HP-UX C-Kermit) NAME kermit - C-Kermit 8.0 communications software for serial and network connections: modem dialing, file transfer and management, terminal connection, character-set translation, numeric and alpha paging, and script programming. SYNOPSIS kermit [ command-file ] [ options ...
kermit(1) kermit(1) (HP-UX C-Kermit) portable to many and diverse platforms. STARTING C-KERMIT You can start C-Kermit by typing /usr/bin/kermit, or just kermit if your PATH includes /usr/bin , possibly followed by command-line options. If there are no "action options" on the command line (explained below), C-Kermit starts in interactive command mode; you will see a greeting message and then the "C-Kermit>" prompt.
kermit(1) kermit(1) (HP-UX C-Kermit) error-correcting modems with hardware flow control). If you experience file transfer failures, use the CAUTIOUS or ROBUST commands to choose more conservative (and therefore slower) protocol settings. For fine tuning of performance, you can choose specific packet lengths, window sizes, and control-character prefixing strategies as explained in Chapter 12 of the manual, Using C-Kermit.
kermit(1) kermit(1) (HP-UX C-Kermit) \ b (or B) l (or L) n (or N) a decimal digit {} anything else: the backslash character itself the BREAK signal (OUTPUT command only) a Long BREAK signal (OUTPUT only) a NUL (0) character (OUTPUT only) a 1-, 2-, or 3-digit decimal number, such as \27 used for grouping, e.g. \{27}123 following character taken literally. Note that numbers turn into the character with that binary code (0-255), so you can use \7 for a bell, \13 for carriage return, \10 for linefeed.
kermit(1) kermit(1) (HP-UX C-Kermit) * HANGUP EIGHTBIT PAD PING REDIAL LOG CONNECTIONS REDIRECT PIPE SET CARRIER * SET DIAL * SET FLOW * SET HOST * SET LINE SET PORT * SET MODEM TYPE * SET NETWORK SET TCP SET TELNET SET X.
kermit(1) kermit(1) (HP-UX C-Kermit) MAIL RESEND PSEND * RECEIVE *R *S GET MGET REGET G FAST CAUTIOUS ROBUST SET ATTRIB * SET BLOCK SET BUFFERS SET PREFIX SET DELAY SET DESTINATION * SET FILE * SET RECEIVE SET REPEAT SET RETRY SET SEND SET HANDSHAKE SET LANGUAGE PATTERNS SET SESSION-LOG SET TRANSFER SET TRANSMIT SET UNKNOWN * SET WINDOW SHOW ATTRIB SHOW CONTROL * SHOW FILE SHOW PROTOCOL SHOW LANGUAGE SHOW TRANSMIT * STATISTICS TRANSMIT XMIT k SEND Command switches /AS-NAME: /AFTER: /BEFORE: /BINARY /COM
kermit(1) kermit(1) (HP-UX C-Kermit) /QUIET /RECOVER /RECURSIVE /RENAME-TO: /SMALLER-THAN: /STARTING-AT: /SUBJECT: /TEXT Don’t display file-transfer progress. Recover interrupted transfer from point of failure. Send a directory tree. Rename files as specified after successfully sending. Send files smaller than given size. Send file starting at given byte number. Subject for SEND /MAIL. Send in text mode. GET and RECEIVE Command switches /AS-NAME: Store incoming file under given name.
kermit(1) kermit(1) (HP-UX C-Kermit) REMOTE ASSIGN REMOTE CD REMOTE COPY REMOTE DELETE REMOTE DIR REMOTE EXIT REMOTE HELP REMOTE HOST REMOTE KERMIT REMOTE LOGIN REMOTE LOGOUT REMOTE MKDIR REMOTE PRINT REMOTE PWD REMOTE QUERY REMOTE RENAME REMOTE RMDIR REMOTE SET REMOTE SPACE REMOTE TYPE REMOTE WHO SERVER SET SERVER SHOW SERVER k Script programming ASK ASKQ ASSERT ASSIGN CLEAR CLOSE DECLARE DECREMENT DEFINE DO ECHO ELSE END EVALUATE FAIL FOPEN FREAD FWRITE FSEEK FCLOSE FOR FORWARD GETC GETOK GOTO IF INCR
kermit(1) kermit(1) (HP-UX C-Kermit) READ REINPUT RETURN SCREEN SCRIPT SET ALARM SET CASE SET COMMAND SET COUNT SET INPUT SET MACRO SET TAKE SHIFT SHOW ARGUMENTS SHOW ARRAYS SHOW COUNT SHOW FUNCTIONS SHOW GLOBALS SHOW MACROS SHOW SCRIPTS SHOW VARIABLES SLEEP SORT STATUS STOP SUCCEED SWITCH TAKE UNDEFINE WAIT WHILE WRITE WRITE-LINE WRITELN XECHO XIF Read a line from a local file into a variable. Reexamine text previously received from another computer. Return from a user-defined function.
kermit(1) kermit(1) (HP-UX C-Kermit) \v(d$cc) \v(d$ip) \v(d$lc) \v(d$px) \v(date) \v(day) \v(dialcount) \v(dialnumber) \v(dialresult) \v(dialstatus) \v(dialsuffix) \v(dialtype) \v(directory) \v(download) \v(editor) \v(editfile) \v(editopts) \v(errno) \v(errstring) \v(escape) \v(evaluate) \v(exitstatus) \v(filename) \v(filenumber) \v(filespec) \v(fsize) \v(ftype) \v(herald) \v(home) \v(host) \v(hwparity) \v(input) \v(inchar) \v(incount) \v(inidir) \v(inmatch) \v(instatus) \v(intime) \v(inwait) \v(ipaddress
kermit(1) kermit(1) (HP-UX C-Kermit) \v(ntime) \v(osname) \v(osrelease) \v(osversion) \v(packetlen) \v(parity) \v(pexitstat) \v(pid) \v(platform) \v(program) \v(protocol) \v(p_8bit) \v(p_ctl) \v(p_rpt) \v(query) \v(return) \v(rows) \v(sendlist) \v(serial) \v(speed) \v(startup) \v(status) \v(sysid) \v(system) \v(terminal) \v(test) \v(textdir) \v(tfsize) \v(time) \v(tmpdir) \v(trigger) \v(ttyfd) \v(ty_xx) \v(userid) \v(version) \v(window) \v(xferstatus) \v(xfermsg) \v(xfer_xxx) \v(xprogram) \v(xversion) Cu
kermit(1) kermit(1) (HP-UX C-Kermit) Actions -s files -s -r -k -x -O -f -g files -G files -a name -c -n k Settings -l line -l n -j host -J host -l n -X -Z -o n -u -q -I -8 -0 -i -T -P -b bps -m name -p x -t -e n -v n -L -Q -w -D n -V Other -y name -Y -R -d -S -C "cmds" -z -B -h = -- send files send files from stdin receive files receive files to stdout enter server mode like -x but exits after one transaction finish remote server get remote files from server (quote wildcards) like -g but sends file to
kermit(1) kermit(1) (HP-UX C-Kermit) sends file oofa.bin in binary mode (-i) using a window size of 4 (-v 4). Local-mode example (C-Kermit makes the connection): kermit -l /dev/tty0p0 -b 19200 -c -r -n makes a 19200-bps direct connection out through /dev/tty0p0, CONNECTs (-c ) so you can log in and, presumably start a remote Kermit program and tell it to send a file, then it RECEIVEs the file (-r ), then it CONNECTs back (-n) so you can finish up and log out.
kermit(1) kermit(1) (HP-UX C-Kermit) Kermit News, Issues 4 (1990) and 5 (1993), Columbia University, for detailed discussions of Kermit file transfer performance. DIAGNOSTICS The diagnostics produced by C-Kermit itself are intended to be self-explanatory. In addition, every command returns a SUCCESS or FAILURE status that can be tested by IF FAILURE or IF SUCCESS. In addition, the program itself returns an exit status code of 0 upon successful operation or nonzero if any of various operations failed.
keylogin(1) keylogin(1) NAME keylogin - decrypt and store secret key with keyserv SYNOPSIS /usr/bin/keylogin [ -r ] DESCRIPTION The keylogin command prompts for a password, and uses it to decrypt the user’s secret key. The key may be found in the /etc/publickey file (see publickey(4)) or the NIS map ‘‘publickey.byname’’ or the NIS+ table ‘‘cred.org_dir’’ in the user’s home domain. The sources and their lookup order are specified in the /etc/nsswitch.conf file (see nsswitch.conf(4)).
keylogout(1) keylogout(1) NAME keylogout - delete stored secret key with keyserv SYNOPSIS /usr/bin/keylogout [ -f ] DESCRIPTION keylogout deletes the key stored by the key server process keyserv(1M). Further access to the key is revoked; however, current session keys may remain valid until they expire or are refreshed. Deleting the keys stored by keyserv will cause any background jobs or scheduled at(1) jobs that need secure RPC services to fail.
keysh(1) keysh(1) NAME keysh - context-sensitive softkey shell SYNOPSIS keysh DESCRIPTION keysh is an extension of the standard Korn-shell (for a description of the basic Korn-shell functionality, see ksh(1)). keysh uses hierarchical softkey menus and context-sensitive help to aid users in building command-lines, combining the power of the Korn-shell with the ease-of-use of a menu system. And keysh is entirely data-driven, allowing its menus and help to be easily extended as needed.
keysh(1) keysh(1) Translate any softkey commands in the current command-line and then edit the result. Delete the character under the cursor. Toggle between insert and overwrite modes. Recall the previous/next command from the history buffer. Move the cursor left/right. Move the cursor to the beginning/end of the command-line.
keysh(1) keysh(1) USING KEYSH WITH TERMINAL SESSION MANAGER When operating under the Terminal Session Manager (see tsm(1)), keysh displays the tsm softkeys instead of the backup softkeys. If desired, this interaction can be overridden by setting the $KEYTSM environment variable (see Environment Variables below). When operating under tsm , keysh also automatically displays the tsm window number in the statusline.
keysh(1) selectors keysh(1) Enable or disable the use of keyboard selectors. When enabled, keysh displays an upper-case selector character in each softkey label. Typing the unquoted (upper-case) character selects the softkey just as if its corresponding function key had been pressed. Quoting the selector character in any way restores its traditional meaning. Selector keys are intended to be used on terminals that do not support a sufficient number of softkeys.
keysh(1) keysh(1) EXAMPLES To add the od (see od(1)) softkey to the end of the top-level softkey menu and label it Octal_dump , kc softkey add od with_label Octal_dump To add the paste(1) softkey to the beginning of the top-level softkey menu and label it Paste , kc softkey add paste and_place as_first_softkey To add the custom emacs softkey from the file ˜rpt/.
keysh(1) keysh(1) KEYKSH If set, specifies that keysh should mimic the behavior of the Korn-shell as closely as possible. No softkeys or status-line are displayed. This mode is particularly useful over slow modem lines. KEYLOC If set, specifies that keysh should leave the terminal keypad in local mode while commands are being entered. This mimics the behavior of the Korn-shell. KEYPS1 If set, specifies that keysh should not reset the initial values of $PS1 , $PS2 , and $PS3 .
keysh(1) keysh(1) write (to rewrite the file with the current configuration). keysh assumes that HP-UX commands are not heavily aliased; otherwise unexpected command translations may occur. keysh neglects the effects of the Korn-shell expansion mechanisms when counting command-line parameters, causing it to occasionally underestimate the true number of parameters specified. The * emacs-mode or vi-mode editing command can often be used to pre-expand these parameters.
kill(1) kill(1) NAME kill - send a signal to a process; terminate a process SYNOPSIS kill [-s signame] pid ... kill [-s signum] pid ... kill -l Obsolescent Versions: kill -signame pid ... kill -signum pid ... DESCRIPTION The kill command sends a signal to each process specified by a pid process identifier. The default signal is SIGTERM , which normally terminates processes that do not trap or ignore the signal.
kill(1) kill(1) 15 24 25 26 SIGTERM SIGSTOP SIGTSTP SIGCONT Terminate Stop Terminal stop Continue Terminate; can be trapped Pause the process; cannot be trapped Pause the process; can be trapped Run a stopped process SIGNULL (0), the null signal, invokes error checking but no signal is actually sent. This can be used to test the validity or existence of pid.
kinit(1) kinit(1) NAME kinit - obtain and cache the Kerberos ticket-granting ticket SYNOPSIS kinit [-l life_time] [-s start_time ] [-v] [-p] [-f] [-k [-t keytab_filename]] [-r renewable_life] [-R] [-c cache_filename] [-S service-name ] [principal] DESCRIPTION kinit obtains and caches an initial ticket-granting ticket for the principal. Options -l life_time Requests a ticket with the lifetime value defined in life_time.
kinit(1) principal kinit(1) Uses the principal name from an existing cache if there is one. kinit supports the [appdefaults] section. The relationships specified here can be over-ridden by the command-line options. The following relationships are supported by kinit in the [appdefaults] section: forwardable This relationship specifies if an user can obtain a forwardable ticket. Valid values with which it can be set are: true , false , yes , y, no , n, on , off .
klist(1) klist(1) NAME klist - list cached Kerberos tickets SYNOPSIS klist [-e] [[-c] [-f] [-s] [cache_filename]] [-k [-t] [-K] [keytab_filename]] DESCRIPTION klist lists the Kerberos principal and Kerberos tickets held in a credentials cache, or the keys held in a keytab file. Options -e Displays the encryption types of the session key and the ticket for each credential in the credential cache, or each key in the keytab file. -c -f List tickets held in a credentials cache.
kpasswd(1) kpasswd(1) NAME kpasswd - change a user’s Kerberos password SYNOPSIS kpasswd [principal] DESCRIPTION The kpasswd command is used to change a Kerberos principal’s password. kpasswd prompts for the current Kerberos password, which is used to obtain a changepw ticket from the KDC (Key Distribution Center) for the user’s Kerberos realm. If kpasswd successfully obtains the changepw ticket, the user is prompted twice for the new password, and the password is changed.
ksh(1) ksh(1) NAME ksh, rksh - shell, the standard/restricted command programming language SYNOPSIS ksh [-aefhikmnoprstuvx] [+aefhikmnoprstuvx] [-o option]... [+o option]... [-c string] [arg]... rksh [-aefhikmnoprstuvx] [+aefhikmnoprstuvx] [-o option]... [+o option]... [-c string] [arg]... DESCRIPTION ksh is a command programming language that executes commands read from a terminal or a file.
ksh(1) ksh(1) for identifier [ in word ... ] do list done Each time for is executed, identifier is set to the next word taken from the in word list. If in word ... is omitted, for executes the do list once for each positional parameter set (see Parameter Substitution below). Execution ends when there are no more words in the list. select identifier [ in word... ] do list done A select command prints on standard error (file descriptor 2), the set of words, each preceded by a number. If in word ...
ksh(1) ksh(1) command in the replaced text, other than any that are in the process of being replaced, is tested for additional aliases. If the last character of the alias value is a blank, the word following the alias is also checked for alias substitution. Aliases can be used to redefine special built-in commands, but cannot be used to redefine the keywords listed above. Aliases can be created, listed, and exported with the alias command and can be removed with the unalias command.
ksh(1) ksh(1) of all subscripts must be in the range of 0 through 1023 . Arrays need not be declared. Any reference to a named parameter with a valid subscript is legal and an array is created if necessary. Referencing an array without a subscript is equivalent to referencing the first element. The value of a named parameter can also be assigned by writing: name =value [name=value]... If the -i integer attribute is set for name, the value is subject to arithmetic evaluation as described below.
ksh(1) ksh(1) The following parameters are set automatically by the shell: # ? $ _ ! COLUMNS ERRNO LINENO LINES OLDPWD OPTARG OPTIND PPID PWD RANDOM k REPLY SECONDS The number of positional parameters in decimal. Options supplied to the shell on invocation or by the set command. The decimal value returned by the last executed command. The process number of this shell. Initially, the value of _ is an absolute pathname of the shell or script being executed as passed in the environment.
ksh(1) ksh(1) MAIL MAILCHECK MAILPATH PATH PS1 PS2 PS3 PS4 SHELL TMOUT VISUAL If this parameter is set to the name of a mail file and the MAILPATH parameter is not set, the shell informs the user of arrival of mail in the specified file. This variable specifies how often (in seconds) the shell checks for changes in the modification time of any of the files specified by the MAILPATH or MAIL parameters. The default value is 600 seconds.
ksh(1) ksh(1) $@ have identical meanings when not quoted or when used as a parameter assignment value or as a file name. However, when used as a command argument, "$*" is equivalent to "$1 d $2 d... ", where d is the first character of the IFS parameter, whereas "$@" is equivalent to "$1" "$2" ... . Inside back single quote (accent grave) marks (‘.. ‘), \ quotes the characters \, ‘, and $. If the back single quotes occur within double quotes, \ also quotes the character ".
ksh(1) ksh(1) file1 -ot file2 file1 -ef file2 string = pattern string != pattern string1 < string2 string1 > exp1 -eq exp1 -ne exp1 -lt exp1 -gt exp1 -le exp1 -ge string2 exp2 exp2 exp2 exp2 exp2 exp2 True True True True True ters. True True True True True True True if file1 exists and is older than file2. if file1 and file2 exist and refer to the same file. if string matches pattern. if string does not match pattern.
ksh(1) ksh(1) Redirection order is significant because the shell evaluates redirections referencing file descriptors in terms of the currently open file associated with the specified file descriptor at the time of evaluation. For example: ... 1>fname 2>&1 first assigns file descriptor 1 (standard output) to file fname, then assigns file descriptor 2 (standard error) to the file assigned to file descriptor 1; i.e., fname. On the other hand, if the order of redirection is reversed as follows: ...
ksh(1) ksh(1) used within a function defines local variables whose scope includes the current function and all functions it calls. The special command return is used to return from function calls. Errors within functions return control to the caller. Function identifiers can be listed with the +f option of the typeset special command. Function identifiers and the associated text of the functions can be listed with the -f option when used interactively.
ksh(1) ksh(1) value of the last command executed. A function is executed in the current shell process. If a command name is not a special command or a user-defined function, ksh creates a process and attempts to execute the command using exec (see exec(2)). The shell parameter PATH defines the search path for the directory containing the command. Alternative directory names are separated by a colon (:). The default path is /usr/bin: (specifying /usr/bin and the current directory in that order).
ksh(1) ksh(1) the last command executed. It is not necessary that the execute permission bit be set for file. %% alias [ -tx ] [ name[=value ] ... ] alias with no arguments prints the list of aliases in the form name =value on standard output. An alias is defined for each name whose value is given. A trailing space in value causes the next word to be checked for alias substitution. The -t option is used to set and list tracked aliases.
ksh(1) ksh(1) fc -e - [old=new] [command] In the first form, a range of commands from first to last is selected from the last HISTSIZE commands typed at the terminal. The arguments first and last can be specified as a number or string. A given string is used to locate the most recent command. A negative number is used to offset the current command number. The -l option causes the commands to be listed on standard output.
ksh(1) ksh(1) - $PWD .) The -L option (default) preserves the logical meaning of the current directory and -P preserves the physical meaning of the current directory if it is a symbolic link. See the special cd command, cd(1), ln(1)), and pwd(1). read [ -prsu [ n ] ] [ name ] [?prompt ] [ name ... ] The shell input mechanism. One line is read and broken up into words using the characters in IFS as separators. In -r raw mode, \ at the end of a line does not signify line continuation.
ksh(1) ksh(1) monitor noclobber noexec noglob nolog nounset privileged verbose trackall vi viraw xtrace Disables processing of the $HOME/.profile file and uses the file /etc/suid_profile instead of the ENV file. This mode is on whenever the -p effective uid (gid) is not equal to the real uid (gid). Turning this off causes the effective uid and gid to be set to the real uid and gid. Sort the positional parameters. Exit after reading and executing one command.
ksh(1) ksh(1) %% typeset [±LRZfilrtux [n]] [name[ = value]] ... Parameter assignments remain in effect after the command completes. When invoked inside a function, a new instance of the parameter name is created. The parameter value and type are restored when the function completes. The following list of attributes can be specified: -L Left justify and remove leading blanks from value. If n is nonzero, it defines the width of the field.
ksh(1) ksh(1) -f List or set the number of 512-byte blocks in files written by child processes (files of any size can be read). -s List or set the number of kilobytes in the size of the stack area. -t List or set the number of seconds to be used by each process. umask [ mask ] The user file-creation mask is set to mask (see umask(2)). mask can either be an octal number or a symbolic value as described in chmod(1).
ksh(1) ksh(1) When a command to be executed is found to be a shell procedure, rksh invokes ksh to execute it. Thus, the end-user is provided with shell procedures accessible to the full power of the standard shell, while being restricted to a limited menu of commands. This scheme assumes that the end-user does not have write and execute permissions in the same directory.
ksh(1) eof M-d M-ˆH M-h M-ˆ? ˆT ˆC M-c M-l ˆK ˆW M-p kill ˆY ˆL @ M-space ˆJ ˆM ˆP k ˆN M-< M-> ˆRstring ˆO M-digits M-letter M-. M-_ M-* M-ESC M-= ˆU \ ˆV M-# 488 ksh(1) End-of-file character, normally ˆD , terminates the shell if the current line is null. Delete current word. (Meta-backspace) Delete previous word. Delete previous word. (Meta-DEL) Delete previous word. If interrupt character is ˆ? (DEL, the default) this command does not work.
ksh(1) ksh(1) Vi Editing Mode There are two typing modes. Entering a command puts you into input mode. To edit, the user enters control mode by pressing ESC and moves the cursor to the point needing correction, then inserts or deletes characters or words. Most control commands accept an optional repeat count prior to the command.
ksh(1) ksh(1) n N Search for next match of the last pattern to / or ? commands. Search for next match of the last pattern to / or ?, but in reverse direction. Search history for the string entered by the previous / command. Text Modification Edit Commands These commands modify the line. a A [count]cmotion c[count]motion Append text to the end of the line. Equivalent to $a .
ksh(1) ksh(1) U Undo all the text modifying commands performed on the line. [count]v Returns the command fc -e ${VISUAL:-${EDITOR:-vi}} count in the input buffer. If count is omitted, the current line is used. ^L ^J ^M # Line feed and print current line. Has effect only in control mode. = @letter (New line) Execute the current line, regardless of mode. (Return) Execute the current line, regardless of mode. Equivalent to I# followed by Return.
ksh(1) ksh(1) The built-in command . file reads the entire file before any commands are executed. Therefore, alias and unalias commands in the file do not apply to any functions defined in the file. Traps are not processed while the shell is waiting for a foreground job. Thus, a trap on CHLD is not executed until the foreground job terminates. The export built-in command does not handle arrays properly. Only the first element of an array is exported to the environment.
ktutil(1) ktutil(1) NAME ktutil - Kerberos keytab file maintenance utility SYNOPSIS ktutil DESCRIPTION The ktutil command invokes a subshell from which an administrator can read, write, or edit entries in a Kerberos V5 keytab or V4 srvtab file. ktutil Commands list read_kt keytab_filename Display the current key list. Alias: l read_st srvtab_filename Read the Kerberos V4 srvtab file, srvtab_filename, into the current key list.
kvno(1) kvno(1) NAME kvno - print key version numbers of Kerberos principals SYNOPSIS kvno [-e etype] service1, [service2, ...] DESCRIPTION kvno acquires a service ticket for the specified Kerberos principals and prints out the key version numbers of each principal. Options -e etype Specifies the encryption type which will be requested for the session key of all the services named on the command line. This is useful in certain backward compatibility situations.
last(1) last(1) NAME last, lastb - indicate last logins of users and ttys SYNOPSIS /usr/bin/last [ -R ] [ -number ] [ -x] [ -X] [ -f file ] [ name ... ] [ tty ... ] /usr/bin/lastb [ -R ] [ -number ] [ -x] [ -X] [ -f file ] [ name ... ] [ tty ... ] DESCRIPTION The last command searches backwards through the file /var/adm/wtmps (which contains a record of all logins and logouts) for information about a user, a tty, or any group of users and ttys. Arguments specify names of users or ttys of interest.
lastcomm(1) lastcomm(1) NAME lastcomm - show last commands executed in reverse order SYNOPSIS lastcomm [commandname] ... [username] ... [terminalname] ... DESCRIPTION lastcomm gives information on previously executed commands. If no arguments are specified, lastcomm prints information about all the commands recorded in the accounting file, /var/adm/pacct during the current accounting file’s lifetime.
ld(1) ld(1) NAME ld - link editor SYNOPSIS Remarks For Itanium-based systems, see ld_ia(1). For PA-RISC systems, see ld_pa(1). Use the uname command to determine your system type. uname -m returns ia64 on Itanium-based systems. All other values represent PA-RISC systems. SEE ALSO ld_ia(1), ld_pa(1), uname(1).
ld_ia(1) Integrity Systems Only ld_ia(1) NAME ld_ia: ld - link editor for Integrity systems l SYNOPSIS The link editor ld [-bdmnqrstvwxzEGINOPQSTVZ] [-a search] [-c filename] [-dynamic ] [-e epsym] [-emit_relocs ] [-h symbol]... [-k filename] [-lx file]... [-l: library] [-m] [-nbucket ] [bucketsizetype] [-noshared ] [-noshared_dynamic] [-o outfile] [-symbolic symbol]... [-u symbol]... [-y symbol]... [-A name] [-B bind]... [-C n] [-D offset] [-Fl ] [-Fw ] [-Fz ] [-G] [-L dir]...
ld_ia(1) ld_ia(1) Integrity Systems Only You should include crt0.o in a -noshared link. For 32-bit mode: the dynamic loader is found at /usr/lib/hpux32/dld.so. For 64-bit mode: the dynamic loader is found at /usr/lib/hpux64/dld.so. The dynamic loader attaches each required library to the process and resolves all symbolic references between the program and its libraries. NOTE: For information on linking secure programs with shared libraries, see the Security Restrictions section below.
ld_ia(1) ld_ia(1) Integrity Systems Only -emit_relocs Preserve compiler generated relocation sections in output file -h symbol Prior to writing the symbol table to the output file, mark this name as "local" so that it is no longer externally visible. This ensures that this particular entry will not clash with a definition in another file during future processing by ld . If used when building a shared library or program, this option prevents the named symbol from being visible to the dynamic loader.
ld_ia(1) -o outfile -q -r -s ld_ia(1) Integrity Systems Only Produce an output object file named outfile (a.out if -o outfile is not specified). This option is ignored. Retain relocation information in the output file for subsequent re-linking. The ld command does not report undefined symbols. This option cannot be used when building a shared library (-b ) or in conjunction with the -s , -x , or the +ild incremental linking options.
ld_ia(1) Integrity Systems Only ld_ia(1) deferred Bind addresses on first reference rather than at program start-up time. This is the default. group Mark the shared library so that it behaves as if loaded with RTLD_GROUP flag to dlopen() . This does not affect the dependent shared libraries. immediate Bind addresses of all symbols immediately upon loading the library.
ld_ia(1) ld_ia(1) Integrity Systems Only -E Mark all symbols defined by a program for export to shared libraries. In a +compat mode link, ld marks only those symbols that are actually referenced by a shared library seen at link time. In a +std link, all symbols are exported by default, so -E is not necessary to make symbols visible. However, it has an additional side effect of identifying all exported symbols as necessary, so that they will not be removed when using dead code elimination (+Oprocelim ).
ld_ia(1) Integrity Systems Only ld_ia(1) -PF filename Indicate to the linker to use the specified file for the link order file instead of generating it using /usr/ccs/bin/fdp. This option is incompatible with the +ild option. -Q -R offset -S -T -V -Z This option is ignored. Set (in hexadecimal) the starting address of the text (i.e., code) segment. This option is useful with kernel and embedded applications. The default address for 64-bit mode is 0x4000000000000000 and for 32-mode is 0x04000000.
ld_ia(1) Integrity Systems Only ld_ia(1) +[no]defaultrpath +defaultrpath is the default. Include any paths that are specified with -L in the embedded path, unless you specify the +b option. If you use +b , only the path list specified by +b is in the embedded path. The +nodefaultrpath option removes all library paths that were specified with the -L option from the embedded path. The linker searches the library paths specified by the -L option at link time.
ld_ia(1) Integrity Systems Only ld_ia(1) the HP-UX Linker and Libraries User’s Guide for more information. +fini function_name Specify the terminator function to be invoked in forward order, the order the functions appear left to right on the command line. You can specify more than one terminator function on the command line with multiple option-symbol pairs, that is, each function you specify must be preceded by the +fini option. +[no]forceload The default is +noforceload .
ld_ia(1) ld_ia(1) Integrity Systems Only • -D offset , -R offset Set the origin for the data and text segments. If you change the offset after the initial incremental link, the linker performs an initial incremental link automatically. • -k mapfile Provide a non-default mapfile. The user specified mapfile specifications are permitted with the +ild option. But you should not modify the mapfile after the initial incremental link.
ld_ia(1) Integrity Systems Only ld_ia(1) Libraries satisfying one or more of the following conditions are ineligible for lazy loading: • is a filter library • is accessed via a data reference from another module • is accessed via an indirect function call The linker will silently convert such libraries into +nolazyload libraries. Dependent libraries of +lazyload shared libraries will not be processed during link time, unless they are explicitly specified on the link line.
ld_ia(1) Integrity Systems Only ld_ia(1) the linker to copy the debug information over to the output file and negate the effect of the +objdebug compiler option. See also +nocopyobjdebug. +noprocelim_sym symbol [+noprocelim_sym symbol]... Do not remove symbol when using dead code elimination (+Oprocelim ). This option can be used for hidden symbols as well as exported symbols.
ld_ia(1) Integrity Systems Only ld_ia(1) +padtext pagesize Pads the text segment to a multiple of pagesize with zeros. This can improve page allocation, thus reduce TLB misses by allowing the kernel to allocate fewer, larger data pages. Use of this option increases your output file size. +pd size Request a particular virtual memory page size that should be used for data. Sizes of 4K, 16K , 64K , 256K , 1M, 4M, 16M , 64M , 256M , D, and L are supported.
ld_ia(1) ld_ia(1) Integrity Systems Only +v[no]shlibunsats Enable [disable] printing a list of unsatisfied symbols used by shared libraries. The default behavior in shared library build is +vnoshlibunsats, and the default in executable build is +vshlibunsats. Some unsatisfied symbols reported by the linker are not required at run time because the modules which reference the symbols are not used. +vtype type Produces verbose output about the link operation.
ld_ia(1) Integrity Systems Only ld_ia(1) +O[no]procelim Enable [disable] the elimination of procedures and data that are not referenced by the application. The default is +Onoprocelim . Procedure and data elimination can occur at any optimization level, including level 0. The elimination occurs on a per section basis; the section is removed only if all procedures/data in the section are unreferenced. For more details use the +help option or see the HP-UX Linker and Libraries User’s Guide manual.
ld_ia(1) ld_ia(1) Integrity Systems Only The linker performs the following different modes of linking: • normal link: the default operation mode in which the linker links all modules. • initial incremental link: the mode entered when you request an incremental link, but the output module created by the incremental linker does not exist, or it exists but the incremental linker is unable to perform an incremental update.
ld_ia(1) Integrity Systems Only ld_ia(1) Performance Performance of the incremental linker may suffer greatly if you change a high percentage of object files. The incremental linker may not link small programs much faster, and the relative increase in size of the executable is greater than that for larger programs. Do not use the incremental linker to create final production modules.
ld_ia(1) ld_ia(1) Integrity Systems Only Determines the values for all locale categories and has precedence over LANG and other LC_* environment variables. LC_ALL LC_MESSAGES Determines the locale that should be used to affect the format and contents of diagnostic messages written to standard error. LC_NUMERIC LC_CTYPE NLSPATH Determines the locale category for numeric formatting. Determines the locale category for character handling functions.
ld_ia(1) Integrity Systems Only ld_ia(1) chatr a.out ... shared library list: $ORIGIN/libc.so WARNINGS ld recognizes several names as having special meanings. The symbol _end is reserved by the linker to refer to the first address beyond the end of the program’s address space. Similarly, the symbol _edata refers to the first address beyond the initialized data, and the symbol _etext refers to the first address beyond the program text.
ld_ia(1) ld_ia(1) Integrity Systems Only /usr/lib/hpux64/dld.so /usr/ccs/lib/hpux32/crt0.o /usr/ccs/lib/hpux64/crt0.o /usr/lib/hpux32/milli.a /usr/lib/hpux64/milli.a /usr/lib/hpux64/millikern.a 64-bit dynamic loader 32-bit run-time startup file 64-bit run-time startup file 32-bit millicode library automatically searched by ld 64-bit millicode library automatically searched by ld 64-bit millicode library automatically searched by ld for embedded systems /usr/lib/nls/msg/$LANG/ld.
ld_ia(1) Integrity Systems Only ld_ia(1) STANDARDS CONFORMANCE ld: SVID2, SVID3, XPG2, XPG4 l 518 Hewlett-Packard Company − 21 − HP-UX 11i Version 2: December 2007 Update
ld_pa(1) ld_pa(1) PA-RISC Systems Only NAME ld_pa: ld - link editor for PA-RISC systems SYNOPSIS Common Options ld [-bdmnqrstvxzEGIOPQTVZ] [-a search] [-c filename] [-dynamic ] [-e epsym] [-h symbol]... [-lx file]... [-l: library] [-noshared ] [-o outfile] [-u symbol]... [-y symbol]... [-B bind] [-D offset] [-Fl lib] [-L dir]... [-R offset] [-Pd ] [-PD file] [-PF file] [+afs func_sym_x=func_sym_y]...
ld_pa(1) PA-RISC Systems Only ld_pa(1) uses shared libraries. Identical copies of crt0.o can be found in either /usr/ccs/lib/crt0.o or /opt/langtools/lib/crt0.o. For 64-bit mode, the dynamic loader is /usr/lib/pa20_64/dld.sl and is invoked by exec for those programs that use shared libraries. crt0.o is not required in shared bound links. The dynamic loader attaches each required library to the process and resolves all symbolic references between the program and its libraries.
ld_pa(1) ld_pa(1) PA-RISC Systems Only -e epsym Set the default entry point address for the output file to be that of the symbol epsym. (This option only applies to executable files.) -h symbol Prior to writing the symbol table to the output file, mark this name as "local" so that it is no longer externally visible. This ensures that this particular entry will not clash with a definition in another file during future processing by ld .
ld_pa(1) PA-RISC Systems Only ld_pa(1) with the -r option. This option is incompatible with the +ild option. The incremental linking requires the parts of the output load module which are stripped out with the -x option. NOTE: Use of -x might affect the use of a debugger or profiler. -y symbol Indicate each file in which symbol appears. More than one symbol can be specified, but each must be preceded by -y . -z Arrange for run-time dereferencing of null pointers to produce a SIGSEGV signal.
ld_pa(1) ld_pa(1) PA-RISC Systems Only internally if possible. By default, unresolved symbols are resolved to the most visible definition in the library or outside the library. NOTE: Do not use this option while building aC++ shared libraries on Integrity systems. Use the aC++ option -B protected_def. verbose Display verbose messages when binding symbols. This is the default except when -B nonfatal is specified. In that case, -B verbose must be explicitly specified to get verbose messages.
ld_pa(1) PA-RISC Systems Only ld_pa(1) -T In 32-bit mode, save the load data and relocation information in temporary files instead of in memory during linking. This option reduces the virtual memory requirements of the linker. If the TMPDIR environment variable is set, the temporary files are created in the specified directory, rather than in /var/tmp . -V -Z Output a message giving information about the version of ld being used. In 64-bit mode, this option is equivalent to the +nommap option.
ld_pa(1) +compat PA-RISC Systems Only ld_pa(1) This option is ignored for 32-bit links. This option turns on compatibility mode in the linker — 64-bit links mimic behavior of 32-bit links). +copyobjdebug Copy objdebug space. +df file Used together with the -P option, this option specifies that file should be used as the profile database file. The default value is flow.data . See the discussion of the FLOW_DATA environment variable for more information.
ld_pa(1) PA-RISC Systems Only ld_pa(1) You can set the value using chatr +gstsize size file. +h internal_name When building a shared library, record internal_name as the name of the library. When the library is used to link another executable file (program or shared library), this internal_name is recorded in the library list of the resulting output file instead of the file system pathname of the input shared library.
ld_pa(1) ld_pa(1) PA-RISC Systems Only This increases run-time performance by allowing the kernel to use larger size page table entries. +mmap Enables the feature to use mmap for writing the output data. This is the default behavior. Linker enabled with mmap is much faster. +n Causes the linker to load all object modules before searching any archive or shared libraries. Then it searches the archive and shared libraries specified on the command line in left to right order.
ld_pa(1) PA-RISC Systems Only ld_pa(1) the dynamic loader determine the current directory of the parent module (shared library or executable) and replaces $ORIGIN for that directory name. Example: $ ld -dynamic main.o +origin libx.sl -L /usr/lib/ -lc While the +origin option is available, the recommended way to specify $ORIGIN is in the embedded path with the +b option, for example, $ ld -dynamic main.
ld_pa(1) ld_pa(1) PA-RISC Systems Only The +FP option supports the following modes (upper case flag enables; lower case flag disables): V (v) Z (z) O (o) U (u) I (i) D (d) RU RD RZ RN Trap on invalid floating-point operations Trap on divide by zero Trap on floating-point overflow Trap on floating-point underflow Trap on floating-point operations that produce inexact results. Enable sudden underflow (flush to zero) of denormalized values. Enable rounding upward (toward +Infinity).
ld_pa(1) PA-RISC Systems Only ld_pa(1) reuse feature. This directory holds the compiled object files for reuse. dir can be an absolute or relative path to directory where you invoked the linker. The +Oreusedir option shortens link time by not recompiling intermediate object code to object code when using +O4 or profile-based optimization.
ld_pa(1) ld_pa(1) PA-RISC Systems Only +cg pathname Specify the use of pathname as the code generator for compiling ISOMs to SOMs. See the discussion of profile based optimization in the HP-UX Linker and Libraries Online User’s Guide for more information. +dpv Display verbose messages regarding procedures which have been removed due to dead procedure elimination. The symbol name, input object file, and the size (in bytes) of the deleted procedure are displayed.
ld_pa(1) PA-RISC Systems Only ld_pa(1) -w Suppress all warnings. +alloc_hidden_commons Force storage allocation for hidden "common" symbols in -r output. This is similar to the -d option, which allocates storage for all "common" symbols. If +alloc_hidden_commons is specified in combination with the -d option, -d will take precedence. +allowrorelocs (Kernel virtual environment support only.) Allow generation of dynamic relocations in read-only sections such as .text and .rodata .
ld_pa(1) ld_pa(1) PA-RISC Systems Only • -D offset , -R offset Set the origin for the data and text segments. If you change the offset after the initial incremental link, the linker performs an initial incremental link automatically. • -k mapfile provide a non-default mapfile. The user specified mapfile specifications are permitted with the +ild option. But you should not modify the mapfile after the initial incremental link.
ld_pa(1) PA-RISC Systems Only ld_pa(1) is specified. See +compat or +std . Generally, this option is used for secure programs (e.g. setuid ). +noprocelim_sym symbol [+noprocelim_sym symbol]... Do not remove symbol when using dead code elimination (+Oprocelim ). This option can be used for hidden symbols as well as exported symbols. You can specify more than one symbol on the command line with multiple optionsymbol pairs, that is, each symbol you specify must be preceded by the +noprocelim_sym option.
ld_pa(1) ld_pa(1) PA-RISC Systems Only Incremental linking with ld (64-bit Mode ONLY) In the edit-compile-link-debug development cycle, link time is a significant component. The incremental linker (available through the +ild and +ildrelink options) can reduce the link time by taking advantage of the fact that you can reuse most of the previous version of the program and that the unchanged object files do not need to be processed.
ld_pa(1) PA-RISC Systems Only ld_pa(1) An object file extracted from an archive library in the previous link remains in the output load module even if all references to symbols defined in the object file have been removed. The linker removes these object files when it performs the next initial incremental link. Shared Library Processing In an initial incremental link, the linker scans shared library symbol tables and resolves unsats the same way it would in a regular link.
ld_pa(1) ld_pa(1) PA-RISC Systems Only Secure 64-bit programs should be linked with the option +noenvvar to disable the use of SHLIB_PATH and LD_LIBRARY_PATH for locating shared library dependencies. Secure 64-bit programs should also link with +nodefaultrpath to prevent the automatic construction of an embedded search path based on search directories specified with -L options.
ld_pa(1) PA-RISC Systems Only ld_pa(1) specified or is set to the empty string, a default of C (see lang(5)) is used instead of LANG . Determines the values for all locale categories and has precedence over LANG and other LC_* environment variables. LC_ALL LC_MESSAGES Determines the locale that should be used to affect the format and contents of diagnostic messages written to standard error. LC_NUMERIC LC_CTYPE NLSPATH Determines the locale category for numeric formatting.
ld_pa(1) ld_pa(1) PA-RISC Systems Only On 32-bit, link a program with libfunc.sl but use the archive version of the C library. Specify the immediate binding mode together with the nonfatal modifier and allow verbose diagnostics to be displayed: ld /usr/ccs/lib/crt0.o -B immediate -B nonfatal -B verbose \ program.o -L . -lfunc -a archive -lc To do this on 64-bit: ld -B immediate -B nonfatal -B verbose \ program.o -L . -lfunc -a archive -lc On 32-bit, link a Pascal program: ld /usr/ccs/lib/crt0.o main.
ld_pa(1) • • • • PA-RISC Systems Only ld_pa(1) -Q -S -X +dpv AUTHOR ld was developed by AT&T, the University of California, Berkeley, and HP. FILES l /usr/lib/lib* /usr/lib/pa20_64/lib* /usr/ccs/lib* /opt/langtools/lib/pa20_64 32-bit system archive and shared libraries a.out /usr/lib/dld.sl /usr/lib/pa20_64/dld.sl /opt/langtools/lib/end.o /opt/langtools/lib/pa20_64/end.o /usr/ccs/lib/crt0.o /opt/langtools/lib/crt0.o /opt/langtools/lib/pa20_64/crt0.o /usr/ccs/lib/dyncall.o /opt/langtools/lib/mcrt0.
ld_pa(1) chatr(1) exec(2) f77(1) f90(1) fastbind(1) nm(1) pc(1) strip(1) ld_pa(1) PA-RISC Systems Only change program’s internal attributes execute a file invoke the HP-UX FORTRAN 77 compiler invoke the HP-UX Fortran 90 compiler invoke the fastbind tool print name list of object file invoke the HP-UX Pascal compiler strip symbol and line number information from an object file Miscellaneous setflexsec(1M) crt0(3) end(3C) a.out(4) ar(4) compartments (5) dld.
ldapentry(1) ldapentry(1) NAME ldapentry - simple add, modify, and delete entries in an LDAP directory SYNOPSIS ldapentry {-a | -d | -m} [-D login] [-b base] [-h host] [-p port] [-s scope] [-f] [-v] {service key | dn} DESCRIPTION ldapentry is a script that allows administrators to add, modify, and delete entries in an LDAP directory. The add and modify functions open an entry into an editor so knowledge of the LDIF (RFC2849) syntax is required.
ldapentry(1) ldapentry(1) one Search only the immediate children of the entry specified in the -b option. Only the children is searched, the actual entry specified in the -b option is not searched. sub Search the entry specified in the -b option and all of its descendants. Perform a subtree search starting at the point identified in the -b option. This is the default. Displays verbose information.
ldapentry(1) ldapentry(1) *** May not be stored in a configuration file ***. LDAP_BINDDN LDAP_HOST LDAP_SCOPE The DN of the LDAP administrator allowed to add, delete, or modify the entry. The host name of the LDAP directory server. LDAP_HOST uses the hostname :port format. (If port is missing, ldapentry will automatically default to port 389, as suggested by the RFC2251 standard.) The type of LDAP search (sub , one , base ) under the LDAP_BASEDN . You must define LDAP_BASEDN if you define LDAP_SCOPE .
ldapschema(1) ldapschema(1) NAME ldapschema - determines the status of an LDAP schema on the LDAP directory server and extends the LDAP directory server schema with new attribute types and object classes.
ldapschema(1) Type of Directory Server Oracle Internet Directory Novell e-Directory IBM Tivoli Directory Server MAC OS X Directory Server Computer Associates DS Sun ONE Directory Server iPlanet Directory Server ldapschema(1) ds_type oracle eDirectory ibm mac ca sun iPlanet -V ds_version Specifies the version of LDAP directory server. The strcasecmp() function compares the version specified by this -V option and the version defined in the XML files the ldapschema utility processes.
ldapschema(1) ldapschema(1) -ZZZ -P path Enforces start of TLS request (requires successful server response). -3 -s - Verifies hostnames in SSL certificates. -m - Disables matching rule substitution in attribute types. Normally, if an attribute type uses a matching rule not supported on the LDAP directory server, it is mapped to use a higher-level (less specific) matching rule supported by that server.
ldapschema(1) ldapschema(1) If port is not specified, the default port number is 389 for regular connections, or 636 for SSL connections. Options specified on the command line override the environmental variables. For example, if -j /tmp/secret.txt is specified on the command line, and LDAP_BINDCRED environmental variable is set, the password of the LDAP directory server administrator is obtained from file name /tmp/secret.txt.
ldapschema(1) Line Line Line Line Line Line Line Line ldapschema(1) 33: printerLPR 34: LPR information 35: AUXILIARY 36: printer-name 37: printer-aliases 38: 39: 40: Lines 1-2 are required in every schema definition file. Attribute type and object class definitions closely follow the format specified in RFC 2252. Values specified for all XML tags, except the fields must not be quoted.
ldapschema(1) ldapschema(1) Optional, must contain one of the following possible values: userApplications, directoryOperation, distributedOperation, or dSAOperation . At most one usage value can be specified. Optional, use if an attribute type requires indexing. At most one indexed flag can be set. Optional, use to specify any directory-specific information about the attribute type. See the SPECIFYING DIRECTORY-SPECIFIC INFORMATION section for details.
ldapschema(1) ldapschema(1) Optional. Defines the recommended attribute to use for the Relative Distinguished Name (RDN) for new entries created with this object class. Currently, applies only to Active Directory Server (ADS). At most one RDN can be specified. extendAuxiliaryClass Optional, applies to AUXILIARY object classes only. This tag is used to extend an object class already defined in the LDAP server schema with this new AUXILIARY object class.
ldapschema(1) Line Line Line Line Line Line Line Line Line Line Line Line Line Line ldapschema(1) 6: caseIgnoreMatch 7: 1.3.6.1.4.1.1466.115.121.1.15 8: PAGE 553ldapschema(1) ldapschema(1) matching rules and syntaxes on the LDAP server. However, some types of directory servers do not provide this information as part of the search.
ldapschema(1) ldapschema(1) Required. Exactly one numeric id must be specified. Required. At least one matching rule type name must be specified. Do not use quotes around the name values. Optional. At most one description can be specified. Optional, use only if applicable. Obsolete matching rules cannot be used in definitions of any other attribute types. At most one obsolete flag can be specified. Required.
ldapschema(1) ldapschema(1) integerMatch numericStringMatch 1.3.6.1.4.1.1466.115.121.1.26 IA5 String syntax. 2.5.5.5 Active Directory IA5 String LDAP Syntax.
ldapschema(1) ldapschema ldapschema(1) -q /etc/opt/ldapux/schema/rfc3712.xml -T rhds -V 7.1 Note that LDAP directory server version number bears no effect unless also specified in the XML files being processed. Version specification must follow the same format as version specification used in the /etc/opt/ldapux/schema/rfc3712.xml and /etc/opt/ldapux/schema/maprules.xml files. To extend Windows 2000 Active Directory Server with custom SampleA schema, follow the following procedure: 1.
ldapschema(1) ldapschema(1) oids and names can be added to the LDAP server schema. ATTRIB_FOUND and OBJECT_FOUND described below for details. Check the messages containing The ldapschema utility may install any remaining new elements that are not already defined in the LDAP server schema if both of the following two conditions are met. 1. The LDAP schema defined in the file is compatible with the LDAP server schema.
ldapschema(1) ldapschema(1) [The SCHEMA_INVALID message indicates some of the attribute types and/or object classes specified in the file have invalid definitions. This condition occurs if the definition does not conform to the LDAP directory server schema policies or the DTD template. Review the Defining Attribute Types and Defining Object Classes sections for details.
ldapschema(1) ldapschema(1) ATTRIB_INVALID: attribute type "" has an invalid numericoid. Edit the schema definition file to specify an RFC 2252 compliant value for this attribute type. Valid numericoid must consist of digits (0-9) that can be separated by a period (.). Leading zeroes are not allowed. See RFC 2252 for details. [This message indicates the tag value needs to be corrected in the definition in the file.
ldapschema(1) ldapschema(1) ATTRIB_UNRESOLVED: matching rule "" used in "" attribute type definition cannot be mapped because "-m -" option is specified. This matching rule is not supported on the LDAP server. [This message indicates the matching rule specified with the , or tag in the given attribute type definition is not supported on the LDAP directory server. Option -m - disables matching rule substitution in attribute types.
ldapschema(1) ldapschema(1) ATTRIB_REJECTED: attribute type "" will not be added to the LDAP server schema because its definition is invalid. [This message indicates definition of the specified attribute type is invalid. If the ldapschema utility is executed in the extend mode, the given attribute type will not be added to the LDAP directory server schema. Check the messages containing ATTRIB_INVALID for details.
ldapschema(1) ldapschema(1) definition file to modify the value specified with the tag, which can be one of the following: STRUCTURAL, AUXILIARY, ABSTRACT. [This message indicates the tag value needs to be corrected in the definition in the file. Possible object class type values are STRUCTURAL , AUXILIARY or ABSTRACT . Any other type values are rejected.
ldapschema(1) ldapschema(1) ---------------------------------------------------------------------- OBJECT_UNRESOLVED: optional attribute used in "
ldapschema(1) ldapschema(1) [This message indicates the tag and its value need to be specified in the definition in the /etc/opt/ldapux/schema/schema-ds_type .xml file, where ds_type corresponds to the same value specified with the -T option on the command line when executing the ldapschema utility.] ---------------------------------------------------------------------- RULE_INVALID: matching rule is missing an LDAP syntax.
ldapschema(1) ldapschema(1) specifying the force option (-F). FILES /opt/ldapux/bin/ldapschema /etc/opt/ldapux/schema/schema.dtd /etc/opt/ldapux/schema/map-rules.xml /etc/opt/ldapux/schema/schema-ads.xml /etc/opt/ldapux/schema/rfc2256.xml /etc/opt/ldapux/schema/rfc2307.xml /etc/opt/ldapux/schema/rfc2307-bis.xml /etc/opt/ldapux/schema/rfc2926.xml /etc/opt/ldapux/schema/rfc3712.xml SEE ALSO ldapux(5).
ldd(1) ldd(1) NAME ldd - list dynamic dependencies of executable files or shared libraries SYNOPSIS Remarks For Itanium-based systems, see ldd_ia(1). For PA-RISC systems, see ldd_pa(1). Use the uname command to determine your system type. uname -m returns ia64 on Itanium-based systems. All other values represent PA-RISC systems. SEE ALSO ldd_ia(1), ldd_pa(1), uname(1).
ldd_ia(1) ldd_ia(1) Integrity Systems Only NAME ldd_ia: ldd - list dynamic dependencies of executable files or shared libraries on Integrity systems SYNOPSIS ldd [-d] [-r] [-s] [-v] filename... Remarks This manpage describes ldd on Integrity systems. For ldd on PA-RISC systems, see ldd_pa(1). DESCRIPTION ldd is a command that can list the dynamic dependencies of incomplete executable files or shared libraries. ldd lists verbose information about dynamic dependencies and symbol references.
ldd_ia(1) Integrity Systems Only ldd_ia(1) DIAGNOSTICS ldd prints the record of shared library path names to stdout. The optional list of symbol resolution problems are printed to stderr. ldd returns zero when the operation is successful. A non-zero return code indicates that an error occurred. EXAMPLES By default ldd prints a simple dynamic path information.
ldd_pa(1) PA-RISC Systems Only ldd_pa(1) NAME ldd_pa: ldd - list dynamic dependencies of executable files or shared libraries on PA-RISC systems SYNOPSIS ldd [-b] [-d] [-r] [-s] [-v] filename... Remarks This manpage describes ldd on PA-RISC systems. For ldd on Integrity systems, see ldd_ia(1). DESCRIPTION ldd is a command that can list the dynamic dependencies of incomplete executable files or shared libraries. ldd lists verbose information about dynamic dependencies and symbol references.
ldd_pa(1) PA-RISC Systems Only ldd_pa(1) LC_CTYPE Determines the locale category for character handling functions. NLSPATH Determines the location of message catalogs for the processing of LC_MESSAGES . If any internationalization variable contains an invalid setting, ldd behaves as if all internationalization variables are set to C. See environ(5). DIAGNOSTICS ldd prints the record of shared library path names to stdout. The optional list of symbol resolution problems are printed to stderr.
ldd_pa(1) ldd_pa(1) PA-RISC Systems Only trying path=/var/tmp/libdl.1 trying path=/var/adm/libdl.1 search path=/tmp (SHLIB_PATH ) trying path=/tmp/libdl.1 search path=/usr/lib/pa20_64 (RPATH) trying path=/usr/lib/pa20_64/libdl.1 libdl.1 => /usr/lib/pa20_64/libdl.1 WARNINGS ldd does not list shared libraries explicitly loaded using dlopen(3C) or shl_load(3X). FILES a.out /usr/lib/dld.sl /usr/lib/pa20_64/dld.sl /usr/ccs/lib/lddstub /usr/ccs/lib/pa20_64/lddstub /usr/lib/nls/$LANG/ldd.
leave(1) leave(1) NAME leave - remind you when you have to leave SYNOPSIS leave [ hhmm ] DESCRIPTION The leave command waits until the specified time, then reminds you to leave. You are reminded 5 minutes and 1 minute before the actual time, at the time, and every minute thereafter. When you log off, leave exits. The time of day is in the form hhmm, where hh is a time in hours (which can range from 0 through 11 or 0 through 24 hours), and mm is the number of minutes after the specified hour.
lifcp(1) lifcp(1) NAME lifcp - copy to or from LIF files SYNOPSIS lifcp [-T xxx] [-L xxx] [-v xxx] [-a] [-b] [-i xxx] [-r] [-t] file1 file2 lifcp [-T xxx] [-L xxx] [-v xxx] [-a] [-b] [-i xxx] [-r] [-t] [file1 file2 ...] directory DESCRIPTION lifcp copies a LIF file to an HP-UX file, an HP-UX file to a LIF file, or a LIF file to another LIF file. It also copies a list of (HP-UX/LIF) files to a (LIF/HP-UX) directory. The last name on the argument list is the destination file or directory.
lifcp(1) lifcp(1) The default copying modes when copying from LIF to HP-UX are summarized in the following table: File Type ASCII BINARY BIN other Default Copying Mode ASCII BINARY RAW RAW When copying from HP-UX to LIF, the default copying mode is ASCII and an ASCII file is created. When copying from LIF to LIF, if no options are specified, then all the LIF directory fields and file contents are duplicated from source to destination.
lifcp(1) lifcp(1) lifcp lifvol:ABC . Copy standard input to LIF file A_FILE on LIF volume /dev/dsk/c0t6d0. lifcp - /dev/dsk/c0t6d0:A_FILE Copy LIF file ABC in lifvol to LIF file CDE on /dev/dsk/c0t6d0 . lifcp lifvol:ABC /dev/dsk/c0t6d0:CDE Copy the output of pr to the LIF file ABC . pr abc | lifcp - lifvol:ABC Copy the output of pr to the LIF volume lifvol . LIF file STDIN is created since no file names are specified. pr abc | lifcp - lifvol: Copy LIF file ABC in lifvol to standard output.
lifinit(1) lifinit(1) NAME lifinit - write LIF volume header on file SYNOPSIS lifinit [-vnnn ] [-dnnn ] [-n string ] [-snnn ] [-lnnn ] [-ennn ] file DESCRIPTION lifinit writes a LIF volume header on a volume or file. Options lifinit recognizes the following options and command-line arguments which can appear in any order: -vnnn Sets volume size to nnn bytes. If nnn is not a multiple of 256, it is rounded down to the next such multiple. -dnnn Sets directory size to nnn file entries.
lifinit(1) lifinit(1) lifinit /dev/rdsk/c0t6d0 WARNINGS To prevent media corruption, do not terminate lifinit once it has started executing. AUTHOR lifinit was developed by HP. SEE ALSO lifcp(1), lifls(1), lifrename(1), lifrm(1), lif(4).
lifls(1) lifls(1) NAME lifls - list contents of a LIF directory SYNOPSIS lifls [ option ] name DESCRIPTION lifls lists the contents of a LIF directory on standard output. The default output format lists file names in multiple columns (similar to ls(1), except unsorted) if standard output is a character special file. If standard output is not a tty device, the output format is one file name per line. name is a path name to an HPUX file containing a LIF volume and optional file name.
lifrename(1) lifrename(1) NAME lifrename - rename LIF files SYNOPSIS lifrename oldfile newfile DESCRIPTION oldfile is a full LIF file specifier (see lif(4) for details) for the file to be renamed (e.g. liffile:A_FILE). newfile is new name to be given to the file (only the file name portion). This operation does not include copy or delete. Old file names must match the name of the file to be renamed, even if that file name is not a legal LIF name. Do not mount the special file while using lifrename .
lifrm(1) lifrm(1) NAME lifrm - remove a LIF file SYNOPSIS lifrm file1 ... filen DESCRIPTION lifrm removes one or more entries from a LIF volume. File name specifiers are as described in lif(4). Do not mount the special file while using lifrm . DIAGNOSTICS lifrm returns zero if the file is removed successfully. Otherwise it prints a diagnostic and returns nonzero. EXAMPLES lifrm liffile:MAN lifrm /dev/rdsk/c0t6d0:F AUTHOR lifrm was developed by HP.
line(1) line(1) NAME line - read one line from user input SYNOPSIS line [-t timeout ] DESCRIPTION line copies one line (up to a new-line) from the standard input and writes it on the standard output. It returns an exit code of 1 on EOF and always prints at least a new-line. It is often used within shell files to read from the user’s terminal.
listusers(1) listusers(1) NAME listusers - display user login data SYNOPSIS listusers [-g groups] [-l logins] DESCRIPTION The listusers command displays data concerning user logins. The output shows the user login and the /etc/passwd comment field value (e.g., user name, etc.). The default displays data about all user logins. Options The listusers command supports the following options: -g groups Display all users belonging to groups, sorted by login. A comma separated list specifies multiple groups.
ln(1) ln(1) NAME ln - link files and directories SYNOPSIS ln [-f] [-i] [-s] file1 new_file ln [-f] [-i] [-s] file1 [file2 ...] dest_directory ln [-f] [-i] [-s] directory1 [directory2 ...] dest_directory DESCRIPTION The ln command links: • file1 to a new or existing new_file, • file1 to a new or existing file named file1 in existing dest_directory, • file1, file2, ... to new or existing files of the same name in existing dest_directory, • directory1, directory2, ...
ln(1) ln(1) to file; an lstat() must be performed to obtain information about the link (see stat(2)). A readlink() call can be used to read the contents of the symbolic link (see readlink(2)). Symbolic links may span file systems and refer to directories. Access Control Lists (ACLs) If optional ACL entries are associated with new_file, ln displays a plus sign (+) after the access mode when asking permission to overwrite the file.
locale(1) locale(1) NAME locale - get locale-specific (NLS) information SYNOPSIS locale [ -a [ 32 | 64 ] -A -m ] locale [ -ck ] name ... locale [ -pa32 ] [ -pa64 ] DESCRIPTION The locale command displays information about the current locale or about available locales.
locale(1) locale(1) -m Display a list of available charmap files on the system. See localedef(1M) for a definition of charmap files and their usage. -c Display names of locale categories that have been selected either explicitly or by giving a keyword contained therein. This option may be used with the -k option. -k Display names of keywords that have been selected either explicitly or by providing their containing category as an argument.
locale(1) locale(1) LC_ALL=POSIX locale -ck decimal_point produces: LC_NUMERIC decimal_point="." If LANG is set to POSIX and no other locale variables are set, the command: locale LC_NUMERIC produces: "." "" "" which correspond to the keywords decimal_point, thousands_sep, grouping, and alt_digit. SEE ALSO localedef(1M), localeconv(3C), nl_langinfo(3C), setlocale(3C), charmap(4), localedef(4), environ(5), lang(5). STANDARDS CONFORMANCE locale : XPG4, POSIX.
lock(1) lock(1) NAME lock - reserve a terminal SYNOPSIS lock DESCRIPTION lock requests a password from the user, then prints LOCKED on the terminal and refuses to relinquish the terminal until the password is repeated. If the user forgets the password, the only recourse is to log in elsewhere and kill the lock process.
logger(1) logger(1) NAME logger - make entries in the system log SYNOPSIS logger [-t tag] [-p pri] [-i] [-f file] [message ... ] DESCRIPTION The logger command provides a program interface to the syslog() system log module (see syslog(3C)). A message can be given on the command line, which is logged immediately, or a file is read and each line is logged. If no file or message is specified, the contents of the standard input are logged.
logger(1) logger(1) AUTHOR logger was developed by the University of California, Berkeley. SEE ALSO syslogd(1M), getlogin(3C), syslog(3C). STANDARDS CONFORMANCE logger : XPG4, POSIX.
login(1) login(1) NAME login - sign on; start terminal session SYNOPSIS login [name [env-var] ...] DESCRIPTION The login command is used at the beginning of each terminal session to properly identify a prospective user. login can be invoked as a user command or by the system as an incoming connection is established. login can also be invoked by the system when a previous user shell terminates but the terminal does not disconnect.
login(1) login(1) For superuser, PATH is set to: PATH=:/usr/sbin:/usr/bin:/sbin In the case of a remote login, the environment variable TERM is also set to the remote user’s terminal type. The environment can be expanded or modified by supplying additional arguments to login , either at execution time or when login requests the user’s login name.
login(1) login(1) • The password for the account has expired and the user cannot successfully change the password. • The password lifetime for the account has passed. • The time between the last login and the current time exceeds the time allowed for login intervals. • The administrative lock on the account has been set. • The maximum number of unsuccessful login attempts for the account has been exceeded. • The maximum number of unsuccessful login attempts for the terminal has been exceeded.
login(1) login(1) No directory Consult system administrator. No Root Directory Attempted to log in to a subdirectory root that does not exist. That is, the passwd file entry had shell path *, but the system cannot chroot() to the given home directory. No shell The user shell (/usr/bin/sh if shell name is null in /etc/passwd ) could not be started with the exec command. Consult system administrator. No utmp entry.
login(1) login(1) /tcb/files/auth/*/* The trusted system password database. /var/adm/btmp History of bad login attempts. /var/adm/wtmp History of logins, logouts, and date changes. /var/mail/ login_name Mailbox for user. login_name /etc/default/security Security defaults configuration file.
logname(1) logname(1) NAME logname - get login name SYNOPSIS logname DESCRIPTION logname writes the user’s login name to standard output. The login name is equivalent to that returned by getlogin() (see getlogin(3C)). EXTERNAL INFLUENCES Environment Variables LANG determines the language in which diagnostic messages are displayed. FILES /etc/profile SEE ALSO env(1), login(1), getlogin(3C), logname(3C), environ(5). STANDARDS CONFORMANCE logname : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
lorder(1) lorder(1) NAME lorder - find ordering relation for an object library SYNOPSIS lorder [ files ] DESCRIPTION The input consists of one or more object or archive library files (see ar(1)) placed on the command line or read from standard input. The standard output is a list of pairs of object file names, meaning that the first file of the pair refers to external identifiers defined in the second.
lorder(1) lorder(1) FILES /var/tmp/*symref /var/tmp/*symdef SEE ALSO System Tools: ar(1) ld(1) Miscellaneous: tsort(1) temporary files create archived libraries invoke the link editor produce an ordered list of items (topological sort) STANDARDS CONFORMANCE lorder : SVID2, SVID3, XPG2, XPG4 l 598 Hewlett-Packard Company −2− HP-UX 11i Version 2: December 2007 Update
lp(1) lp(1) NAME lp, lpalt, cancel - print/alter/cancel requests on an LP destination SYNOPSIS lp [-c] [-ddest] [-m] [-nnumber] [-ooption] [-ppriority] [-s] [-ttitle] [-w] [file ...] lpalt id [-ddest] [-i] [-m] [-nnumber] [-ooption] [-ppriority] [-s] [-ttitle] [-w] cancel [id ...] [dest ...] [-a] [-e] [-i] [-uuser] [-f] DESCRIPTION The lp command queues files for printing. The lpalt command changes information in a queued request. The cancel command deletes a queued request.
lp(1) l lp(1) -nnumber Print number copies of the output. If illegal number of copies is specified with this option, the default number of copies is 1. -ooption Specify a printer-dependent option. You can specify several printer options by repeating the -o option. For information about the options that are available for a printer supported on your system, see the interface script for the printer name in the /etc/lp/interface directory. -ppriority Set the priority of the print request.
lp(1) lp(1) cancel Options and Arguments cancel recognizes the following options and arguments, which can be specified in any order. Blanks are not permitted between a keyletter and its argument. When cancel is used with a mix of different options and arguments, it will operate first on id ..., next on dest ..., next on -a , next on -e and finally on -u , irrespective of the order in which the options and arguments are specified in the command line. id ... Specifies one or more requests to be canceled.
lp(1) lp(1) RETURN VALUE Exit values are: 0 Successful completion. >0 Error condition occurred. EXAMPLES For a laserjet printer named lp2 , configured with an interface script that defines the -c option to cause the printer to print in a compressed mode, use the following command to print myfile with compressed print on lp2 : lp -dlp2 -oc myfile lp can be used at the end of a pipeline to print the results of a previous command.
lpfilter(1) lpfilter(1) NAME lpfilter, divpage, fontdl, lprpp, plotdvr, printstat, reverse - filters invoked by lp interface scripts SYNOPSIS /usr/lbin/divpage [-p -l] [-h -q] [-nFontID] filename /usr/lbin/fontdl [-nFontID] [-l] [-p] filename /usr/lbin/lprpp [-i] [-o] [-e] [-lnn ] [-n] [-p] /usr/lbin/plotdvr -l request_id -u username [-e] [-f] [-i] filename /usr/sbin/printstat -l request_id -u username filename /usr/sbin/reverse [-l page_length ] Remarks The structure of these filters is currently u
lpfilter(1) lpfilter(1) -o -e -l nn Prints only the odd numbered pages. Used with -e for double-sided printing. -n Specifies nroff mode for printing output of the nroff command. Prints 66 lines per page with the first line appearing on logical line 4 of the printer. -p Specifies pr mode for printing output from the pr command. Prints 66 lines per page with the first line appearing on logical line 3 of the printer. Print only the even numbered pages. Used with -o for double sided printing.
lpfilter(1) lpfilter(1) DIAGNOSTICS Error and diagnostic messages appear on the printed output, on the user’s terminal, or are mailed to the user, depending on circumstances. WARNINGS There is little consistency in the interface to these filters. SEE ALSO lp(1), lpadmin(1M). Managing Systems and Workgroups.
lpstat(1) lpstat(1) NAME lpstat - report status information of the LP subsystem SYNOPSIS lpstat [-drst ] [-a[list] ] [-c[list] ] [-o[list] ] [-p[list] ] [-u[list] ] [-v[list] ] [ID]... DESCRIPTION The lpstat utility writes to standard output information about the current status of the LP subsystem. If no arguments are given, lpstat writes the status of all requests made to lp by the user that are still in the output queue. OPTIONS The lpstat utility supports the XBD specification, Section 10.
lpstat(1) lpstat(1) ENVIRONMENT VARIABLES The following environment variables affect the execution of lpstat : LANG Provide a default value for the internationalisation variables that are unset or null. If LANG is unset or null, the corresponding value from the implementation-specific default locale will be used. If any of the internationalisation variables contains an invalid setting, the utility will behave as if none of the variables had been defined.
lpstat(1) lpstat(1) EXAMPLES 1. Obtain the status of two printers, the pathnames of two printers, a list of all class names and the status of the request named HiPri-33: lpstat -plaser1,laser4 -v"laser2 laser3" -cHiPri-33 2. Obtain user print job status using the obsolescent mixed blank and comma form: lpstat -u"ddg,gmv, maw" FUTURE DIRECTIONS A version of lpstat that fully supports the XBD specification, Section 10.2, Utility Syntax Guidelines may be introduced in a future issue.
lpstat(1) lpstat(1) HP-UX EXTENSIONS DESCRIPTION Any arguments that are not options are assumed to be request ids (as returned by lp ) or LP destinations. lpstat prints the status of requests corresponding to such request ids or the status of requests belonging to such destinations. options can appear in any order and can be repeated and intermixed with other arguments. -i -o[list] -t Inhibit the reporting of remote status. Also see the -i option. Print all status information.
ls(1) ls(1) NAME ls, lc, l, ll, lsf, lsr, lsx - list contents of directories SYNOPSIS ls [-abcdefgilmnopqrstuxACFLR1] [names] lc [-abcdefgilmnopqrstuxACFLR1] [names] l [ls_options] [names] ll [ls_options] [names] lsf [ls_options] [names] lsr [ls_options] [names] lsx [ls_options] [names] DESCRIPTION For each directory argument, the ls command lists the contents of the directory. For each file argument, ls repeats its name and any other information requested.
ls(1) ls(1) substituted for the hour and minute of the modification time. If the file is a special file, the size field contains the major and minor device numbers rather than a size. If the file is a symbolic link, the filename is printed, followed by -> and the pathname of the referenced file. -m Stream output format. -n The same as -l, (ell) except that the owner’s UID and group’s GID numbers are printed, rather than the associated character strings.
ls(1) ls(1) c d l n p s - Character special file Directory Symbolic link Network special file Fifo (also called a "named pipe") special file Socket Ordinary file The next 9 characters are interpreted as three sets of three characters each which identify access and execution permissions for the owner, group, and others categories, as described in chmod(1). The - indicates the permission is not granted.
ls(1) ls(1) LC_COLLATE determines the order in which the output is sorted. LC_CTYPE determines which characters are classified as nonprinting for the -b and -q options, and the interpretation of single- and/or multibyte characters within file names. LC_TIME determines the date and time strings output by the -g, -l (ell), -n, and -o options. LC_MESSAGES determines the language in which messages (other than the date and time strings) are displayed.
lsacl(1) lsacl(1) NAME lsacl - list access control lists (ACLs) of files SYNOPSIS /usr/bin/lsacl [-l] file... DESCRIPTION lsacl lists access control lists (ACLs) of one or more files in symbolic, ‘‘short’’ form, one file’s ACL per line of output, followed by the file name; see acl(5) for ACL syntax. Options lsacl recognizes the following option: -l Print ACLs in long form. Each file’s ACL can be more than one line long, and is always preceded by file name, colon, and newline.
m4(1) m4(1) NAME m4 - macro processor SYNOPSIS m4 [options] [file ...] DESCRIPTION m4 is a macro processor intended as a front end for Ratfor, C, and other languages. Each of the argument files is processed in order; if there are no files, or if a file name is -, standard input is read. The processed text is written to standard output. Options m4 recognizes the following options: -e Operate interactively. Interrupts are ignored and the output is unbuffered. Using this mode may be very difficult.
m4(1) decr define m4(1) Returns the value of its argument decremented by 1. The second argument is installed as the value of the macro whose name is the first argument. Each occurrence of $n in the replacement text, where n is a digit, is replaced by the nth argument.
m4(1) m4(1) syscmd Executes the HP-UX system command given in the first argument. No value is returned. sysval traceoff Is the return code from the last call to syscmd . traceon With no arguments, turns on tracing for all macros (including built-ins). Otherwise, turns on tracing for named macros. translit Transliterates the characters in its first argument from the set given by the second argument to the set given by the third. No abbreviations are permitted.
machid(1) machid(1) NAME machid: hp9000s200, hp9000s300, hp9000s400, hp9000s500, hp9000s700, hp9000s800, hp-mc680x0, hp-pa, pdp11, u3b, u3b2, u3b5, u3b10, u370, vax - provide truth value about processor type SYNOPSIS hp9000s200 hp9000s300 hp9000s400 hp9000s500 hp9000s700 hp9000s800 hp-mc680x0 hp-pa pdp11 u3b u3b2 u3b5 u3b10 u370 vax DESCRIPTION The following commands return a true value (exit code 0) if the a processor type matches the command name.
machid(1) machid(1) SEE ALSO getconf(1), make(1), sh(1), test(1), true(1).
machinfo(1) machinfo(1) (Itanium(R)-Based Processor Family Only) NAME machinfo - print machine information SYNOPSIS machinfo DESCRIPTION machinfo prints useful debugging information about the machine. The information includes chip stepping, firmware revision, number of CPUs, and amount of memory. Note the CPU-specific data only applies to the processor running the machinfo command. Running the machinfo command on another CPU could result in different CPU-specific information being displayed.
mail(1) mail(1) NAME mail, rmail - send mail to users or read mail SYNOPSIS mail [+] [-epqr ] [-f file ] mail [-dt ] person ... rmail [-dt ] person ... Remarks: See mailx(1) and elm(1) for an enhanced user mail interface. DESCRIPTION The mail command, when used without arguments, prints the user’s mail, message-by-message, in lastin, first-out order. For each message, mail prints a ? prompt and reads a line from the standard input to determine the disposition of the message.
mail(1) mail(1) -r -f file -t -d Same as +. Causes mail to use file (for example, mbox ) instead of the default mailfile. Causes the outbound message to be preceded by each person the mail is sent to. A person is usually a user name recognized by login (see login(1)). If a person being sent mail is not recognized, or if mail is interrupted during input, the file dead.letter will be saved to allow editing and resending. Note that dead.
mail(1) mail(1) mail treats a line consisting solely of a dot ( . ) as the end of the message, except when the rmail -d command is used. The maximum allowable line length in mail messages is 8 times that of BUFSIZ bytes as defined in /usr/include/stdio.h. If line length exceeds this limit, mail truncates the line starting at beginning-of-line, and uses only the trailing 8 * BUFSIZ characters.
mailfrom(1) mailfrom(1) NAME mailfrom - summarize mail folders by subject and sender SYNOPSIS mailfrom [-hnQqStv ] [-s status] [folderusername]... DESCRIPTION The mailfrom command reads one or more mail folders and outputs one line per message in the form: from [subject] where from is the name of the person the message is from, and subject is the subject of the message, if present.
mailfrom(1) 0 1 2 3 mailfrom(1) Messages matching status are present. No messages matching status are present, but there are some messages. There are no messages at all. An error occurred. If multiple mailboxes or folders are specified, the exit status only applies to the last one examined. This can be used in scripts to determine what kind of mail a user has. EXAMPLES Display header information from all the messages in your mailbox.
mailq(1) mailq(1) NAME mailq - prints the mail queue SYNOPSIS mailq [-v] DESCRIPTION mailq prints a summary of the mail messages queued for future delivery. The first line printed for each message shows the internal identifier used on this host for the message, the size of the message in bytes, the date and time the message was accepted into the queue, and the envelope sender of the message.
mailstats(1) mailstats(1) NAME mailstats - print mail traffic statistics SYNOPSIS mailstats [-C cffile ] [-f stfile ] [-o] [-p] DESCRIPTION mailstats reads and interprets the sendmail statistics file, and then prints out the mail traffic statistics. The statistics file is the one set by the StatusFile option in the /etc/mail/sendmail.cf. The default statistics file is /etc/mail/sendmail.st. If the statistics file exists, sendmail collects statistics about your mail traffic and stores them in that file.
mailstats(1) mailstats(1) mailstats: statistics-file : Permission denied The statistics file’s permissions are set so that you cannot read it.
mailx(1) mailx(1) NAME mailx - interactive mail message processing system SYNOPSIS Send mode mailx [-FUm ] [-s subject] [-r address] [-h number] address ... Receive mode mailx -e mailx [-UHLiNn ] [-u user] mailx -f [-UHLiNn ] [filename] Obsolescent mailx [-f filename] [-UHLiNn ] DESCRIPTION mailx provides a comfortable, flexible environment for sending and receiving messages electronically. When reading mail, mailx provides commands to facilitate saving, deleting, and responding to messages.
mailx(1) mailx(1) -N -r address -s subject -u user Do not print initial header summary. -U Convert UUCP-style addresses to Internet standards. Overrides the conv environment variable. -d Turn on debugging output. Neither particularly interesting nor recommended. Pass address to network delivery software. All tilde commands are disabled. Set the Subject header field to subject. Read user’s mailbox. Can be used only if read access to user’s mailbox is not read protected.
mailx(1) mailx(1) Other arguments are usually arbitrary strings whose usage depends on the command involved. File names, where expected, are expanded using normal shell conventions (see sh(1)). Special characters are recognized by certain commands, and are documented with the commands below. At start-up time, mailx reads commands from a system-wide file (/usr/share/lib/mailx.rc) to initialize certain parameters, then from a private start-up file ($HOME/.mailrc) for personalized variables.
mailx(1) xit mailx(1) Exit from mailx , without changing the mailbox. No messages are saved in the mbox (see also quit). file [filename] fold er [filename] Quit from the current file of messages and read in the specified file. Several special characters are recognized when used as file names, and substitutions are made as follows: % %user # & the the the the current mailbox. mailbox for user. previous file. current mbox. Default file is the current mailbox.
mailx(1) mailx(1) description of possible message specifications. pipe [msglist] [command] | [msglist] [command] Pipe messages in msglist through the specified command. Each message is treated as if it were read. If msglist is not specified, the current message is used. If command is not specified, the command specified by the current value of the cmd variable is used. If msglist is specified, command must also be specified.
mailx(1) Type [msglist] Print [msglist] type [msglist] print [msglist] una lias alias undelete [msglist] mailx(1) Print the specified messages on the screen, including all header fields. Overrides suppression of fields by the ig nore command. Print the specified messages. If crt is set, messages longer than the number of lines specified by the crt variable are paged through the command specified by the PAGER variable.
mailx(1) mailx(1) ˜i string Insert the value of the named variable into the text of the message. For example, ˜A is equivalent to ˜i Sign. ˜m [msglist] Insert the specified messages into the letter, shifting the new text to the right one tab stop. Valid only when sending a message while reading mail. ˜p ˜q Print the message being entered. ˜R name ... ˜r filename ˜< filename ˜
mailx(1) mailx(1) DEAD= filename The name of the file in which to save partial letters in case of untimely interrupt or delivery errors. Default is $HOME/dead.letter. debug Enable verbose diagnostics for debugging. Messages are not delivered. Default is nodebug . dot When processing input from a terminal, interpret an ASCII period character on a line by itself as end-of-file. Default is nodot . EDITOR= command The command to run when the edit or ˜e command is used. Default is ed (see ed(1)).
mailx(1) mailx(1) page Used with the pipe command to insert a form feed after each message sent through the pipe. Default is nopage . PAGER= command The command to use as a filter for paginating output. This can also be used to specify the pager command-line options (for example, set PAGER="more -c" ). Default is pg, but many users prefer more (see pg(1) and more(1)). prompt= string quiet Set the command-mode prompt to string. Default is ?.
mailx(1) mailx(1) International Code Set Support Single- and multibyte character code sets are supported within mail text. Headers are restricted to characters from the 7-bit USASCII character code set (see ascii(5)). WARNINGS Where command is shown as valid, arguments are not always allowed. Experimentation is recommended. Internal variables imported from the execution environment cannot be uns et. The full internet addressing is not fully supported by mailx .
make(1) make(1) NAME make - maintain, update, and regenerate groups of programs SYNOPSIS make [-f makefile] [-bBdeiknpPqrsStuw] [macro_name =value] [names] DESCRIPTION Makefile Structure A makefile can contain four different kinds of lines: target lines, shell command lines, macro definitions, and include lines.
make(1) make(1) Include Lines If the string include appears as the first seven letters of a line in a makefile, and is followed by one or more space or tab characters, the rest of the line is assumed to be a file name and is read and processed by the current invocation of make as another makefile after any macros in the file name have been expanded. The default behaviour of make is to use .DEFAULT built-in target, if target does not have explicit commands associated with it and .DEFAULT target is defined.
make(1) make(1) A command line is normally printed before it is executed, but if the line has an @ at the beginning, printing is suppressed. The -s option or the presence of the special target .SILENT: in the makefile suppresses printing of all command lines. The @ can be used to selectively turn off printing. Everything printed by make (except the initial tab) is passed directly to the shell without alteration. Thus, echo a\ b produces ab just as the shell would.
make(1) make(1) given is used. This enables overriding the presence of the k flag in the MAKEFLAGS environment variable. -t Touch the target files (causing them to be up-to-date) rather than issue the usual commands. -u -w Unconditionally make the target, ignoring all timestamps. Suppress warning messages. Fatal messages will not be affected. [macro_name =value] Zero or more command line macro definitions can be specified. See the Macros subsection.
make(1) make(1) SHELL=/usr/bin/sh or a suitable equivalent should be put in the macro definition section of the makefile. Suffixes Target and/or dependent names often have suffixes. Knowledge about certain suffixes is built into make and used to identify appropriate inference rules to be applied to update a target (see the section on Inference Rules). The current default list of suffixes is: .o .c .c˜ .C .C˜ .cxx .cxx˜ .cpp .cpp˜ .cc .cc˜ .y .y˜ .l .l˜ .L .L˜ .Y .Y˜ .s .s˜ .sh .sh˜ .h .h˜ .H .H˜ .p .p˜ .
make(1) make(1) A tilde in the above rules refers to an SCCS file (see sccsfile(4)). Thus, the rule .c˜.o would transform an SCCS C source file into an object file (.o ). Since the s. of the SCCS files is a prefix, it is incompatible with make ’s suffix point-of-view. Hence, the tilde is a way of changing any file reference into an SCCS file reference. A rule to create a file with suffix .o from a file with suffix .c is specified as an entry with .c.o as the target and no dependents.
make(1) make(1) The most common use of the archive interface follows. Here, we assume the source files are all C type source: lib: lib(file1.o) lib(file2.o) lib(file3.o) @echo lib is now up-to-date .c.a: $(CC) -c $(CFLAGS) $< ar rv $@ $*.o rm -f $*.o (See the section on Built-in Macros or an explanation of the <, @, and * symbols.) In fact, the .c.a rule listed above is built into make and is unnecessary in this example. This rule is applied to each dependent of lib in turn.
make(1) make(1) the following series of targets to be made is generated: --- pgm with two dependents and an explicit rule to follow --- a.o (recursively) with an implicit dependent of a.c which matches the implicit rule .c.o --- a.c (recursively) with no implicit dependents and no implicit rules. This stops the recursion and simply returns the last modification time of the file a.c. --- b.o (recursively) with an implicit dependent of b.c which matches the implicit rule .c.o --- b.
make(1) make(1) be used in target rules in the makefile. They can also be redefined in the makefile. $$@ The $$@ macro has meaning only on dependency lines. Macros of this form are called dynamic dependencies because they are evaluated at the time the dependency is actually processed. $$@ evaluates to exactly the same thing as $@ does on a command line; i.e., the current target name. This macro is useful for building large numbers of executable files, each of which has only one source file.
make(1) make(1) International Code Set Support Single and multi-byte character code sets are supported. RETURN VALUE make returns a 0 upon successful completion or a value greater than 0 if an error occurred. If the -q option is specified, make returns 0 if the target was up-to-date and a value greater than 0 if the target was not up-to-date. EXAMPLES The following example creates an executable file from a C source code file without a makefile, if program.
make(1) make(1) SEE ALSO cc_bundled(1), cd(1), lex(1), mkmf(1), sh(1), environ(5), lang(5), regexp(5). A Nutshell Handbook, Managing Projects With Make by Steve Talbot, Second Edition, O’Reilly & Associates, Inc., 1986. STANDARDS CONFORMANCE make : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
makekey(1) makekey(1) NAME makekey - generate encryption key SYNOPSIS /usr/lbin/makekey DESCRIPTION makekey improves the usefulness of encryption schemes depending on a key by increasing the amount of time required to search the key space. It reads 10 bytes from its standard input and writes 13 bytes on its standard output. The output depends on the input in a way intended to be difficult to compute (i.e., to require a substantial fraction of a second).
man(1) man(1) NAME man - find manual information by keywords; print out a manual entry SYNOPSIS man [-M path] -k keyword... man [-M path] -f file... man [-] [-M path] [-T macro-package] [ section [ subsection ] ] entry_name... DESCRIPTION man accesses information from the HP-UX manual pages. It can be used to: • List all manual entries whose one-line description contains any of a specified set of keywords. • Display or print one-line descriptions of entries specified by name.
man(1) man(1) for one or more of the entries indicated. section corresponds to the section number where the entry appears in the HP-UX Reference. It can be followed by an optional uppercase/lowercase subsection identifier such as 3C which would indicate a library routine in Section 3. 3, 3c , and 3C are interpreted as equivalent, since all Section 3 manual entries are stored in the same or in related directories (such as /usr/share/man/man3.Z and /usr/share/man/man3.
man(1) man(1) man∗.Z The entry is uncompressed, formatted, and displayed. If the cat∗.Z directory exists, the formatted entry is compressed and installed in cat∗.Z . If the cat∗ directory exists, the formatted entry is installed in cat∗ . cat∗.Z man∗ The entry is uncompressed and displayed. cat∗ The entry is displayed. The entry is formatted, and displayed. If the cat∗.Z directory exists, it is compressed, and installed in cat∗.Z .
man(1) man(1) Display the manual entry for id(1), with the output piped through pg -c : PAGER="pg -c" export PAGER man id List all printed manuals available for the current system (see manuals(5): man manuals Display intro(4) and intro(3): man 4 intro man 3 intro WARNINGS Manual entries are structured such that they can be printed on a phototypesetter, conventional line printer, and screen display devices.
mediainit(1) mediainit(1) NAME mediainit - initialize disk or partition DDS tape SYNOPSIS mediainit [-vr ] [-f fmt_optn ] [-i interleave ] [-p size ] pathname DESCRIPTION mediainit initializes mass storage media by formatting the media, writing and reading test patterns to verify media integrity, then sparing any defective blocks found. This process prepares the disk or tape for error-free operation. Initialization destroys all existing user data in the area being initialized.
mediainit(1) pathname mediainit(1) pathname is the path name to the character (raw) device special file associated with the device unit or volume that is to be initialized. mediainit aborts if you lack either read or write permission to the device special file, or if the device is currently open for any other process. This prevents accidental initialization of the root device or any mounted volume. mediainit locks the unit or volume being initialized so that no other processes can access it.
mediainit(1) mediainit(1) Some applications may require that a file system be placed on the media before use. mediainit does not create a file system; it only prepares media for writing and reading. If such a file system is required, other utilities such as newfs , lifinit , or mkfs must be invoked after running mediainit (see newfs(1M), lifinit(1), and mkfs(1M)). RETURN VALUE mediainit returns one of the following values: 0 1 2 Successful completion. A device-related error occurred.
merge(1) merge(1) NAME merge - three-way file merge SYNOPSIS merge [-p] file1 file2 file3 DESCRIPTION merge combines two files that are revisions of a single original file. The original file is file2, and the revised files are file1 and file3. merge identifies all changes that lead from file2 to file3 and from file2 to file1, then deposits the merged text into file1. If the -p option is used, the result goes to standard output instead of file1.
mesg(1) mesg(1) NAME mesg - permit or deny messages to terminal SYNOPSIS mesg mesg [ [-]g] [ [-]n] [ [-]y] DESCRIPTION The command form mesg [-]n forbids messages via write by revoking write permission to users without appropriate privilege on the user’s terminal (see write(1)). The command form mesg [-]g reinstates permission so that only legitimate commands (such as write ) can be used by other users to send messages.
mkdir(1) mkdir(1) NAME mkdir - make a directory SYNOPSIS mkdir [-p] [-m mode ] dirname ... DESCRIPTION mkdir creates specified directories in mode 0777 (possibly altered by umask unless specified otherwise by a -m mode option (see umask(1)). Standard entries, . (for the directory itself) and .. (for its parent) are created automatically. If dirname already exists, mkdir exits with a diagnostic message, and the directory is not changed.
mkdir(1) mkdir(1) mkdir returns exit code 0 if the -p option was specified, and all the specified directories now exist. If any of the intermediate directories do not have search or write permission (with the -p option), mkdir prints a diagnostic and returns non-zero.
mkfifo(1) mkfifo(1) NAME mkfifo - make FIFO (named pipe) special files SYNOPSIS mkfifo [-p] [-m mode ] filename ... DESCRIPTION mkfifo creates the FIFO special files named by its operand list. The operands are taken sequentially in the order specified and, if the user has write permission in the appropriate directory, the FIFO is created with permissions 0666 modified by the user’s file mode creation mask (see umask(2)).
mkmf(1) mkmf(1) NAME mkmf - make a makefile SYNOPSIS mkmf [-acdeil ] [-f makefile ] [-F template ] [-M language ] [ macroname=value ... ] DESCRIPTION The mkmf command creates a makefile that informs the make command how to construct and maintain programs and libraries (see make(1)).
mkmf(1) CFLAGS mkmf(1) C compiler flags. After searching for included files in the directory currently being processed, mkmf searches in directories named in -I compiler options and then in the /usr/include directory. COMPILESYSTYPE Location of /usr/include . If the COMPILESYSTYPE macro or environment mkmf searches for included files in variable is defined, /$COMPILESYSTYPE/usr/include instead of /usr/include . m CXXFLAGS C++ compiler flags.
mkmf(1) mkmf(1) Ratfor syntax, P = Pascal syntax). The following list shows the default configuration for mkmf : C C++ Fortran Include files Pascal include files Lex or Lisp Object files Pascal Ratfor Assembler Yacc .c:sC .C:sC++ .f:sF .h:h .i:h .l:sC .o:o .p:sP .r:sF .s:s .y:sC For example, to change the object file suffix to .obj , undefine the Pascal include file suffix, and prevent Fortran files from being scanned for included files, the SUFFIX macro definition could be: SUFFIX = .obj:o .i: .
mkmf(1) mkmf(1) -F template Specify an alternative makefile template path name. The path name can be relative or absolute. -M language Specify an alternative language-specific makefile template. The default language is C and the corresponding program and library makefile templates are C.p and C.l , respectively. mkmf looks for these templates in /usr/ccs/lib/mf or $PROJECT/lib/mf. DIAGNOSTICS Exit status 0 is normal. Exit status 1 indicates an error.
mkmsgs(1) mkmsgs(1) NAME mkmsgs - create message files for use by gettxt() SYNOPSIS mkmsgs [-i locale] [-o] textfile msgfile DESCRIPTION The mkmsgs command takes as input a file of localized text strings and generates a message file that can be accessed by the gettxt (3C) routine. textfile is the name of the file that contains the text strings. msgfile is the name of the output message file. mkmsgs appends the suffix .cat to the message file name.
mkstr(1) mkstr(1) NAME mkstr - extract error messages from C source into a file SYNOPSIS mkstr [-] messagefile prefix file ... DESCRIPTION mkstr examines a C program and creates a file containing error message strings used by the program. Programs with many error diagnostics can be made much smaller by referring to places in the file, and reduce system overhead in running the program.
mkstr(1) mkstr(1) EXTERNAL INFLUENCES Environment Variables LC_CTYPE determines the interpretation of comments and string literals as single- and/or multi-byte characters. If LC_CTYPE is not specified in the environment or is set to the empty string, the value of LANG is used as a default for each unspecified or empty variable. If LANG is not specified or is set to the empty string, a default of "C" (see lang(5)) is used instead of LANG .
mktemp(1) mktemp(1) NAME mktemp - make a name for a temporary file SYNOPSIS mktemp [-c] [-d directory_name ] [-p prefix ] DESCRIPTION mktemp makes a name that is suitable for use as the pathname of a temporary file, and writes that name to the standard output. The name is chosen such that it does not duplicate the name of an existing file. If the -c option is specified, a zero-length file is created with the generated name.
mm(1) mm(1) NAME mm, osdd - print documents formatted with the mm macros SYNOPSIS mm [ options ] [ files ] osdd [ options ] [ files ] DESCRIPTION mm can be used to format and print documents using nroff and the mm text-formatting macro package (see nroff(1)). It has options to specify preprocessing by tbl and/or neqn , (see tbl(1) and neqn(1)), and postprocessing by various terminal-oriented output filters.
mm(1) • mm(1) If you specify an incorrect output terminal type, mm produces (often subtle) unpredictable results. However, if you are redirecting output into a file, use the -T37 option, then use the appropriate terminal filter when actually printing the formatted file. SEE ALSO col(1), env(1), nroff(1), tbl(1), profile(4), term(4), mm(5).
model(1) model(1) NAME model - print hardware model information SYNOPSIS model DESCRIPTION model prints the machine hardware model. or other information. model may also display the manufacturer, product names, EXAMPLES The model output below indicates an Itanium(R)-based g4000 server from Hewlett-Packard. ia64 hp server g4000 The model output below is from an HP 9000 L-Class server.
more(1) more(1) NAME more, page - file perusal filter for screen viewing SYNOPSIS more [-n] [-cdefisuvz ] [-n number] [-p command] [-t tagstring] [-x tabs] [-W option] [+linenumber] [+/pattern] [name]... page [-n] [-cdefisuvz ] [-n number] [-p command] [-t tagstring] [-x tabs] [-W option] [+linenumber] [+/pattern] [name]... Remarks The pg command is preferred in some standards and has some added functionality, but does not support character highlighting (see pg(1)).
more(1) more(1) -v Do not display nonprinting characters graphically; by default, all non-ASCII and control characters (except Tab, Backspace, and Return) are displayed visibly in the form ˆx for Ctrl-x, or M- x for non-ASCII character x. -z Same as not specifying -v, with the exception of displaying Backspace as ˆH , Return as ˆM, and Tab as ˆI . -p command Execute the more command initially in the command argument for each file examined.
more(1) more(1) If the standard output is not a terminal device, more always exits when it reaches end-of-file on the last file in its argument list. Otherwise, for all files but the last, more prompts, with an indication that it has reached the end of file, along with the name of the next file. For the last file specified, or for the standard input if no file is specified, more prompts, indicating end-of-file, and accept additional commands.
more(1) if iCtrl-f ib iCtrl-b q Q :q :Q ZZ = :f more(1) Move forward i lines, with a default of one screenful. At end-of-file, more will continue with the next file in the list, or exit if the current file is the last file in the list. Move backward i lines, with a default of one screenful. If i is more than the screen size, only the final screenful will be written. Exit from more .
more(1) more(1) :e[file] E[file] Examine a new file. If the file argument is not specified, the "current" file (see the :n and :p commands) from the list of files in the command line is reexamined. The file name is subjected to the process of shell word expansions. If file is a # (number sign) character, the previously examined file is reexamined. i :n Examine the next file. If i is specified, examines the i-th next file specified in the command line. i :p Examine the previous file.
more(1) TERM more(1) Determines the name of the terminal type. International Code Set Support Single- and multibyte character code sets are supported. APPLICATION USAGE When the standard output is not a terminal, none of the filter-modification options is effective. This is based on historical practice. For example, a typical implementation of man pipes its output through more -s to squeeze excess white space for terminal users.
mpsched(1) mpsched(1) NAME mpsched - control the processor or locality domain on which a specific process executes SYNOPSIS mpsched mpsched mpsched mpsched mpsched -h -s -g command [-P policy] [-f] [-T policy] [-l locality-domain-id] [-c spu] command [-q] [-u] [-P policy] [-f] [-l locality-domain-id] [-c spu] {-p pid}... DESCRIPTION mpsched controls the processor (spu), or locality domain (locality-domain-id) on which a process executes.
mpsched(1) mpsched(1) can be used with the -T, -p, -c, and -l options. policy is one of the following values. RR Round robin launch policy. Under this policy, successive direct child processes of the specified command or process are launched in a round robin fashion across the other locality domains in the system relative to creating process. RR_TREE Tree based round robin launch policy.
mt(1) mt(1) NAME mt - magnetic tape manipulating program SYNOPSIS mt [-f tapename ] command [ count ] Obsolescent mt [-t tapename ] command [ count ] DESCRIPTION mt is used to give commands to the tape drive. If tapename is not specified, the environment variable TAPE is used; if TAPE is not defined, the default drive is used. mt winds the tape in the requested direction (forward or backward), stopping after the specified count EOF marks or records are passed. If count is not specified, one is assumed.
mt(1) mt(1) /dev/rmt/0mnb Default tape interface AUTHOR mt was developed by the University of California, Berkeley. SEE ALSO dd(1), mt(7), st(1M).
mv(1) mv(1) NAME mv - move or rename files and directories SYNOPSIS mv [-f-i] [-e extarg] file1 new-file mv [-f-i] [-e extarg] file1 [file2 ...] dest-directory mv [-f-i] [-e extarg] directory1 [ directory2 ... ] dest-directory DESCRIPTION The mv command moves: • One file (file1) to a new or existing file (new-file). • One or more files (file1, [file2, ...]) to an existing directory (dest-directory). • One or more directory subtrees (directory1, [directory2, ...
mv(1) mv(1) If new-file is a new file, it inherits the access control list of file1, altered to reflect any difference in ownership between the two files (see acl(5) and aclv(5)). In JFS file systems, new files created by mv do not inherit their parent directory’s default ACL entries (if any), but instead retain their original ACLs. When moving files from a JFS file system to an HFS file system or vice versa, optional ACL entries are lost.
mv(1) mv(1) AUTHOR mv was developed by AT&T, the University of California, Berkeley and HP. SEE ALSO cp(1), cpio(1), ln(1), rm(1), link(1M), lstat(2), readlink(2), stat(2), symlink(2), symlink(4), acl(5), aclv(5). STANDARDS CONFORMANCE mv: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.