HP-UX Reference (11i v2 07/12) - 1 User Commands A-M (vol 1)

k
ksh(1) ksh(1)
-f List or set the number of 512-byte blocks in files written by child processes (files of
any size can be read).
-s List or set the number of kilobytes in the size of the stack area.
-t List or set the number of seconds to be used by each process.
umask [ mask ]
The user file-creation mask is set to mask (see umask(2)). mask can either be an octal
number or a symbolic value as described in chmod(1). If a symbolic value is given, the new
umask value is the complement of the result of applying mask to the complement of the
previous umask value. If mask is omitted, the current value of the mask is printed. See
also umask(1).
unalias name ...
The parameters given by the list of names are removed from the alias list.
unset [ -f ] name ...
The parameters given by the list of names are unassigned; that is, their values and attri-
butes are erased. Read-only variables cannot be unset. If the
-f option is set, names
refer to function names. Unsetting
ERRNO,
LINENO, MAILCHECK , OPTARG, OPTIND,
RANDOM, SECONDS, TMOUT, and _ removes their special meaning even if they are subse-
quently assigned to.
% wait [job] Wait for the specified job to terminate or stop, and report its status. This status becomes
the return code for the
wait command. If job is not given, wait waits for all currently
active child processes to terminate or stop. The termination status returned is that of the
last process. See Jobs for a description of the format of a job.
whence [-pv ] name ...
For each name, indicate how it would be interpreted if used as a command name. The
-v
option produces a more verbose report. The -p option does a path search for name even if
name is an alias, a function, or a reserved word.
Invoking ksh
If the shell is invoked by
exec (see exec(2)), and the first character of argument zero (
$0)is-, the shell is
assumed to be a login shell and commands are read first from
/etc/profile . The expression
${HOME:-.}/.profile
is then evaluated and an attempt to open the resulting filename is made. If
the file is opened successfully, the file is read. Next, commands are read from the file named by performing
parameter substitution on the value of the environment parameter
ENV, if the file exists. If the
-s option
is not present and arg is, a path search is performed on the first arg to determine the name of the script to
execute. When running
ksh with arg, the script arg must have read permission and any setuid and getgid
settings are ignored. Commands are then read as described below. The following options are interpreted
by the shell when it is invoked:
-c string If the -c option is present, commands are read from string.
-s If the -s option is present or if no arguments remain, commands are read from the
standard input. Shell output, except for the output of some of the Special Commands
listed above, is written to file descriptor 2.
-i If the -i option is present or if the shell input and output are attached to a terminal,
the shell is interactive. In this case SIGTERM is ignored (so that kill 0 does not
kill an interactive shell) and SIGINT +1 is caught and ignored (so that wait is inter-
ruptible). In all cases, SIGQUIT is ignored by the shell. (See signal(5).)
-r If the -r option is present, the shell is a restricted shell.
The remaining options and arguments are described under the set command above.
rksh Only
rksh is used to set up login names and execution environments where capabilities are more controlled
than those of the standard shell. The actions of rksh are identical to those of ksh, except that the follow-
ing are forbidden:
Changing directory (see cd(1))
Setting the value of SHELL, ENV,orPATH
Specifying path or command names containing /
Redirecting output (>, >|, <>, and >>)
The restrictions above are enforced after the .profile and ENV files are interpreted.
486 Hewlett-Packard Company 17 HP-UX 11i Version 2: December 2007 Update