HP-UX Reference Section 1: User Commands (N-Z) HP-UX 11i Version 3 Volume 2 of 10 Manufacturing Part Number : B2355-91018 E0207 Printed in USA © Copyright 1983-2007 Hewlett-Packard Development Company LP.
Legal Notices The information in this document is subject to change without notice. Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. U.S. Government License Confidential computer software.
Copyright 1996 Morning Star Technologies, Inc. Copyright 1996 Progressive Systems, Inc. Trademark Notices Intel and Itanium are registered trademarks of Intel Corporation in the US and other countries and are used under license. Java is a US trademark of Sun Microsystems, Inc. Microsoft and MS-DOS are U.S. registered trademarks of Microsoft Corporation. OSF/Motif is a trademark of The Open Group in the US and other countries. UNIX is a registered trademark of The Open Group.
Preface HP-UX is the Hewlett-Packard Company’s implementation of a UNIX operating system that is compatible with various industry standards. It is based on the System V Release 4 operating system and includes important features from the Fourth Berkeley Software Distribution. The ten volumes of this manual contain the system reference documentation, made up of individual entries called manpages, named for the man command (see man (1)) that displays them on the system.
Typographical Conventions audit (5) An HP-UX manpage reference. For example, audit is the name and 5 is the section in the HP-UX Reference. On the web and on the Instant Information CD, it may be a hyperlink to the manpage itself. From the HP-UX command line, you can enter “man audit” or “man 5 audit” to view the manpage. See man (1). Book Title The title of a book. On the web and on the Instant Information CD, it may be a hyperlink to the book itself.
Command Syntax Literal A word or character that you enter literally. Replaceable A word or phrase that you replace with an appropriate value. -chars One or more grouped command options, such as -ikx. The chars are usually a string of literal characters that each represent a specific option. For example, the entry -ikx is equivalent to the individual options -i, -k, and -x. The plus character (+) is sometimes used as an option prefix. -word A single command option, such as -help.
Function Synopsis and Syntax HP-UX functions are described in a definition format rather than a usage format. The definition format includes type information that is omitted when the function call is actually included in a program. The function syntax elements are the same as for commands, except for the options; see “Command Syntax” on page 7. Function General Definition The general definition form is: type func ( type param [ , type param ]...
Revision History Part Number Release; Date; Format; Distribution B2355-60130 HP-UX 11i Version 3; February 2007; one volume HTML; http://docs.hp.com and Instant Information. B2355-91017-26 HP-UX 11i Version 3; February 2007; ten volumes PDF; http://docs.hp.com, Instant Information and print. B2355-60127 HP-UX 11i Version 1; September 2005 Update; one volume HTML; http://docs.hp.com and Instant Information. B2355-90902-11 HP-UX 11i Version 1; September 2005 Update; ten volumes PDF; http://docs.hp.
Volume Two Table of Contents Section 1
Volume Two Table of Contents Section 1
Table of Contents Volumes One and Two Section 1: User Commands Entry Name(Section): name Description intro(1): intro ..................................................... introduction to command utilities and application programs adb(1): adb ........................................................................................................................... absolute debugger adjust(1): adjust ...........................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description chkey(1): chkey .................................................................................................... change user’s secure RPC key chmod(1): chmod ...................................................................................... change file mode access permissions chown(1): chown, chgrp .........................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description echo(1): echo ................................................................................................................ echo (print) arguments echo: echo (print) arguments ............................................................................................................... see csh(1) echo: echo (print) arguments .........................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description for: execute a do list ................................................................................................................ see sh-posix(1) forder(1): forder .......................................................................................................... convert file data order foreach: initiate repetitive loop .....................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description kdestroy(1): kdestroy .............................................................................................. destroy Kerberos tickets kermit(1): kermit ........................ C-Kermit 8.0 communications software for serial and network connections: modem dialing, file transfer and management, terminal connections, character-set translation, numeric and alpha paging, and script programming keylogin(1): keylogin .............
Table of Contents Volumes One and Two Entry Name(Section): name Description lpfilter(1): divpage, fontdl, lprpp, plotdvr, printstat, reverse ........................................................................................................ filters invoked by lp interface scripts lprpp: filters invoked by lp interface scripts ............................................................................... see lpfilter(1) lpstat(1): lpstat .................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description nsquery(1): nsquery ........................................................... query the Name Service Switch backend libraries nsupdate(1): nsupdate ....................................................................................... Dynamic DNS update utility od(1): od, xd ......................................................................................................... octal and hexadecimal dump odump(1): odump ........
Table of Contents Volumes One and Two Entry Name(Section): name Description read(1): read ................................................................................................... read a line from standard input read: input and parse a line ................................................................................................................ see ksh(1) read: input and parse a line .....................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description slp(1): slp ...................................................................................... set printing options for a non-serial printer soelim(1): soelim ............................................................................................. eliminate .so’s from nroff input sort(1): sort ........................................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description umask: set permissions mask for creating new files ............................................................................. see ksh(1) umask: set permissions mask for creating new files ................................................................... see sh-posix(1) umodem(1): umodem ............................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description who(1): who ........................................................................................ who is currently logged in on the system whoami(1): whoami ........................................................................................... print effective current user ID whois(1): whois ......................................................................................
Notes 24 Hewlett-Packard Company HP-UX 11i Version 3: February 2007
Section 1 Part 2 User Commands N-Z
Section 1 Part 2 User Commands N-Z
named-checkconf(1) named-checkconf(1) (BIND 9.3) NAME named-checkconf - named configuration file syntax checking tool SYNOPSIS /usr/sbin/named-checkconf [-jvz ] [-t directory] [configfile] DESCRIPTION named-checkconf is a tool to check the syntax, but not the semantics, of the configuration file for named . Options -j When loading a zone file, read the journal if it exists.
named-checkzone(1) named-checkzone(1) (BIND 9.3) NAME named-checkzone - zone validity checking tool SYNOPSIS /usr/sbin/named-checkzone [-Ddjqv ] [-c class] [-k mode] [-n mode] [-o outfile] [-t directory] [-w directory] zonename [filename] DESCRIPTION named-checkzone is a tool for performing integrity checks on the zone contents. It uses the same integrity checks as the named daemon when loading a zone. This makes named-checkzone useful for checking zone files before configuring them into a name server.
named-checkzone(1) named-checkzone(1) (BIND 9.3) BIND 9 Administrator Reference Manual, available from the Internet Systems Consortium at http://www.isc.org/sw/bind/arm93.
neqn(1) neqn(1) NAME neqn - format mathematical text for nroff SYNOPSIS neqn [-dxy] [-sn] [-fn] [-pn] [file]... Remarks The output of neqn is very device-dependent. See the WARNINGS section. The examples shown approximate the results in a dtterm window. To see the actual results on an output device, send the output of the man neqn command directly to the device. DESCRIPTION neqn is a preprocessor for nroff (see nroff(1)) for typesetting mathematical text on typewriter-like terminals.
neqn(1) neqn(1) Fractions Fractions are produced by using over : Source Text Result a over b a _ b Square Roots sqrt produces square roots: Source Text Result 1 over sqrt {ax sup 2+bx+c} _____1____ ________ \|ax2+bx+c Upper and Lower Limits The keywords from and to specify lower and upper limits: Source Text Result lim from {n -> inf } sum from 0 to n x sub i n lim Rx n->oo0 i Brackets and Braces Left and right brackets, braces, and such, of proper height are made with left and right : Source
neqn(1) neqn(1) Matrices and Determinants Matrices are made with matrix : Source Text Result left | { matrix { lcol { x sub i above y sub 2 } ccol { 1 above 234 } } } right | |xi | |y2 | 1 | | 234| | In addition, there is rcol for a right-aligned column. Diacritical Marks Diacritical marks are made with dot , dotdot , hat , tilde , bar , vec , dyad , and under : n Source Text Result x dot = f(t) bar . ____ x=f(t) y dotdot bar ˜=˜ n under __ ..
neqn(1) neqn(1) Options neqn accepts the following options: -dxy Define the characters x and y as the start and end in-text delimiter characters. See the Delimiters subsection. -fn Change the font number globally for the output equations in the document to n. See the Point Sizes and Fonts subsection. -pn Reduce subscript and superscript point sizes by n points from the normal size. See the Point Sizes and Fonts subsection.
netstat(1) netstat(1) NAME netstat - show network status SYNOPSIS netstat netstat netstat netstat netstat netstat [-an ] [-f address-family ] [ system ] [-an ] [-f address-family ] [ system [ core ]] # PA-RISC only [-Mnrsv ] [-f address-family ] [-p protocol ] [ system ] [-Mnrsv ] [-f address-family ] [-p protocol ] [ system [ core ]] # PA-RISC only [-ginw ] [-I interface ] [ interval ] [ system ] [-ginw ] [-I interface ] [ interval ] [ system [ core ]] # PA-RISC only DESCRIPTION netstat displays
netstat(1) netstat(1) -p protocol Show statistics for the specified protocol. The following protocols are recognized: -r tcp , udp , ip, icmp , igmp , ipv6 , and icmpv6 . Show the routing tables. When -v is used with the -r option, netstat also displays the network masks in the route entries. This option is ignored if the -g , -i, -I, -p or interval option is specified and is invalid if the -s option is specified. -s Show statistics for all protocols.
netstat(1) netstat(1) The Prefix field is for IPv6 only. Its format is similar to the CIDR notation in IPv4. The prefix is an integer between 0 and 128 inclusive. It specifies how many of the leftmost contiguous bits of the address comprise the prefix. A host route has a prefix of 128. A default route has a prefix of 0 (see route(1M)). The prefix is also used in selecting a route to forward an IPv6 packet. DEPENDENCIES X.25 -a option does not list X.25 programmatic access information.
newalias(1) newalias(1) NAME newalias - install new elm aliases for user or system SYNOPSIS newalias [-g] Remarks newalias replaces the former functionality of the elmalias command. DESCRIPTION The newalias command creates new alias database files from an alias text file for use by elm and other programs. For user aliases, this functionality can also be performed from the Alias Menu of the elm program (see elm(1)). Options newalias recognizes the following option: -g Global.
newalias(1) firstname newalias(1) The first name of the person (or group). It is combined with lastname to form the fullname. This field can contain any characters except an unquoted equal sign (=) or an unquoted comma (,). See the Quoting Characters subsection. The only first name under the Personal or Group Aliases subheading below is: John in Smith; John . lastname The last name of the person (or group). It is combined with firstname to form the fullname.
newalias(1) newalias(1) AUTHOR newalias was developed by HP. SEE ALSO elm(1), elmalias(1), mail(1), mailx(1).
newform(1) newform(1) NAME newform - change or reformat a text file SYNOPSIS newform [-an] [-bn] [-ck] [-en] [-f] [-itabspec] [-ln] [-otabspec] [-pn] [-s]... [file]... DESCRIPTION newform reads lines from the named files, or standard input if no input file is named, and reproduces the lines on standard output. Lines are reformatted in accordance with command line options in effect. Command line options can appear in any order, can be repeated, and can be intermingled with the optional files.
newform(1) newform(1) For example, to convert a file with leading digits, one or more tabs, and text on each line, to a file beginning with the text, all tabs after the first expanded to spaces, padded with spaces out to column 72 (or truncated to column 72), and the leading digits placed starting at column 73, the command would be: newform -s -i -l -a -e file-name RETURN VALUE newform returns one of the following values: 0 1 No errors encountered. An error occurred.
newgrp(1) newgrp(1) NAME newgrp - switch to a new group SYNOPSIS newgrp [-] [group] DESCRIPTION The newgrp command changes your group ID without changing your user ID and replaces your current shell with a new one. If you specify group, the change is successful if group exists and either your user ID is a member of the new group, or group has a password and you can supply it from the terminal. If you omit group, newgroup changes to the group specified in your entry in the password file, /etc/passwd .
newgrp(1) newgrp(1) SEE ALSO csh(1), ksh(1), login(1), sh-posix(1), group(4), passwd(4), environ(5).
newmail(1) newmail(1) NAME newmail - notify users of new mail in mailboxes SYNOPSIS newmail [-i interval] [-w] [file-spec]... DESCRIPTION The newmail utility monitors your incoming mailbox or specified mail folders. The basic operation is that the program checks the folders each interval seconds (default 60) and lists any new mail that has arrived in any of the mailboxes, indicating the sender’s name, and the subject of the message.
news(1) news(1) NAME news - print news items SYNOPSIS news [-a] [-n] [-s] [ items ] DESCRIPTION news is used to keep the user informed of current events. By convention, these events are described by files in the directory /var/news . When invoked without arguments, news prints the contents of all current files in /var/news , most recent first, with each preceded by an appropriate header. news stores the ‘‘currency’’ time as the modification date of a file named .
nice(1) nice(1) NAME nice - run a command at nondefault priority SYNOPSIS nice [-priority_change] command [command_args] nice [-n priority_change] command [command_args] DESCRIPTION The nice command executes command at a nondefault CPU scheduling priority. (The name is derived from being "nice" to other system users by running large programs at lower priority.
nice(1) nice(1) from a login shell whose current nice value is 20 spawns a subshell with a system nice value of 30. Attempting to use nice --2 ksh from the new shell to spawn another subshell whose system nice value would be 28, is rejected (unless the user has appropriate privileges), even though the resulting system nice value would be less than the priority of the original login shell process.
nl(1) nl(1) NAME nl - line numbering filter SYNOPSIS nl [-btype ] [-htype ] [-ftype ] [-p] [-vstart# ] [-iincr ] [-ssep ] [-wwidth ] [-nformat ] [-lnum ] [-ddelim ] [ file ] DESCRIPTION nl reads lines from the named file or the standard input if no file is named and reproduces the lines on the standard output. Lines are numbered on the left in accordance with the command options in effect. nl views the text it reads in terms of logical pages. Line numbering is reset at the start of each logical page.
nl(1) nl(1) appear between the -d and the delimiter characters, however, this restriction is not there for UNIX Standard (see standards(5)) compliant nl . To define a backslash as the delimiter, use two backslashes. EXTERNAL INFLUENCES For information about the UNIX Standard environment, see standards(5). Environment Variables LC_COLLATE determines the collating sequence used in evaluating regular expressions.
nljust(1) nljust(1) NAME nljust - justify lines, left or right, for printing SYNOPSIS nljust [-acilnt ] [-d digits ] [-e seq ] [-j just ] [-m mode ] [-o order ] [-r margin ] [-w width ] [-x ck ] [ file ... ] DESCRIPTION nljust formats for printing data written in languages with a right-to-left orientation. It is designed to be used with the pr and the lp commands (see pr(1) and lp(1)).
nljust(1) nljust(1) setting. If this option is specified, at least one of the parameters c or k must be given. -r margin Designate a number as the print margin. The print margin is the column where truncation or folding takes place. The print margin determines how many characters appear on a single line and can never exceed the print width. The print margin is relative to the justification.
nm(1) nm(1) NAME nm - print name list of common object file SYNOPSIS /usr/ccs/bin/nm [-ACefghlnNqrsTuUvV] [-d-o-x] [-p-P] [-t format] file ... DESCRIPTION The nm command displays the symbol table of each object file, file. There are three general output formats: the default (neither -p nor -P specified), -p specified, and -P specified. The output formats are described after the "Options" subsection. By default, nm prints the entire name of the symbols listed.
nm(1) nm(1) -r Prefix each output line with the name of the object file or archive, file. Equivalent to -A. -q -s -t format (SOM only) Silence some warning messages. Print the section index instead of the section name (ELF only). Display each numeric value in the specified format. format can be one of: d Display the value and size of a symbol in decimal. This is the default for the default format or the -p format. Equivalent to -d . o x Display the value and size of a symbol in octal.
nm(1) nm(1) name The name of the symbol. value Its value expressed as an offset or an address depending on its storage class. scope The scope of the symbol (external , sdef , static , or undefined ). The sdef scope indicates an external symbol that is flagged as a secondary definition. type The type of the symbol (absolute , arg_ext , code , data , entry , milli_ext , millicode , module , null , oct_dis , plabel , pri_prog , sec_prog , storage , stub , sym_ext , tstor ).
nm(1) nm(1) "%s[%s]:\n", file, object-file EXTERNAL INFLUENCES Environment Variables The following internationalization variables affect the execution of nm : LANG determines the locale category for native language, local customs and coded character set in the absence of LC_ALL or other LC_ * environment variables. If LANG is not specified or is null, it defaults to C (see lang(5)).
nohup(1) nohup(1) NAME nohup - run a command immune to hangups SYNOPSIS nohup command [ arguments ] DESCRIPTION nohup executes command with hangups and quits ignored. If output is not redirected by the user, both standard output and standard error are sent to nohup.out . If nohup.out is not writable in the current directory, output is redirected to $HOME/nohup.out; otherwise, nohup fails. If a file is created, the file’s permission bits will be set to S_IRUSR | S_IWUSR .
nohup(1) 127 nohup(1) An error occurred in the nohup utility or the specified command could not be found Otherwise, the exit status of nohup will be that of the command specified. SEE ALSO chmod(1), nice(1), sh(1), signal(5). STANDARDS CONFORMANCE nohup : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
nroff(1) nroff(1) NAME nroff - format text SYNOPSIS nroff [ options ] file ... DESCRIPTION nroff is a text formatting program that interprets source text contained in file and prepares it for printing on typewriter-like devices and line printers. If file name is - or not specified, standard input is used as source text.
nroff(1) nroff(1) 2631 klp lj for the Hewlett-Packard 2631 line printer for a (generic) 16-bit character printer having ratio of 2 to 3 in 8-bit and 16-bit character width for Hewlett-Packard PCL3 and newer laser printers. -e Produce equally-spaced words in adjusted lines, using the full resolution of the particular terminal. -h Use output tabs during horizontal spacing to speed output and reduce output character count. Tab settings are assumed to be every eight nominal character widths.
nslookup(1) nslookup(1) (BIND 9.3) NAME nslookup - query name servers interactively SYNOPSIS Single Host Mode nslookup [-swdebug ] [-setoption]... host [server ] Interactive Mode nslookup [-swdebug ] [-setoption]... [- [server ] ] DESCRIPTION The nslookup program queries Internet domain name servers. It follows the configured name resolution algorithm of the host and queries NIS, DNS, and host tables.
nslookup(1) nslookup(1) (BIND 9.3) The following hosts name services are recognized: dns files nis Use the servers defined in the /etc/resolv.conf file. Use the entries in the /etc/hosts file. Use the maps at the NIS server. Note: NIS+ is not supported by nslookup . If the nisplus name service is included in the hosts database, it is ignored. If there is no hosts database in the /etc/nsswitch.conf file or there /etc/nsswitch.conf file, nslookup uses this name service sequence: dns nis files .
nslookup(1) nslookup(1) (BIND 9.3) The output can create/overwrite (>) or append to (>> ) filename. When output is directed to a file, a # character is printed to standard output for every 50 records received from the server. lserver domain See the server command. policy Print out the policy read from the hosts database in the switch configuration file (see nsswitch.conf(4)).
nslookup(1) nslookup(1) (BIND 9.3) IN CHAOS HESIOD ANY The Internet class. The Chaosnet class. The MIT Athena Hesiod class. Wildcard (any of the above). The class specifies the protocol group of the information. The default is class=IN . [no]d2 Turn on [turn off] exhaustive debugging mode. Essentially all fields of every packet are printed. The default is nod2 . [no]deb [ug ] Turn on [turn off] debugging mode. More information is printed about the packet sent to the server and the resulting answer.
nslookup(1) nslookup(1) (BIND 9.3) information. The default is recurse . ret [ry]=number Set the number of retries to number. When a reply to a request is not received within a certain amount of time (changed with the set timeout command ), the timeout period is doubled and the request is resent. The retry value controls how many times a request is resent before giving up. The default is retry=4 . ro[ot]=host Change the name of the root server to host. This affects the root command.
nslookup(1) nslookup(1) (BIND 9.3) EXAMPLES To change the default query type to host information and the initial timeout to 10 seconds, and enter interactive mode: nslookup -query=hinfo -timeout=10 AUTHOR nslookup was developed by the Internet Systems Consortium (ISC). FILES $HOME/.nslookuprc /etc/hosts /etc/nsswitch.conf /etc/resolv.conf User’s initial options. Host name data base. Configuration file for the name-service switch. Initial domain name and name server addresses.
nsquery(1) nsquery(1) NAME nsquery - query the Name Service Switch backend libraries SYNOPSIS nsquery lookup_type lookup_query [lookup_policy] DESCRIPTION nsquery is used to find the Name Service that returned the response to a getaddrinfo(), gethostbyname() , gethostbyaddr(), getnameinfo(), getpwnam() , getpwuid() , getgrnam() , or getgrgid() function call. This application is Name Service Switch aware and follows the lookup policies in /etc/nsswitch.conf.
nsquery(1) nsquery(1) AUTHOR nsquery was developed by Hewlett-Packard. SEE ALSO nsswitch.conf(4).
nsupdate(1) nsupdate(1) (BIND 9.3) NAME nsupdate - Dynamic DNS update utility SYNOPSIS nsupdate [-dv] [-k keyfile | -y keyname :secret] [-r udpretries] [-t timeout] [-u udptimeout] [filename] DESCRIPTION nsupdate submits Dynamic DNS update requests to a name server, as defined in RFC 2136. This allows resource records to be added to or removed from a zone without manually editing the zone file. A single update request can contain requests to add or remove more than one resource record.
nsupdate(1) nsupdate(1) (BIND 9.3) Operands filename A file of nsupdate commands, as described in the Input Format section. The default is standard input. Input Format nsupdate reads commands from filename or standard input. Each command is supplied on exactly one line of input. Some commands are for administrative purposes; others are either update instructions or prerequisite checks on the contents of the zone.
nsupdate(1) nsupdate(1) (BIND 9.3) update delete domain-name class type data... Deletes any resource records named domain-name. If type and data are provided, only matching resource records will be removed. The Internet class (IN ) is assumed if class is not supplied. update add domain-name ttl class type data... Adds a new resource record with the specified ttl, class and data. show Displays the current message, containing all the prerequisites and updates specified since the last send operation.
nsupdate(1) nsupdate(1) (BIND 9.3) BIND 9 Administrator Reference Manual, available from the Internet Systems Consortium at http://www.isc.org/sw/bind/arm93.
od(1) od(1) NAME od, xd - octal and hexadecimal dump SYNOPSIS od [-v] [-A address_base ] [-j skip ] [-N count ] [-t type_string ] ... [ file ... ] xd [-v] [-A address_base ] [-j skip ] [-N count ] [-t type_string ] ... [ file ... ] Supported Pre-POSIX Usage od [-bcdosx ] [ file ] [ [+] [0x]offset[.] [b] ] xd [-bcdosx ] [ file ] [ [+] [0x]offset[.] [b] ] DESCRIPTION od and xd concatenate one or more input files and write their contents to standard output in a userspecified format.
od(1) od(1) order in which the type specification characters appear. -v Write all input data. Without the -v option, any number of groups of output lines, that would be identical to the immediately preceding group of output lines (except for the byte offsets), are replaced with a line containing only an asterisk (*). file Pathname of one or more input files to be processed. If file is not specified, the standard input is used. Input files can be any file type.
od(1) od(1) • When the number of input bytes used for transformation is set to 1 with the type specifier characters d, o, u, or x, only the least-significant seven bits of each byte are used. • When one or more of the -A, -j , -N , or -t options is specified, an operand starting with the first character as a plus-sign (+) or the first character as numeric is interpreted as a file name. (UNIX Standard only, see standards(5). Multiple types can be specified by using multiple -bcdox options.
odump(1) odump(1) (PA-RISC System Only) NAME odump - dump information contained in SOM object files SYNOPSIS odump [-option...] file... DESCRIPTION odump takes one or more 32-bit native code files (object files, shared and archive libraries, executables) and dumps information about them. Note : odump skips non-SOM input files and issues a warning. $ odump -all /usr/lib/pa20_64/libc.sl File is not a SOM, skipping: /usr/lib/pa20_64/libc.sl.
odump(1) odump(1) (PA-RISC System Only) V - - - -lststringtable -nclist -octoutput -recover -silent V - - -sldatalinktbl -sldlexporthash V V - - -sldlheader -sldlheaderext V - - -sldlimporthash V - - -sldlplabelhash V - - -sldynamrel V V V - T - -slexportext -slexportlist -slfastbind -slfbdynamrel -slfbhdr -slfbimpexp -slfblibver -slfbmodbound -slhashtbl -slimportlist -slliblist - - - -sllibloadlist V V T - - -sllibsearch -slmodule -slmoduledyn V - - -slmoduleimp -
odump(1) odump(1) (PA-RISC System Only) V - T - - -symver -toolbssmap -toolcompmap -toolsubspmap -unwind -usage -verbose # - - - -verify - - - -verifyall - - - -version Print Versioned symbols Print the linker bss subspace map Print the linker compilation unit map Print the linker subspace map Print the stack unwind table Print the help screen Set verbosity level for tables that follow, 0=default Verify correctness of tables before they are printed Verify correctness of tables that have ve
odump(1) odump(1) (PA-RISC System Only) 0 1 2 LD... LDP.. .DP.. 8 16 80 1 0 2 0 8 17 8 9 5 -1 -1 -1 0 0 0 0 1 -1 1 1 0 $TEXT$ $PRIVATE$ $DEBUG$ AUTHOR odump was developed by HP. SEE ALSO System Tools ld(1) Miscellaneous a.
on(1) on(1) NAME on - execute command on remote host with environment similar to local SYNOPSIS on [-i -n] [-d] host [ command [ argument ] ... ] DESCRIPTION on executes a command on a remote host, using an environment similar to that of the invoking user where: host specifies the name of the host on which to execute the command. command specifies the command to execute on host If command is not specified, on starts a shell on host. argument ... is a list of arguments for command.
on(1) on(1) on: standard input (stdin) is not a tty The standard input (stdin) of the on command with the -i option is not a tty device. on server : rexd: message Errors that occur on the server server are propagated back to the client. These messages are documented in the DIAGNOSTICS section of rexd(1M). AUTHOR on was developed by Sun Microsystems, Inc. SEE ALSO exports(4), rexd(1M).
pack(1) pack(1) NAME pack, pcat, unpack - compress and expand files using Huffman code SYNOPSIS pack [-] [-f] name... pcat name... unpack name... DESCRIPTION pack attempts to store the specified files in a compressed form. Wherever possible, each input file name is replaced by a packed file name .z with the same ownership, modes, and access and modification times. The -f option forces packing of name. This is useful for causing an entire directory to be packed even if some of the files do not benefit.
pack(1) pack(1) pcat returns the number of files it was unable to unpack. Failure may occur if: • The file name (exclusive of the .z ) has more than 12 characters; • The file cannot be opened; • The file does not appear to have been created by pack. unpack expands files created by pack . For each file name specified in the command, a search is made for a file called name .z (or just name if name ends in .z ). If this file appears to be a packed file, it is replaced by its expanded version.
parstatus(1) parstatus(1) NAME parstatus - display information about a hardware partitionable complex SYNOPSIS parstatus [ [ -u username [:] -h IPaddress|hostname ] | [ -g -h IPaddress|hostname ] ] parstatus -s [ [ -u username [:] -h IPaddress|hostname ] | [ -g -h IPaddress|hostname ] ] parstatus -w [-M] [ -u username [:] -h IPaddress|hostname ] parstatus -X [ [ -u username [:] -h IPaddress|hostname ] | [ -g -h IPaddress|hostname ] ] parstatus -C|-I [-A] [-M] [ [ -u username [:] -h IPaddress|hostname ] |
parstatus(1) parstatus(1) slot 1 is locally identified as 0/1 or globally as 1. -g Allows access to the complex specified by the -h option. The accessed complex is then considered the target complex. Access is through the service processor’s LAN port. The -h option is required if this option is used. If this option is specified, the command prompts for the password.
parstatus(1) parstatus(1) * Memory interleaving / local memory settings * Cells summary information * I/O chassis summary information For Cell: * Details of each cpu on the cell * Details of memory on the cell * Memory interleaving / local memory settings -w Display the local partition number in a full sentence. If the -u option connects to another partition, that partition number is reported instead. The -M option restricts the display to just the partition number. -X Display the complex attributes.
parstatus(1) parstatus(1) Example 2 The following example displays information for all major components that are physically present in the local complex. No action is specified for the command; the default behavior is to display all.
parstatus(1) [Partition] Par Num Status === ============ 0 Active 1 Active 2 Active parstatus(1) # of Cells ===== 2 3 2 # of I/O Chassis ======== 1 2 1 Core cell ========== cab0,cell0 cab0,cell6 cab0,cell4 Partition Name (first 30 chars) =============================== cup2000 cup2006 cup2004 [Partition - Multithread] Par Num Multithreading Enabled ======= ====================== 0 no 1 no 2 no DEPENDENCIES This command uses the Web-Based Enterprise Management (WBEM) product and some of its configurat
passwd(1) passwd(1) NAME passwd - change login password and associated attributes SYNOPSIS passwd passwd passwd passwd passwd passwd passwd passwd [name] -r -r -r -r -r -r -r files [-F file] [name] files [-e [shell] ] [-gh] [name] files -s [-a] files -s [name] files [-d-l] [-f] [-n min] [-w warn] [-x max] name nis [-e [shell] ] [-gh] [name] dce [-e [shell] ] [-gh] [name] DESCRIPTION The passwd command modifies the password as well as the attributes associated with the login name.
passwd(1) passwd(1) The format of the display will be: name status mm/dd/yy min max warn or, if password aging information is not present name status where status means: PS =passworded ; LK =locked ; and NP =no password . -a Display some password attributes for all users in the password file. The -a option must be used in conjunction with the -s option, with no name specified. For files , this is restricted to superuser. For a more complete display of attributes use the logins -x command.
passwd(1) passwd(1) PASSWORD_WARNDAYS Password Construction Requirements Passwords must be constructed to meet the following requirements: • On a standard system, only the first eight characters of a password are significant. • The default minimum password length is six characters for non-root users on a standard system and for all users on a trusted system. See the description of the MIN_PASSWORD_LENGTH attribute in security(4) for information on how to change this restriction.
passwd(1) User-supplied passwd(1) A user-supplied password, subject to length and triviality restrictions. Passwords can be greater than eight characters, but it is recommended that they be less than 40 characters. System warnings are displayed if passwords lengths are either too long or short. The system administrator can specify a maximum password length guideline for the system generated options (random syllables, random characters, and random letters).
passwd(1) passwd(1) SEE ALSO chfn(1), id(1), login(1), su(1), auth.adm(1M), logins(1M), pwconv(1M), getuid(2), crypt(3C), passwd(4), security(4), shadow(4). HP-UX System Administrator’s Guide Pluggable Authentication Modules (PAM) pam_chauthtok(3), pam(3), pam.conf(4), pam_user.conf(4). HP-UX Smart Card Login scpin(1), scsync(1).
paste(1) paste(1) NAME paste - merge same lines of several files or subsequent lines of one file SYNOPSIS paste file1 file2 ... paste -d list file1 file2 ... paste -s [-d list ] file1 file2 ... DESCRIPTION In the first two forms, paste concatenates corresponding lines of the given input files file1, file2, etc. It treats each file as a column or columns in a table and pastes them together horizontally (parallel merging).
paste(1) paste(1) ls | paste -d" " List directory in four columns ls | paste - - - Combine pairs of lines into lines paste -s -d"\t\n" file Notes pr -t -m... works similarly, but creates extra blanks, tabs and new-lines for a nice page layout. DIAGNOSTICS too many files Except for the -s option, no more than OPEN_MAX − 3 input files can be specified (see limits(5)). AUTHOR paste was developed by OSF and HP. SEE ALSO cut(1), grep(1), pr(1).
patch(1) patch(1) NAME patch - program to apply a diff file to an original file SYNOPSIS patch [options] orig patchfile [+[ options] orig] patch
patch(1) patch(1) Additionally, if the leading garbage contains a Prereq: line, patch will take the first word from the prerequisites line (normally a version number) and check the input file to see if that word can be found. If not, patch will ask for confirmation before proceeding. The upshot of all this is that you should be able to say, while in a news interface, the following: | patch -d /usr/src/local/blurfl and patch a file in the blurfl directory directly from the article containing the patch.
patch(1) patch(1) -p number sets the path name strip count, which controls how path names found in the patch file are treated, in case the you keep your files in a different directory than the person who sent out the patch. The strip count specifies how many backslashes are to be stripped from the front of the path name. (Any intervening directory names also go away.) For example, supposing the file name in the patch file was /u/howard/src/blurfl/blurfl.
patch(1) patch(1) 1 One or more lines were written to a reject file. >1 An error occurred. For the non-UNIX Standard version, exit values vary as follows: 0 1 Successful completion or one or more lines were written to a reject file. An error occurred. DIAGNOSTICS Most error messages indicate that patch could not parse your patch file. The message Hmm...
pathalias(1) pathalias(1) NAME pathalias - electronic address router SYNOPSIS pathalias [-ivcDf ] [-l host ] [-d link ] [-t link ] [ files ] DESCRIPTION pathalias computes the shortest paths and corresponding routes from one host (computer system) to all other known, reachable hosts. pathalias reads host-to-host connectivity information on standard input or in the named files, and writes a list of host-route pairs on the standard output.
pathalias(1) pathalias(1) Some examples: down princeton topaz princeton!(DEDICATED), tilt, %thrash(LOCAL) topaz!(DEMAND+LOW) @rutgers(LOCAL+1) If a link is encountered more than once, the least-cost occurrence dictates the cost and network character. Links are treated as bidirectional but asymmetric: for each link declared in the input, a DEAD reverse link is assumed.
pathalias(1) pathalias(1) Input from compressed (and uncompressed) files can be piped into pathalias with the following script. for i in $*; do case $i in *.Z) echo "file {‘expr $i : ’).
pathalias(1) pathalias(1) -g file Dump graph edges into file in the form host >host for simple connections and host@host for network connections (from hosts to networks only). -s file Dump shortest path tree into file in the form host[@]host[!](cost ), including both connections from hosts to networks and from networks to hosts. This data may be useful for generating lists of one-way connections. BUGS The -i option should be the default. The order of arguments is significant.
pathchk(1) pathchk(1) NAME pathchk - check path names SYNOPSIS pathchk [-p] pathname... DESCRIPTION The pathchk command checks that one or more path names are valid and portable. By default, the pathchk command checks each component of each path name specified by the pathname parameter based on the underlying file system. An error message is written for each path name operand that: • is longer than that allowed by the system. • contains any component longer than that allowed by the system.
pathchk(1) pathchk(1) STANDARDS CONFORMANCE pathchk : XPG4, POSIX.
pax(1) pax(1) NAME pax - extracts, writes, and lists archive files; copies files and directory hierarchies SYNOPSIS Listing Member Files of Archived Files pax [-cdnv ] [-H|-L] [-f archive ] [-o options]... [-s replstr]... [pattern]... Extracting Archive Files pax -r [-cdiknuvy ] [-H|-L] [-f archive ] [-o options]... [-p string ]... [-s replstr]... [pattern]... Writing Archive Files pax -w [-adituvXy ] [-H|-L] [-b blocking] [-f archive] [-o options]... [-s replstr]... [-x format] [file]...
pax(1) pax(1) of the files in the file hierarchy rooted at the file. copy In copy mode (when both -r and -w are specified), pax shall copy the file operands to the destination directory. If no file operands are specified, a list of files to copy, one per line, shall be read from the standard input. A file of type directory shall include all of the files in the file hierarchy rooted at the file.
pax(1) pax(1) -l Links files when copying files. When both -r and -w are specified, hard links are established between the source and destination file hierarchies whenever possible. -L If a symbolic link referencing a file of type directory is specified on the command line or encountered during the traversal of a file hierarchy, pax shall archive the file hierarchy rooted in the file referenced by the link, using the name of the link as the root of the file hierarchy.
pax(1) pax(1) %f The filename of the file, equivalent to the result of the basename utility on the translated pathname. %p The process ID of the pax process. %% A ’%’ character. If there are any other ’%’ characters in string , or if no -o exthdr.name= string is specified, pax shall use the following default value: %d/PaxHeaders.%p/%f globexthdr.name=string (Applicable only to the -x pax format.
pax(1) pax(1) are specified, the format strings shall be considered a single, concatenated string, evaluated in command line order. times (Applicable only to the -x pax format.) When used in write or copy mode, pax shall include atime and mtime extended header records for each file. See pax Extended Header File Times.
pax(1) pax(1) whereas in the ed command, old is a basic regular expression and new can contain an & (ampersand), \n (n is a digit) back references, or subexpression matching. The old string can also contain newline characters. Any non-null character can be used as a delimiter (the / (slash) character is the delimiter in the previous format). Multiple -s flag expressions can be specified; the expressions are applied in the order specified, terminating with the first successful substitution.
pax(1) pax(1) Option Interaction and Processing Order Specifying more than one of the mutually-exclusive options -H and -L shall not be considered an error and the last option specified shall determine the behavior of the utility. The flags that operate on the names of files or archive members (-c , -i , -n , -s , -u , and -v ) interact as follows.
pax(1) pax(1) in each format. The result of the keyword conversion argument shall be the value from the applicable header field or extended header, without any trailing NULL characters. 7. An additional conversion specifier character, T, shall be used to specify time formats. The T conversion specifier character can be preceded by the (keyword =subformat ) sequence where subformat is a date format as defined by date operands.
pax(1) pax(1) header structure. ustar Interchange Format A ustar archive tape or file shall contain a series of logical records. Each logical record shall be a fixedsize logical record of 512 bytes. Each file archived shall be represented by a header logical record that describes the file, followed by zero or more logical records that give the contents of the file.
pax(1) pax(1) chksum The octal value of the simple sum of all bytes in the header logical record. Each bytes in the header shall be treated as an unsigned value. When calculating the checksum, the chksum field is treated as if it were all spaces. magic The magic field is the specification that this archive was output in this archive format.
pax(1) pax(1) the following single file after a typeflag x extended header, but possibly multiple files after typeflag g. Any requirements in the list for pax to include a record when in write or copy mode shall apply only when such a record has not already been provided through the use of the -o option. When used in copy mode, pax shall behave as if an archive had been created with applicable extended header records and then extracted.
pax(1) pax(1) Unlike the ustar header block fields, NULs shall not delimit values; all characters within the value field shall be considered data for the field. None of the length limitations of the ustar header block fields in ustar Header Block shall apply to the extended header records. pax Extended Header Keyword Precedence This section describes the precedence in which the various header records and fields and command line options are selected to apply to a file in the archive.
pax(1) pax(1) (cd pax tar pax tar pax (cd pax /fromdir;find . -print) | cpio -pdlum /todir -rwl /fromdir /todir cf archive * -w -f archive * xfv - < archive -rv < archive /fromdir; tar cf - . ) | (cd /todir; tar xf -) -rw /fromdir /todir Note: When you use the -i flag (interactively renames files) on files to which there are hard links, pax does not create hard links to the renamed files.
pg(1) pg(1) NAME pg - file perusal filter for soft-copy terminals SYNOPSIS pg [-number ] [-pstring ] [-cefnrs ] [+linenumber ] [+/ pattern ] [ file ... ] Remarks pg and more are both used in similar situations (see more(1)). Text highlighting features supported by more are not available from pg. However, pg has some useful features not provided by more . DESCRIPTION pg is a text file filter that allows the examination of files one screenful at a time on a soft-copy terminal.
pg(1) pg(1) or line; an unsigned address specifies an address relative to the beginning of the file. Each command has a default address that is used if none is provided. Perusal commands and their defaults are as follows: (+1) or Displays one page. The address is specified in pages. (+1) l With a relative address, pg simulates scrolling the screen, forward or backward, the number of lines specified. With an absolute address pg prints a screenful beginning at the specified line.
pg(1) pg(1) EXTERNAL INFLUENCES Environment Variables LC_COLLATE determines the collating sequence used in evaluating regular expressions. LC_CTYPE determines the interpretation of text as single and/or multi-byte characters, and the characters matched by character class expressions in regular expressions. LANG determines the language in which messages are displayed.
pgrep(1) pgrep(1) NAME pgrep, pkill - search or kill processes based on process name and attributes SYNOPSIS pgrep [-flvx ] [-n|-o] [-d dlim] [-e etimelist] [-g pgrplist] [-G grouplist] [-P ppidlist] [-R prmgrplist] [-s sidlist] [-S statelist] [-t termlist] [-u userlist] [-U ruserlist] [-z vszlist] [-Z psetlist] [pattern] pkill [-signal] [-fvx ] [-n|-o] [-e etimelist] [-g pgrplist] [-G grouplist] [-P ppidlist] [-R prmgrplist] [-s sidlist] [-S statelist] [-t termlist] [-u userlist] [-U ruserlist] [-z vszl
pgrep(1) pgrep(1) -n Select the most recently created process matching the criteria. This option is mutually exclusive with the -o option. -o Select the oldest process matching the criteria. This option is mutually exclusive with the -n option. -P ppidlist Select processes whose parent process ID numbers are given in ppidlist. -R pgrmgrplist Select processes belonging to PRM process resource groups whose names or ID numbers are given in prmgrplist. See DEPENDENCIES.
pgrep(1) pgrep(1) pgrep -u root cron Send SIGHUP signal to syslogd : pkill -HUP -u root syslogd Print PIDs of telnet sessions that are active for more than 2 days: pgrep -e 2::: telnet$ WARNINGS Process information can change while pgrep or pkill is running; the picture it gives is only a snapshot in time. With the -f option, pgrep and pkill matches only up to the initial 1020 bytes of command line with the pattern string. pgrep and pkill will not match itself.
pipcrm(1) pipcrm(1) NAME pipcrm - remove a POSIX message queue or a POSIX named semaphore SYNOPSIS pipcrm [option]... DESCRIPTION The pipcrm command removes one or more specified POSIX message queue or POSIX named semaphore. Options The identifiers are specified by the following options: -q msqname Unlinks the queue name from the message queue specified by the argument, msqname. If there are no processes with existing open descriptors for the message queue, the queue is destroyed.
pipcs(1) pipcs(1) NAME pipcs - report status of POSIX interprocess communication facilities SYNOPSIS pipcs [-q [-P-T] [-N qname]] [-s] [-abo ] DESCRIPTION pipcs displays certain information on active POSIX interprocess communication facilities. When no options are specified, pipcs displays information in short format for the POSIX message queues and POSIX named semaphores that are currently active in the system. Options The following options restrict the display to the corresponding facilities.
pipcs(1) pipcs(1) NAME QNUM The name of the facility entry. MNUM QBYTES The maximum number of messages allowed on the associated POSIX message queue. VAL IVAL The current value on the associated POSIX named semaphore. The number of messages currently outstanding on the associated POSIX message queue. The maximum number of bytes allowed in messages outstanding on the associated POSIX message queue. The initial value hold on the associated POSIX named semaphore.
pldd(1) Itanium(R)-based Systems Only pldd(1) NAME pldd - list the dynamic libraries linked into each process, including shared objects explicitly attached using dlopen()/shl_load() SYNOPSIS pldd [-h] {pid|corepath}[:execpath] DESCRIPTION pldd lists the dynamic libraries linked into each process, including shared objects explicitly attached using the dlopen() or shl_load() routines.
pmap(1) pmap(1) NAME pmap, pfiles - displays process address information and open file descriptors SYNOPSIS pmap [-o options] pid1 [pid2]... pfiles pid1 [pid2]... DESCRIPTION pmap prints the address space information of a process. pfiles prints information about all open file descriptors of a process. If file descriptor corresponds to a file, then pfiles prints the fstat(2) and fcntl(2) information.
pmap(1) pmap(1) EXAMPLES This pmap command prints the virtual address, the resident memory size, and the name of each object mapped for processes with process ID 100 and 200: pmap -ooffset,rsz,name 100 200 This pfiles command prints information on open file descriptors of processes with process ID 100 and 200: pfiles 100 200 WARNINGS pmap and pfiles depend on DNLC to resolve the file names.
pppd(1) pppd(1) NAME pppd - PPP point to point protocal daemon SYNOPSIS pppd [options]... DESCRIPTION pppd is a daemon process used in UNIX systems to manage connections to other hosts using PPP (Point to Point Protocol) or SLIP (Serial Line Internet Protocol). It uses the UNIX host’s native serial ports. It communicates with the UNIX kernel’s own TCP/IP implementation via the HP IP tunnel driver. The functionality supplied by this daemon supersedes that provided by ppl in HP-UX prior to Release 10.30.
pppd(1) pppd(1) exec exec-cmd Run exec-cmd up addr args when the link comes up, and exec-cmd down addr args when it goes down; where addr is the IP address of the peer, and args is the list of arguments given to pppd . exec6 exec-cmd Run exec-cmd up interface-id args when the link comes up, and exec-cmd down interface-id args when it goes down; where interfac-id is the 64-bit IPv6 interface identifier of the peer, and args is the list of arguments supplied to pppd .
pppd(1) pppd(1) noaccomp noprotcomp slip Disable HDLC Address and Control Field compression. extra-slip-end When running in SLIP mode, prepend a SLIP packet framing character (0xC0) to each frame before transmission, even if this frame immediately follows the previous frame. By default, pppd transmits only one framing character between adjacent SLIP frames.
pppd(1) pppd(1) Both addresses are optional, but a colon by itself is not valid, and the remote address is required when running as a daemon in "autocall" mode. If only local: is specified when receiving an incoming call, the remote address will be discovered during IPCP IP-Address negotiations.
pppd(1) pppd(1) rfc2472-ifid-neg Do not send nak (negative acknowledgement) if the IPV6CP interface identifier option has already been sent negative acknowledgements during previous replies. Authentication Options requireauth requirechap requiremschap requirepap rechap interval Require either PAP or CHAP authentication. name identifier Provide the identifier used during PAP or CHAP negotiation. This option is necessary if the PPP peer requires authentication.
pppd(1) pppd(1) !keepup the packet has been rejected by the keepup filter. !pass The packet has been rejected by the pass filter. dial failed The packet was dropped because pppd is waiting for the call retry timer to expire. (c) The received packet is VJ TCP header compressed. (u) The received packet is VJ TCP header uncompressed. For example, the following log file line 9/6-14:06:26-83 tcp 63.1.6.3/1050 -> 8.1.1.
pppd(1) pppd(1) pppd oursystem:theirsystem auto noipv6 idle 120 (echo -n ’ theirsystem’) >/dev/console pppd oursystem:theirsystem ipv6 , auto idle 120 >/dev/console To allow a PPP implementation running on "theirsystem" to dial into "oursystem", insert the following into /etc/passwd on "oursystem": Pthem:?:105:20:Their PPP:/etc/ppp:/etc/ppp/Login where group 20 is the gid of the ppp group which owns /usr/etc/pppd, and /etc/ppp/Login is an executable shell
pppoec(1) pppoec(1) NAME pppoec - PPPoE (Point to Point Protocol over Ethernet) client SYNOPSIS pppoec -i interface-name pppoec -i interface-name [-c config-file] [-d debug-level] [-l log-file] [-r retry-number] DESCRIPTION pppoec discovers an access concentrator that is willing to offer services to the client. It obtains a unique session-id from the selected access concentrator. pppoec then forks a pppd daemon which performs the session phase functionalities of PPPoE as mentioned in RFC 2516.
pr(1) pr(1) NAME pr - print files SYNOPSIS pr [options] [files] DESCRIPTION The pr command prints the named files on the standard output. If file is -, or if no files are specified, the standard input is assumed. By default, the listing is separated into pages, each headed by the page number, a date and time, and the name of the file. By default, columns are of equal width, separated by at least one space; lines that do not fit are truncated.
pr(1) pr(1) -t Print neither the five-line identifying header nor the five-line trailer normally supplied for each page. Quit printing after the last line of each file without spacing to the end of the page. -sc Separate columns by the single character c instead of by the appropriate number of spaces (default for c is a tab).
praliases(1) praliases(1) NAME praliases - print system-wide sendmail aliases SYNOPSIS praliases [ -C file ] [ -f file ] [ key ... ] DESCRIPTION praliases prints out the contents of the alias data base used by sendmail to resolve system-wide mail aliases. The alias data base is built with the command newaliases or /usr/sbin/sendmail -bi . See sendmail(1M). The options are: -C file Read the sendmail configuration file specified with this option instead of the default configuration file.
prealloc(1) prealloc(1) NAME prealloc - preallocate disk storage SYNOPSIS prealloc name size DESCRIPTION prealloc preallocates at least size bytes of disk space for an ordinary file name, creating the file if name does not already exist. The space is allocated in an implementation-dependent fashion for fast sequential reads and writes of the file.
printenv(1) printenv(1) NAME printenv - print out the environment SYNOPSIS printenv [ name ] DESCRIPTION printenv prints out the values of the variables in the environment. If a name is specified, only its value is printed. RETURN VALUE If a name is specified and it is not defined in the environment, printenv returns 1; otherwise it returns zero. SEE ALSO sh(1), environ(5), csh(1).
printf(1) printf(1) NAME printf - format and print arguments SYNOPSIS printf format [ arg ... ] DESCRIPTION printf writes formatted arguments to the standard output. The arg arguments are formatted under control of the format operand.
printf(1) printf(1) conversion characters A conversion character indicates the type of conversion to be applied: d, i, o, u, x, X p The integer argument is printed a signed decimal (d or i), unsigned octal (o), unsigned decimal (u), or unsigned hexadecimal notation (x and X). The x conversion uses the numbers and letters 0123456789abcdef, and the X conversion uses the numbers and letters 0123456789ABCDEF. The precision component of the argument specifies the minimum number of digits to appear.
printf(1) printf(1) If any internationalization variable contains an invalid setting, printf behaves as if all internationalization variables are set to "C". See environ(5). International Code Set Support Single and multi-byte character code sets are supported. RETURN VALUE printf exits with one of the following values: 0 Successful completion. >0 Errors occurred; the exit value is increased by one for each error that occurred up to a maximum of 255.
privatepw(1) privatepw(1) NAME privatepw - change WU-FTPD group access file information SYNOPSIS /usr/bin/privatepw [-c] [-d accessgroup] [-f ftpgroups] [-g group accessgroup] [-l] [-V] DESCRIPTION If a site supports the SITE GROUP and SITE GPASS commands, it is necessary to be able to add, delete and list enhanced access group information. The privatepw utility is used to update this information in the group access file (/etc/ftpd/ftpgroups).
prmail(1) prmail(1) NAME prmail - print out mail in the incoming mailbox file SYNOPSIS prmail [user ... ] DESCRIPTION prmail prints the mail which waits for you or the specified user in the incoming mailbox file. The mailbox file is not disturbed. prmail is functionally similar to the command: cat /var/mail/ mailfile | more or cat /var/mail/ mailfile | pg depending upon the setting of the user’s PAGER environment variable AUTHOR prmail was developed by the University of California, Berkeley.
prof(1) prof(1) NAME prof - display profile data SYNOPSIS prof [-tcan ] [-ox ] [-g] [-z] [-h] [-s] [-m mdata ] [ prog ] DESCRIPTION prof interprets a profile file produced by monitor() (see monitor(3C)). The symbol table in the object file prog (a.out by default) is read and correlated with a profile file (mon.out by default).
prof(1) prof(1) Call counts are always recorded precisely, however. Only programs that call exit() (see exit(2)) or return from main cause a profile file to be produced, unless a final call to monitor() is explicitly coded. The use of the cc -p option to invoke profiling imposes a limit of 600 functions that can have call counters established during program execution. For more counters, call monitor() directly. If this limit is exceeded, other data is overwritten and the mon.out file is corrupted.
prs(1) prs(1) NAME prs - print and summarize an SCCS file SYNOPSIS prs [-d dataspec] [-r [SID] ] [-e] [-l] [-c cutoff] [-a] file... DESCRIPTION The prs command prints, on the standard output, parts or all of an SCCS file (see sccsfile(4)) in a usersupplied format. If a directory is named, prs behaves as though each file in the directory were specified as a named file, except that non-SCCS files (last component of the path name does not begin with s. ), and unreadable files are silently ignored.
prs(1) prs(1) backslash backspace carriage return colon \\ \b \r \: form feed new-line single quote tab \f \n \’ \t The default dataspec is: ":Dt:\t:DL:\nMRs:\n:MR:COMMENTS:\n:C:" p HP-UX 11i Version 3: February 2007 −2− Hewlett-Packard Company 151
prs(1) prs(1) SCCS File Data Keywords Keyword :Dt: :DL: :Li: :Ld: :Lu: :DT: :I: :R: :L: :B: :S: :D: :Dy: :Dm: :Dd: :T: :Th: :Tm: :Ts: :P: :DS: :DP: :DI: :Dn: :Dx: :Dg: :MR: :C: :UN: :FL: :Y: :MF: :MP: :KF: :KV: :BF: :J: :LK: :Q: :M: :FB: :CB: :Ds: :ND: :FD: :BD: :GB: :W: :A: :Z: :F: :PN: p Data Item Delta information Delta line statistics Lines inserted by Delta Lines deleted by Delta Lines unchanged by Delta Delta type SCCS ID string (SID) Release number Level number Branch number Sequence number Date
prs(1) prs(1) EXTERNAL INFLUENCES Environment Variables LC_CTYPE determines the interpretation of dataspec as single and/or multi-byte characters. LC_MESSAGES determines the language in which messages are displayed. If LC_CTYPE or LC_MESSAGES is not specified in the environment or is set to the empty string, the value of LANG is used as a default for each unspecified or empty variable. If LANG is not specified or is set to the empty string, a default of "C" (see lang(5)) is used instead of LANG .
ps(1) ps(1) NAME ps - report process status SYNOPSIS ps [-adeflPzx] [-g grplist] [-p proclist] [-R prmgrplist] [-t termlist] [-u uidlist] [-Z pset_list] UNIX Standard Synopsis ps [-aAcdefHjlPzx ] [-C cmdlist] [-g grplist] [-G gidlist] [-n namelist] [-o format] [-p proclist] [-R prmgrplist] [-s sidlist] [-t termlist] [-u uidlist] [-U uidlist] [-Z pset_list] DESCRIPTION ps prints information about selected processes. Use options to specify which processes to select and what information to print about them.
ps(1) ps(1) If more than one of the -C, -g, -G, -p, -R, -t, -u, -Z, and -U options are specified, processes will be selected if they match any of the options specified. The lists used as arguments to the -C, -g, -G, -p, -R, -t, -u, -Z, and -U options can be specified in one of two forms: • A list of identifiers separated from one another by a comma. • A list of identifiers enclosed in quotation marks (") and separated from one another by a comma and/or one or more spaces.
ps(1) ps(1) comm The command name. The output in this column may contain spaces. The default heading for this column is COMMAND if -o is specified and CMD otherwise. cpu etime flags Processor utilization for scheduling. The default heading for this column is C. Elapsed time of the process. The default heading for this column is ELAPSED . Flags (octal and additive) associated with the process: 0 1 2 4 10 20 Swapped In core System process Locked in core (e.g.
ps(1) ps(1) time tty The cumulative execution time for the process. uid user vsz wchan The user ID number of the effective process owner. The controlling terminal for the process. The default heading for this column is TT if -o is specified and TTY otherwise. The login name of the effective process owner. The size of the process in (virtual) memory in kilobytes (1024 byte units). The event for which the process is waiting or sleeping; if there is none, a hyphen (-) is displayed.
ps(1) ps(1) ps -f -C cron WARNINGS Processes can change while ps is running. The ps command displays processes at only a snapshot in time. Data printed for defunct processes is irrelevant. If two special files for terminals are located at the same select code, that terminal may be reported with either name. The user can select processes with that terminal using either name.
pstack(1) pstack(1) Itanium(R)-based Systems Only NAME pstack - print a stack trace for each LWP in each process and core file SYNOPSIS pstack [-h] [pid[:execpath]]|[corepath] DESCRIPTION pstack prints a stack trace (hex+symbolic) for each LWP (Lightweight Process) in each process and core file. Given the pid of a running process or the full path of a core file, pstack prints the stack trace for each LWP thread in the process.
ptree(1) ptree(1) NAME ptree - prints the process tree hierarchy SYNOPSIS ptree [-s] [pid1|username1 [pid2|username2]...] DESCRIPTION ptree prints the process tree of all processes that match the specified arguments. While printing the tree, the child processes are indented to the right from their respective parent processes. Options -s Prints the tree starting from the children of swapper (usually pid 0). The default is to print the tree starting from the children of init (pid 1).
ptx(1) ptx(1) NAME ptx - permuted index SYNOPSIS ptx [ options ] [ input [ output ] ] DESCRIPTION ptx generates the file output that can be processed with a text formatter to produce a permuted index of file input (standard input and output default). It has three phases: the first does the permutation, generating one line for each keyword in an input line. The keyword is rotated to the front. The permuted file is then sorted (see sort(1) and Environment Variables below).
ptx(1) ptx(1) FILES /usr/lib/eign /usr/bin/sort /usr/share/lib/tmac/tmac.ptx NOTES The mptx macro package is not provided as part of the HP-UX operating system. It is part of the Documenters Work Bench (DWB) software package originally developed by AT&T which has been ported to HP 9000 systems by various third-party software suppliers including Elan Computer Group, Inc. of Mountain View California and others.
pwd(1) pwd(1) NAME pwd - working directory name SYNOPSIS pwd [-L|-P] DESCRIPTION pwd prints the path name of the working (current) directory. Options pwd recognizes the following options: -L Display the directory with the name of the symbolic link if any. If the PWD environment variable contains an absolute path name of the current directory that does not contain the file names . (dot) or .. (dot-dot), pwd writes this path name to standard output. Otherwise, the -L option behaves like the -P option.
pwd(1) pwd(1) $ /usr/bin/pwd -L /mnt/vts/symdir In the following example, there is no symbolic link. The displayed directory is the same for both the -L and -P options. $ mkdir /mnt/vts/onedir $ /usr/bin/pwd -L /mnt/vts/onedir $ /usr/bin/pwd -P /mnt/vts/onedir AUTHOR pwd was developed by AT&T and HP. SEE ALSO cd(1), csh(1), sh(1), sh-posix(1), standards(5). STANDARDS CONFORMANCE pwd : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
pwget(1) pwget(1) NAME pwget, grget - get password and group information SYNOPSIS pwget [-n name -u uid ] grget [-n name -g gid ] DESCRIPTION pwget and grget locate and display information from /etc/passwd and /etc/group . The standard output of pwget contains lines of colon-separated password information whose format is the same as that used in the /etc/passwd file (see passwd(4)).
quota(1) quota(1) NAME quota - display disk usage and limits SYNOPSIS quota [-guv ] quota [-uv ] user ... quota -g [-v] group ... DESCRIPTION The quota command displays the disk usage and limits for one or more user(s) or group(s). By default only the user quotas are printed. Without the -v option, it displays information only when the usage exceeds the limits. user or group is a name or a numeric ID of a user or a group. The default value of user is the login user name.
ranlib(1) ranlib(1) NAME ranlib - regenerate archive symbol table SYNOPSIS ranlib archive ... DESCRIPTION ranlib regenerates the symbol tables of the specified archives. It is equivalent to executing ar qs archive on each of the archives. After using the z modifier of ar, the symbol table of an archive must be regenerated before it can be used.
rcp(1) rcp(1) NAME rcp - remote file copy SYNOPSIS Copy Single File rcp [-p] [-S size ] [-R size ] source_file1 dest_file Copy Multiple Files rcp [-p] [-S size ] [-R size ] source_file1 [source_file2]... dest_dir Copy One or More Directory Subtrees rcp [-p] [-S size ] [-R size ] -r source_dir1 [source_dir2]... dest_dir Copy Files and Directory Subtrees rcp [-p] [-S size ] [-R size ] -r file_or_dir1 [file_or_dir2]...
rcp(1) rcp(1) and remote systems. Multiple files and directory subtrees can be copied from one or more systems to a single destination directory by using a single command. dest_file This option specifies the name of the destination file. If host name and path name are not specified, then the existing file is copied into a file named dest_file in the current directory on the local system. If dest_file already exists and is writable, then the existing file is overwritten.
rcp(1) rcp(1) pathname Absolute directory path name or directory path name relative to the login directory of user user_name. filename Actual name of source or destination file. File name expansion is allowed on source file names. dirname Actual name of source or destination directory subtree. File name expansion is allowed on source directory names. Each file or directory argument is either a remote file name of the form hostname :path, or a local file name (with a slash (/) before any colon (:)).
rcp(1) rcp(1) With the existing implementation of rcp , the remote copy may result in a system overwrite as described in the following example. rcp -r path root@hostname: / In this example, if you run rcp as root, and unintentionally type a space between the colon (:) and the slash (/), then rcp assumes both path and root@hostname: (the remote machine’s root directory) as source. rcp always interprets the last argument as the destination.
rcs(1) rcs(1) NAME rcs - change RCS file attributes SYNOPSIS rcs [options] file... DESCRIPTION rcs creates new RCS files or changes attributes of existing ones. An RCS file contains multiple revisions of text, an access list, a change log, descriptive text, and some control attributes. For rcs to work, the user’s login name must be on the access list, except if the access list is empty, if the user is the owner of the file or the superuser, or if the -i option is present.
rcs(1) rcs(1) -l[ rev ] Locks the revision with number rev. If a branch is given, the latest revision on that branch is locked. If rev is omitted, the latest revision on the trunk is locked. Locking prevents overlapping changes. A lock is removed with ci or rcs -u (see below). -L Sets locking to strict . Strict locking means that the owner of an RCS file is not exempt from locking for check in. This option should be used for files that are shared.
rcs(1) rcs(1) Lock revision 38.1 of file vision,v so that only the locker is permitted to check in (see ci(1)) the next revision of the file. This command prevents two or more people from simultaneously revising the same file and inadvertently overwriting each other’s work. rcs -l38.1 vision,v WARNINGS All rcs command options are available to anyone whose name appears in the file access list, including those to add and delete names in the access list, change strict locking, etc.
rcsdiff(1) rcsdiff(1) NAME rcsdiff - compare RCS revisions SYNOPSIS rcsdiff [-bcefhn ] [-rrev1] [-rrev2] file ... DESCRIPTION rcsdiff compares two revisions of each given RCS file and creates output very similar to diff (see diff(1)). A file name ending in ,v is an RCS file name, otherwise it is a working file name. rcsdiff derives the working file name from the RCS file name and vice versa, as explained in rcsintro(5). Pairs consisting of both an RCS and a working file name can also be specified.
rcsmerge(1) rcsmerge(1) NAME rcsmerge - merge RCS revisions SYNOPSIS rcsmerge -rrev1 [-rrev2] [-p] file DESCRIPTION rcsmerge incorporates the changes between rev1 and rev2 of an RCS file into the corresponding working file. If -p is given, the result is printed on the standard output; otherwise the result overwrites the working file. A file name ending in ,v is an RCS file name; otherwise it is a working file name.
rdist(1) rdist(1) NAME rdist - remote file distribution program SYNOPSIS rdist [ -bhinqvwyMRD ] [ -f distfile ] [ -d var =value ] [ -m host ] [ label... ] rdist [ -bhinqvwyMRD ] -c name... [login@]host[:dest] DESCRIPTION rdist facilitates the maintaining of identical copies of files over multiple hosts. It preserves the owner, group, mode, and modification time of files if possible and can update programs that are executing. -f distfile Specify a distfile for rdist to execute.
rdist(1) rdist(1) be used to prevent newer copies on other hosts from being replaced. A warning message is printed for files which are newer than the master copy. -b Binary comparison. Perform a binary comparison and update files if they differ rather than comparing dates and sizes. -M Check that mode, ownership, and group are the same in addition to any other form of comparison that is in effect.
rdist(1) rdist(1) appended to the name (e.g., name1@host, name2@host, ...). The except command is used to update all of the files in the source list, except for the files listed in name_list. This is usually used to copy everything in a directory except certain files. The except_pat command is like the except command except that pattern_list is a list of regular expressions (see ed(1) for details). If one of the patterns matches some string within a file name, that file will be ignored.
rdist(1) rdist(1) /usr/local/${IMAGEN} -> arpa install /usr/local/lib ; notify ralph ; ${FILES} :: stamp.cory notify root@cory ; WARNINGS Source files must reside on the local host where rdist is executed. There is no easy way to have a special command executed after all files in a directory have been updated. Variable expansion only works for name lists and in the special command string; there should be a general macro facility. rdist aborts on files that have a negative mtime (before Jan 1, 1970).
read(1) read(1) NAME read - read a line from standard input SYNOPSIS read [-r] var ... DESCRIPTION read reads a single line from standard input. The line is split into fields as when processed by the shell (refer to shells in SEE ALSO); the first field is assigned to the first variable var, the second field to the second variable var, and so forth. If there are more fields than there are specified var operands, the remaining fields and their intervening separators are assigned to the last var.
readmail(1) readmail(1) NAME readmail - read mail from a mail folder or incoming mailbox SYNOPSIS readmail [-ahnp ] [-f folder] [number-listpattern] DESCRIPTION The readmail program displays messages from your incoming mailbox or a specified mail folder. Within the elm mail system (see elm(1) with no operands and optionally the -h or -n option, readmail displays the appropriate headers and the body of the current message.
readmail(1) readmail(1) FILES /var/mail/ loginname $HOME/.elm/readmail Incoming mailbox Temporary file for elm SEE ALSO elm(1), newmail(1), vi(1).
remsh(1) remsh(1) NAME remsh, rexec - execute from a remote shell SYNOPSIS remsh host [-l username] [-n] command host [-l username] [-n ] command rexec host [-l username] [-n] command In Kerberos V5 Network Authentication Environments remsh host [-l username] [-f|-F] [-k realm] [-P] [-n] command host [-l username] [-f |-F] [-k realm] [-P ] [-n ] command DESCRIPTION remsh connects to a specified host and executes a specified command.
remsh(1) remsh(1) -F Forward the TGT to the remote system and have it forwardable from there to another remote system. The -f option and -F option are mutually exclusive. -k realm Obtain tickets from the remote host in the specified realm instead of the remote host’s default realm as specified in the configuration file krb.realms . -P Disable Kerberos authentication.
remsh(1) remsh(1) remsh otherhost -n "command 1>&- 2>&- &" (See remshd(1M) and sh(1)). If your login shell on the remote system is csh, use the following form instead: remsh otherhost -n "sh -c \"command 1>&- 2>&- &\"" RETURN VALUE If remsh fails to set up the secondary socket connection, it returns 2. If it fails in some other way, it returns 1. If it fully succeeds in setting up a connection with remshd , it returns 0 once the remote command has completed.
remsh(1) remsh(1) SEE ALSO rlogin(1), remshd(1M), rexecd(1M), inetsvcs_sec(1M), gethostent(3N), rcmd(3N), rcmd_af(3N), rexec(3N), hosts(4), hosts.equiv(4), krb5.conf(4).
rev(1) rev(1) NAME rev - reverse lines of a file SYNOPSIS rev [ file ] ... DESCRIPTION rev copies the named files to the standard output, reversing the order of characters in every line. If no file is specified, the standard input is copied. EXTERNAL INFLUENCES Environment Variables LC_CTYPE determines the interpretation of text as single- and/or multi-byte characters.
rexec(1) rexec(1) NAME rexec, remsh - execute from a remote shell SYNOPSIS remsh host [-l username] [-n] command host [-l username] [-n ] command rexec host [-l username] [-n] command In Kerberos V5 Network Authentication Environments remsh host [-l username] [-f|-F] [-k realm] [-P] [-n] command host [-l username] [-f |-F] [-k realm] [-P ] [-n ] command DESCRIPTION remsh connects to a specified host and executes a specified command.
rexec(1) rexec(1) host using rlogin (see rlogin(1)). Any rlogin options typed in on the command line are transmitted to rlogin . If no command and the option -P are specified, rlogin will be invoked with -P to indicate that Kerberos authentication (or secure access) is not necessary. This means that if a password is requested, the password will be sent in cleartext. If command is specified, options specific to rlogin are ignored by remsh .
rexec(1) rexec(1) RETURN VALUE If remsh fails to set up the secondary socket connection, it returns 2. If it fails in some other way, it returns 1. If it fully succeeds in setting up a connection with remshd , it returns 0 once the remote command has completed. Note that the return value of remsh bears no relation to the return value of the remote command. DIAGNOSTICS Besides the errors listed below, errors can also be generated by the library functions rcmd() and rresvport() .
rlog(1) rlog(1) NAME rlog - print log messages and other information on RCS files SYNOPSIS rlog [options] file ... DESCRIPTION rlog prints information about RCS files. Files ending in ,v are RCS files; all others are working files. If a working file is given, rlog tries to find the corresponding RCS file first in directory ./RCS , then in the current directory, as explained in rcsintro(5).
rlog(1) rlog(1) rlog -L -h RCS/*,v Print the headers plus the log messages of the locked revisions: rlog -L -l RCS/*,v Print complete log information: rlog RCS/*,v Print the header and log messages of all revisions checked in after 1:00am on December 25th, 1991: rlog -d">12/25/92, 1:00" RCS/*,v Print the header and log messages of those revisions that were created between 10:00am and 2:00pm on July 4th, 1992: rlog -d"07/04/92, 10:00 > 92/07/04, 14:00" RCS/*,v DIAGNOSTICS The exit status always refers
rlogin(1) rlogin(1) NAME rlogin - remote login SYNOPSIS rlogin rhost [-7] [-8] [-ee] [-l username] rhost [-7] [-8] [-ee] [-l username] In Kerberos V5 Network Authentication Environments rlogin rhost [-7] [-8] [-ee] [-f|-F] [-k realm] [-l username] [-P] rhost [-7] [-8] [-ee] [-f|-F] [-k realm] [-l username] [-P] DESCRIPTION The rlogin command connects your terminal on the local host to the remote host (rhost). rlogin acts as a virtual terminal to the remote system.
rlogin(1) rlogin(1) may conflict with your terminal configuration, such as ˆS , ˆQ , or backspace. Using one of these as the escape character may not be possible or may cause problems communicating with the remote host (see stty(1) and tty(7)). -l username This option can be used to set the user login name on the remote host to username. The default name is the current account name of the user invoking rlogin .
rlogin(1) rlogin(1) remsh(1)). For example, if remotehost is the name of a remote host and /usr/hosts/remotehost is linked to remsh , and if /usr/hosts is in your search path, the command: remotehost is equivalent to: rlogin remotehost RETURN VALUE rlogin sends an error message to standard error and returns a nonzero value if an error occurs before the connection to the remote host is completed. Otherwise, it returns a zero. DIAGNOSTICS Diagnostics can occur from both the local and remote hosts.
rlogin(1) rlogin(1) FILES $HOME/.rhosts /etc/hosts.equiv /usr/hosts/* User’s private equivalence list. List of equivalent hosts. For rhost version of the command. SEE ALSO csh(1), ksh(1), login(1), remsh(1), sh(1), sh-posix(1), stty(1), telnet(1), rlogind(1M), inetsvcs_sec(1M), hosts(4), hosts.equiv(4), inetd.conf(4), krb5.conf(4), services(4), sis(5), termio(7), tty(7).
rm(1) rm(1) NAME rm - remove files or directories SYNOPSIS rm [-f|-i] [-Rr] file... DESCRIPTION The rm command removes the entries for one or more files from a directory. If an entry was the last link to the file, the file is destroyed. Removal of a file requires write and search (execute) permission in its directory, but no permissions on the file itself.
rm(1) rm(1) LC_ALL If set to a non-empty string value, overrides the values of all the other internationalization variables. LC_CTYPE determines the interpretation of file names as single and/or multi-byte characters, the classification of characters as printable, and the characters matched by character class expressions in regular expressions.
rm(1) rm(1) DEPENDENCIES NFS rm does not display a plus sign (+) to indicate the existence of optional access control list entries when asking for confirmation before removing a networked file. SEE ALSO rmdir(1), unlink(2), acl(5). STANDARDS CONFORMANCE rm: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
rmdel(1) rmdel(1) NAME rmdel - remove a delta from an SCCS file SYNOPSIS rmdel -r SID file... DESCRIPTION The rmdel command removes the delta specified by the SID from each named SCCS file. The delta to be removed must be the newest (most recent) delta in its branch in the delta chain of each named SCCS file.
rmdir(1) rmdir(1) NAME rmdir - remove directories SYNOPSIS rmdir [-f|-i] [-p] dir... DESCRIPTION rmdir removes the directory entry for each dir operand that refers to an empty directory. Directories are removed in the order specified. Consequently, if a directory and a subdirectory of that directory are both specified as arguments, the subdirectory must be specified before the parent directory so that the parent directory will be empty when rmdir tries to remove it.
rmdir(1) rmdir(1) EXAMPLES To remove a directory with a prompt for verification: rmdir -i directory To remove as much as possible of a path, type: rmdir -p component1 /component2 /dir SEE ALSO rm(1), rmdir(2), stat(2).
rmnl(1) rmnl(1) NAME rmnl - remove extra new-line characters from file SYNOPSIS rmnl DESCRIPTION rmnl removes all blank lines from a file (except at beginning of file as explained below), and is useful for removing excess white space from files for display on a CRT terminal.
rndc(1) rndc(1) (BIND 9.3) NAME rndc - name server control utility SYNOPSIS rndc [-c config-file] [-k keyfile] [-p port] [-s server ] [-V] [-y key_id] [command] DESCRIPTION The rndc command allows the system administrator to control the operation of a name server. If rndc is invoked without any command line options or operands, it prints a short summary of the supported commands and the available options.
rndc(1) rndc(1) (BIND 9.3) querylog reconfig recursing Toggle query logging. Reload configuration file and new zones only. Dump the queries that are currently recursing, into the file named.recursing. refresh zone Schedule immediate zone maintenance for the given zone. reload Reload configuration file and zones. reload zone Reload the given zone. retransfer zone Retransfer a single zone without checking serial number.
rndc-confgen(1) rndc-confgen(1) (BIND 9.3) NAME rndc-confgen - rndc key generation tool SYNOPSIS rndc-confgen [-ah] [-b keysize] [-c keyfile] [-k keyname] [-p port] [-r randomfile] [-s address] [-t chrootdir] [-u user] DESCRIPTION rndc-confgen generates /etc/rndc.conf, the configuration file for rndc . Alternatively, it can be run with the -a option to set up a rndc.key file and avoid the need for a rndc.conf file and a controls statement in a named.conf file altogether.
rndc-confgen(1) rndc-confgen(1) (BIND 9.3) AUTHOR rndc-confgen was developed by the Internet Systems Consortium (ISC). FILES Default system random data source. /dev/random /etc/named.conf /etc/rndc.conf /etc/rndc.key Default named configuration file. Default rndc configuration file. Default alternate rndc configuration file. SEE ALSO rndc(1), named(1M), chroot(2), rndc.conf(4). HP-UX IP Address and Client Management Administrator’s Guide, available online at http://docs.hp.com.
rpcgen(1) rpcgen(1) NAME rpcgen - an RPC protocol compiler SYNOPSIS rpcgen infile rpcgen [ -a ] [ -b ] [ -C ] [ -D name [ = value ] ] [ -i size ] [ -I [ -K seconds ] ] [ -L ] [ -M ] [ -N ] [ -T ] [ -u ] [ -Y pathname ] infile rpcgen [ -c | -h | -l | -m | -t | -Sc | -Ss | -Sm ] [ -o outfile ] [ infile ] rpcgen [ -s nettype ] [ -u ] [ -o outfile ] [ infile ] rpcgen [ -n netid ] [ -u ] [ -o outfile ] [ infile ] DESCRIPTION rpcgen is a tool that generates C code to implement an RPC protocol.
rpcgen(1) rpcgen(1) provided. Providing an undefined data type allows customization of XDR routines. Options -a -b -c -C Generate all files, including sample files. Backward compatibility mode. Generate transport specific RPC code for older versions of the operating system. Compile into XDR routines. Generate header and stub files which can be used with ANSI C compilers. Headers generated with this flag can also be used with C++ programs. -Dname[=value] Define a symbol name.
rpcgen(1) -o outfile rpcgen(1) Specify the name of the output file. If none is specified, standard output is used (-c, -h, -l, -m, -n, -s, -Sc, -Sm, -Ss, and -t modes only). -s nettype Compile into server-side stubs for all the transports belonging to the class nettype. The supported classes are netpath , visible , circuit_n , circuit_v , datagram_n , datagram_v , tcp , and udp (see rpc(3N) for the meanings associated with these classes). This option may be specified more than once.
rtprio(1) rtprio(1) NAME rtprio - execute process with real-time priority SYNOPSIS rtprio rtprio rtprio rtprio priority command [ arguments ] priority -pid -t command [ arguments ] -t -pid DESCRIPTION rtprio executes command with a real-time priority, or changes the real-time priority of currently executing process pid. Real-time priorities range from zero (highest) to 127 (lowest).
rtsched(1) rtsched(1) NAME rtsched - execute process with real-time priority SYNOPSIS rtsched -s scheduler -p priority command [ arguments ] rtsched [ -s scheduler ] -p priority -P pid DESCRIPTION Rtsched executes command with POSIX or HP-UX real-time priority, or changes the real-time priority of currently executing process pid. All POSIX real-time priority processes are of greater scheduling importance than processes with HP-UX real-time or HP-UX timeshare priority.
rtsched(1) rtsched(1) 0 if command is successfully scheduled or if pid’s real-time priority is successfully changed; 1 if command is not executable, pid does not exist, or priority is not within the priority range for the corresponding scheduler; 2 if command (pid) lacks real-time capability, or the invoker’s effective user ID is not a user who has appropriate privileges, or the real or effective user or the real or effective user ID does not match the real or saved user ID of the process being chang
rup(1) rup(1) NAME rup - show host status of local machines (RPC version) SYNOPSIS rup [-h] [-l] [-t] [host ...] DESCRIPTION rup gives a status similar to uptime for remote machines. It broadcasts on the local network and displays the responses it receives. Though the listing is normally in the order responses are received, the order can be changed by using command-line options. The broadcast process takes about two minutes.
ruptime(1) ruptime(1) NAME ruptime - show status of local machines SYNOPSIS ruptime [-a] [-r] [-l] [-t] [-u] DESCRIPTION ruptime outputs a status line for each machine on the local network that is running the rwho daemon. ruptime ’s status lines are formed from packets broadcast once every 3 minutes between rwho daemons (see rwhod(1M)) on each host on the network.
rusers(1) rusers(1) NAME rusers - determine who is logged in on machines on local network SYNOPSIS rusers [-a] [-h] [-i] [-l] [-u] [host ...] DESCRIPTION rusers produces output similar to the "quick" option of who(1), but for remote machines. It broadcasts on the local network and prints the responses it receives. Though the listing is normally in the order that responses are received, the order can be changed by specifying a command-line option. The broadcast process takes about two minutes.
rwho(1) rwho(1) NAME rwho - show who is logged in on local machines SYNOPSIS rwho [-a] DESCRIPTION rwho produces output similar to the output of the HP-UX who command for all machines on the local network that are running the rwho daemon (see who(1) and rwhod(1M)). If rwhod has not received a report from a machine for 11 minutes, rwho assumes the machine is down and rwho does not report users last known to be logged into that machine.
sact(1) sact(1) NAME sact - print current SCCS file editing activity SYNOPSIS sact file ... DESCRIPTION The sact command informs the user of any impending deltas to a named SCCS file. This situation occurs when get -e has been previously executed without a subsequent execution of delta (see delta(1) and get(1)).
samlog_viewer(1) samlog_viewer(1) NAME samlog_viewer - a tool for viewing and saving the SAM logfile SYNOPSIS /usr/sam/bin/samlog_viewer [-s mmddhhmm[[cc]yy]] [-e mmddhhmm[[cc]yy]] [-l SDVC ] [-u user] [-o ofile] [-t] [-n] [file] DESCRIPTION The samlog_viewer command enables the viewing of part or all of the SAM logfile (or another file containing data in the same format) at varying levels of detail. This tool is run by SAM whenever the View SAM Log option is chosen.
samlog_viewer(1) samlog_viewer(1) hh Hour specified as a two digit number (24-hour clock form). mm Minute specified as a two digit number. cc Century minus one. cc is optional when specifying the year. yy The last two digits of the desired year. If this is not specified, the current year is used. Note: To specify a year in two digits, the valid ranges are 70-99 (20th century) and 00-37 (21st century). To specify a year in four digits, the valid range is 1970-2037.
samlog_viewer(1) samlog_viewer(1) cat datafile | samlog_viewer -t -o stdin.out Do the same as above, but instead have the data appear on stdout: cat datafile | samlog_viewer -t -o - or cat datafile | samlog_viewer -tn FILES /var/sam/log/samlog /var/sam/log/samlog.old /tmp/LFV_ pid /tmp/LFV_RUN pid SAM logfile. Archived version of samlog , created when the logfile is automatically trimmed by SAM when its size becomes too large. Its contents are included in the log entries read by samlog_viewer.
sccs(1) sccs(1) NAME sccs - front-end utility program for SCCS commands SYNOPSIS sccs [-r] [-d rootpath] [-p dirpath] command [options] [file]... DESCRIPTION The sccs command is a straightforward front end to the various programs comprising the Source Code Control System. It includes the capability of running set-user-id to another user to allow shared access to the SCCS files. sccs reduces the need to explicitly reference the SCCS filenames.
sccs(1) sccs(1) Options The options supplied to the SCCS commands are documented in the corresponding SCCS man pages. The options supplied to the pseudo commands are documented in the above section. All other options preceding command are documented as follows: -r -d rootpath Runs sccs as the real user rather than the effective user sccs is set-user-id to. -p dirpath Specifies the pathname for the SCCS files. The default is the SCCS directory.
sccs(1) sccs(1) RETURN VALUE A successful completion returns 0. On error, sccs exists with a value from or the exit value from the command that was invoked. The only exception is the check pseudo command which returns a non-zero exit status if a file is being edited. SEE ALSO admin(1), cdc(1), comb(1), delta(1), get(1), prs(1), rmdel(1), sact(1), sccsdiff(1), sccshelp(1), unget(1), val(1), vc(1), what(1), sccsfile(4).
sccsdiff(1) sccsdiff(1) NAME sccsdiff - compare two versions of an SCCS file SYNOPSIS sccsdiff -rSID1 -rSID2 [-p] [-sn] file... DESCRIPTION The sccsdiff command compares two versions of an SCCS file, and generates the differences between the two versions. Any number of SCCS files may be specified, but arguments apply to all files. Options -rSID? SID1 and SID2 specify the deltas of an SCCS file that are to be compared. Versions are passed to bdiff in the order given (see bdiff(1)).
sccshelp(1) sccshelp(1) NAME sccshelp - ask for help on SCCS commands SYNOPSIS sccshelp [arg]... DESCRIPTION The sccshelp command finds information to explain a message from an SCCS command or to explain the use of a SCCS command. Zero or more arguments can be supplied.
sccshelp(1) sccshelp(1) cm3: "missing file arg" You left off the name of the file to be processed. WARNINGS Only SCCS commands currently use sccshelp .
script(1) script(1) NAME script - make typescript of terminal session SYNOPSIS script [-a] [file] DESCRIPTION script makes a typescript of everything printed on your terminal. It starts a shell named by the SHELL environment variable, or by default /usr/bin/sh , and silently records a copy of output to your terminal from that shell or its descendents, using a pseudo-terminal device (see pty(7)). All output is written to file, or appended to file if the -a option is given.
sdiff(1) sdiff(1) NAME sdiff - side-by-side difference program SYNOPSIS sdiff [ options ... ] file1 file2 DESCRIPTION sdiff uses the output of diff(1) with the -b option, which ignores trailing blanks (spaces and tabs) and treats other strings of blanks as equal, to produce a side-by-side listing of two files, indicating those lines that are different.
sed(1) sed(1) NAME sed - stream text editor SYNOPSIS sed [-n] script [file]... sed [-n] [-e script]... [-f script_file]... [file]... DESCRIPTION sed copies the named text files (standard input default) to the standard output, edited according to a script containing up to 100 commands. Only complete input lines are processed. Any input text at the end of a file that is not terminated by a new-line character is ignored.
sed(1) sed(1) be used to protect initial blanks and tabs against the stripping that is done on every script line. rfile Must terminate the command line, and must be preceded by exactly one blank. wfile Must terminate the command line, and must be preceded by exactly one blank. Each wfile is created before processing begins. There can be at most 10 distinct wfile arguments. sed recognizes the following functions: (1) a\ text Append. Place text on the output before reading next input line.
sed(1) sed(1) (2) t label Test. Branch to the : command bearing the label if any substitutions have been made since the most recent reading of an input line or execution of a t. If label is empty, branch to the end of the script. (2) w wfile Write. Append the pattern space to wfile. (2) x Exchange the contents of the pattern and hold spaces. (2) y/ string1/string2/ Transform. Replace all occurrences of characters in string1 with the corresponding character in string2.
sed(1) sed(1) International Code Set Support Single- and multi-byte character code sets are supported. EXAMPLES Make a simple substitution in a file from the command line or from a shell script, changing abc to xyz : sed ’s/abc/xyz/’ file1 >file1.out Same as above but use shell or environment variables var1 and var2 in search and replacement strings: sed "s/$var1/$var2/" file1 >file1.out or sed ’s/’$var1’/’$var2’/’ file1 >file1.
send_sound(1) send_sound(1) NAME send_sound - play an audio file SYNOPSIS /opt/audio/bin/send_sound [-format_switch] [-server system] [-loop number] [-pri priority] [-srate rate] [-prate rate] [-stereo ] DESCRIPTION This command plays an audio file. send_sound is the command used when you double-click an audio file from the HP VUE File Manager. The file begins playing, according to the settings of the Audio Control Panel.
serialize(1) serialize(1) NAME serialize - force target process to run serially with other processes SYNOPSIS serialize command [command_args] serialize [-t] [-p pid] DESCRIPTION The serialize command is used to force the target process to run serially with other processes also marked by this command. The target process can be referred to by pid value, or it can be invoked directly on the command.
serialize(1) serialize(1) WARNINGS The user has no way of forcing an execution order on serialized processes. AUTHOR serialize was developed by HP. SEE ALSO setprivgrp(1M), getprivgrp(2), serialize(2).
setacl(1) setacl(1) NAME setacl - modify access control lists (ACLs) for files (JFS File Systems only) SYNOPSIS setacl [-n] -s acl_entries file... setacl [-n] -m|-d acl_entries [-m|-d acl_entries]... setacl [-n] -f acl_file file... file... DESCRIPTION For each file specified, setacl will either replace its entire ACL, including the default ACL on a directory, or it will add, modify, or delete one or more ACL entries, including default entries on directories.
setacl(1) -s setacl(1) Set a file’s ACL. All old ACL entries are removed, and replaced with the newly specified ACL. There must be exactly one user entry specified for the owner of the file, exactly one group entry specified for the owning group of the file, and exactly one other entry specified. If the -n option is not specified there must also be exactly one class entry specified.
setacl(1) setacl(1) EXAMPLES To add one ACL entry to file filea , giving user archer read permission only, type: setacl -m user:archer:r-- filea If an entry for user archer already exists, this command will set the permissions in that entry to r-- .
sh(1) sh(1) NAME sh - overview of various system shells SYNOPSIS POSIX Shell sh [±aefhikmnoprstuvx] [±o option] ... [-c string] [arg ... ] rsh [±aefhikmnoprstuvx] [±o option] ... [-c string] [arg ... ] Korn Shell ksh [±aefhikmnoprstuvx] [ ± o option ] ... [-c string ] [ arg ... ] rksh [±aefhikmnoprstuvx] [±o option ] ... [-c string ] [ arg ... ] C Shell csh [-cefinstvxTVX] [ command_file ] [ argument_list ... ] Key Shell keysh DESCRIPTION Remarks The POSIX .
sh(1) sh(1) To obtain: POSIX Shell Korn Shell C Shell Key Shell Use the command: /usr/bin/sh ... /usr/bin/ksh ... /usr/bin/csh ... /usr/bin/keysh These shells can also be the default invocation, depending on the entry in the /etc/passwd file. See also chsh(1). WARNINGS Many manual entries contain descriptions of shell behavior or describe program or application behavior similar to ‘‘the shell’’ with a reference to ‘‘see sh(1)’’.
sh-posix(1) sh-posix(1) NAME sh-posix: sh, rsh - standard and restricted POSIX.2-conformant command shells SYNOPSIS sh [±aefhikmnprstuvx] [±o option]... [-c string] [arg]... rsh [±aefhikmnprstuvx] [±o option]... [-c string] [arg]... Remarks This shell is intended to conform to the shell specification of the POSIX.2 Shell and Utility standards. Check any standards conformance documents shipped with your system for information on the conformance of this shell to any other standards.
sh-posix(1) • • • sh-posix(1) Setting the value of SHELL , ENV , or PATH Specifying path or command names containing / Redirecting output (>, >|, <> , and >> ) The restrictions above are enforced after the .profile and ENV files are interpreted. When a command to be executed is found to be a shell procedure, rsh invokes sh to execute it. Thus, the end-user is provided with shell procedures accessible to the full power of the standard shell, while being restricted to a limited menu of commands.
sh-posix(1) sh-posix(1) is the exit status of the last command in the pipeline. Otherwise, the exit status of the pipeline is the logical negation of the exit status of the last command in the pipeline. A list is a sequence of one or more pipelines separated by ;, &, && , or || , and optionally terminated by ;, &, or |&. ; Causes sequential execution of the preceding pipeline. An arbitrary number of newlines can appear in a list, instead of semicolons, to delimit commands.
sh-posix(1) sh-posix(1) until list ; do list ; done Execute the until list. If the exit status of the last command in the list is nonzero, execute the do list and execute the until list again. When the exit status of the last command in the until list is zero, terminate the loop. If no commands in the do list are executed, until returns a zero exit status. while list ; do list ; done Execute the while list.
sh-posix(1) sh-posix(1) bg [job]... Put the specified jobs into the background. The current job is put in the background if job is unspecified. See the Jobs subsection for a description of the format of job. See also the fg special command. % break [n] Exit from the enclosing for , select , until , or while loop, if any. If n is specified, exit from n levels. cd [-L-P] [arg] cd old new In the first form, change the current working directory (PWD ) to arg.
sh-posix(1) sh-posix(1) With -p, write the names and values of all exported variables to standard output, in a format with the proper use of quoting, so that it is suitable for re-input to the shell as commands that achieve the same exporting results. fc fc fc fc [-r] [-e ename] [first [last] ] -l [-nr] [first [last] ] -s [old=new] [first] -e - [old=new] [command] List, or edit and reexecute, commands previously entered to an interactive shell.
sh-posix(1) sh-posix(1) With -l, list the signal names and numbers. let arg ... (( arg ... )) Evaluate each arg as a separate arithmetic expression. See the Arithmetic Evaluation subsection for a description of arithmetic expression evaluation. The exit status is 0 if the value of the last expression is nonzero, and 1 otherwise. % newgrp [-] [group] Replace the current shell with a new one having group as the user’s group. The default group is the user’s login group. With -, also execute the user’s .
sh-posix(1) sh-posix(1) % set [{-+}abCefhkmnopstuvx] [{-+}o option]... [{-+}A name] [arg]... Set (-) or clear (+) execution options or perform array assignments (-A, +A ). All options except -A and +A can be supplied in a shell invocation (see the SYNOPSIS section and the Shell Invocation subsection). Using + instead of - before an option causes the option to be turned off. These options can also be used when invoking the shell.
sh-posix(1) sh-posix(1) nounset privileged trackall verbose vi viraw xtrace Same as -u. Same as -p. Same as -h. Same as -v. Use a vi-style inline editor for command entry. Process each character as it is typed in vi mode (always on). Same as -x. -p Disable processing of the $HOME/.profile file and uses the file /etc/suid_profile instead of the ENV file. This mode is on whenever the effective user ID (group ID) is not equal to the real user ID (group ID).
sh-posix(1) sh-posix(1) & typeset [{-+}LRZfilrtux [n] ] [name[=value] ]... name =value [name=value]... Assign types and a value to a local named parameter name. See also the export special command. Parameter assignments remain in effect after the command completes. When invoked inside a function, create a new instance of the parameter name. The parameter value and type are restored when the function completes. The following list of attributes can be specified. Use + instead of - to turn the options off.
sh-posix(1) sh-posix(1) -d The number of kilobytes in the size of the data area. -f The number of 512-byte blocks in files written by child processes (files of any size can be read). -n The number of file descriptors. -s The number of kilobytes in the size of the stack area. -t The number of seconds to be used by each process. umask [-S] [mask] Set the user file-creation mask mask. mask can be either an octal number or a symbolic value as described in umask(1).
sh-posix(1) sh-posix(1) history=’fc -l’ integer=’typeset -i’ local=typeset nohup=’nohup ’ r=’fc -e -’ stop=’kill -STOP’ suspend=’kill -STOP $$’ type=’whence -v’ Tilde Substitution After alias substitution is performed, each word is checked to see if it begins with an unquoted tilde (˜). If it does, the word up to a / is checked to see if it matches a user name in the /etc/passwd file. If a match is found, the ˜ and the matched login name are replaced by the login directory of the matched user.
sh-posix(1) sh-posix(1) ${# parameter } If parameter is * or @, the number of positional parameters is substituted. Otherwise, the length of the value of the parameter is substituted. ${# parameter [*]} Substitute the number of elements in the array. ${parameter :-word } If parameter is set and is nonnull, substitute its value; otherwise, substitute word. ${parameter :=word } If parameter is not set or is null, set it to word; then substitute the value of the parameter.
sh-posix(1) sh-posix(1) OLDPWD OPTARG OPTERR The previous working directory set by the cd command. OPTIND PPID PWD RANDOM The index of the last option argument processed by the getopts special command. REPLY Set by the select compound command, and by the read special command when no name is supplied. SECONDS Each time this parameter is referenced, the number of seconds since shell invocation is returned.
sh-posix(1) sh-posix(1) LC_COLLATE The collating sequence to use when sorting names and when character ranges occur in patterns. See environ(5). LC_CTYPE The character classification information to use. Changing the value of LC_CTYPE after the shell has started does not affect the lexical processing of shell commands in the current shell execution environment or its subshells. See environ(5).
sh-posix(1) sh-posix(1) Blank Interpretation After parameter and command substitution, the results of substitution are scanned for field separator characters (defined in IFS ), and split into distinct arguments when such characters are found. sh retains explicit null arguments ("" or ’’) but removes implicit null arguments (those resulting from parameters that have null values).
sh-posix(1) sh-posix(1) Prompting When used interactively, the shell prompts with the value of PS1 before reading a command. Whenever a newline is received and further input is needed to complete a command, the secondary prompt (the value of PS2 ) is issued. Conditional Expressions A conditional expression is used with the [[ compound command to test attributes of files and to compare strings. Word splitting and file name generation are not performed on the words between [[ and ]] .
sh-posix(1) sh-posix(1) single file and blank interpretation is not performed. word Use file word as standard input (file descriptor 0). Use file word as standard output (file descriptor 1). If the file does not exist, it is created. If the file exists, and the noclobber option is on, an error occurs; otherwise, the file is truncated to zero length. Note that the noclobber test is only applied to regular files, not to named pipes or other file types.
sh-posix(1) sh-posix(1) interacts with the environment in several ways. When invoked, the shell scans the environment and creates a parameter for each name found, gives it the corresponding value and marks it export . Executed commands inherit the environment. If the user modifies the values of these parameters or creates new ones by using the export or typeset -x special commands, the values become part of the environment.
sh-posix(1) sh-posix(1) A job running in the background stops if it tries to read from the terminal. Background jobs normally are allowed to produce output, but can be disabled with the stty tostop command. If the user sets this terminal option, background jobs stop when trying to produce output. There are several ways to refer to jobs in the shell.
sh-posix(1) sh-posix(1) command is printed and reexecuted upon leaving the editor. The editor name - is used to skip the editing phase and to reexecute the command. In this case, a substitution parameter of the form old =new can be used to modify the command before execution. For example, if r is aliased to fc -e -, typing r bad=good c reexecutes the most recent command that starts with the letter c and replaces the first occurrence of the string bad with the string good .
sh-posix(1) s 264 sh-posix(1) ^A ^E ^]char M-ˆ] char ^XˆX Move cursor to start of line. erase Delete previous character. The erase character is user-definable with the stty command; it is usually set to ˆH . The system default is #. ^D Delete current character. eof Terminate the shell if the current line is null. The eof character is user-definable with the stty command; it is usually set to ˆD . The system default is ˆD . M-d M-ˆH M-h M-ˆ? Delete current word. Move cursor to end of line.
sh-posix(1) sh-posix(1) ^O Execute the current line and fetch the next line relative to current line from the history file. M-digits Define a numeric parameter. The digits are taken as a parameter to the next command. The commands that accept a parameter are erase, ˆB , ˆC , ˆD , ˆF , ˆK , ˆN , ^P, ˆR, ˆ], M-ˆH , M-. , M-_ , M-b , M-c , M-d , M-f , M-h , and M-l . M-letter Your alias list is searched for an alias by the name _letter (underscore-letter).
sh-posix(1) sh-posix(1) Motion Edit Commands These commands move the cursor. The use of count causes a repetition of the command the cited number of times. [count]l Cursor forward (right) one character. [count]w Cursor forward one alphanumeric word. [count]W Cursor forward to the beginning of the next word that follows a blank. [count]e Cursor forward to the end of the word. [count]E Cursor forward to end of the current blank-delimited word. [count]h Cursor backward (left) one character.
sh-posix(1) sh-posix(1) If motion is c, the entire line is deleted. C Delete from the current character through the end of line and enter insert mode. Equivalent to c$ . S Equivalent to cc . [count]dmotion d[count]motion Move cursor to the character position specified by motion, deleting all characters between the original cursor position and the new position. If motion is d, the entire line will be deleted. D i I Delete from the current character through the end of line. Equivalent to d$ .
sh-posix(1) sh-posix(1) # Insert a # at the beginning of the current line and after each embedded newline, and execute the line. Useful for inserting the current command line in the history list without executing it. = @letter List the file names that match the current word if an asterisk were appended to it. Search your alias list for an alias with the name _letter (underscore letter). If an alias of this name is defined, its value is executed as a command sequence on the current line.
sh-posix(1) sh-posix(1) Background processes started from a noninteractive shell cannot be accessed with job control commands. The value of the IFS variable in the user’s environment affects the behavior of scripts. Collating Order In an international environment, character ordering is determined by the value of LC_COLLATE , rather than by the binary ordering of character values in the machine collating sequence.
sh-posix(1) sh-posix(1) :: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.2 break : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.2 case : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.2 continue : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.2 eval : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.2 exec : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.2 exit : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.2 export : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.2 for : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.2 if: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
shar(1) shar(1) NAME shar - make a shell archive package SYNOPSIS shar [options] [filedir] ... > package DESCRIPTION The shar command bundles the named files and directories into a single distribution package suitable for mailing or moving. The files can contain any data, including executables. The resulting package, written to standard output, is a shell script file that can be edited (to add messages at the beginning, etc.).
shar(1) shar(1) -o -r Preserve user and group ownership on files and directories. -s Perform error checking using sum (see sum(1)). Both -c and -s can be specified for better error checking. Also see WARNINGS below. -t Write diagnostics and messages directly to your terminal instead of to the standard error. This is useful when invoking shar from programs (such as vi that normally combine standard error with standard output. Specifying -t also invokes the -v (verbose) option.
shar(1) shar(1) accessible. /tmp/unpack* For unpacking non-ASCII files if TMPDIR environment variable is not set or the directory specified in it is not accessible and /var/tmp directory is not accessible. $TMPDIR/compress* For uncompressing files, which are packed using -Z option, if TMPDIR environment variable is set and the directory specified in it is accessible.
shl(1) shl(1) NAME shl - shell layer manager SYNOPSIS shl DESCRIPTION shl provides a means for interacting with more than one shell from a single terminal by using shell layers. A layer is a shell that is bound to a virtual device. The virtual device can be manipulated like an actual terminal by using stty and ioctl() (see stty(1) and ioctl(2)). Each layer has its own process group ID. The user controls these layers by using the commands described below.
shl(1) shl(1) name Change the status of the layer referred to by name to that of current layer. Any unique prefix is accepted. WARNINGS Commands The behavior of the block and unblock shl commands is not guaranteed when the SHELL environment variable is set to /usr/bin/csh (for csh(1)) or /usr/bin/ksh (for ksh(1)), or when the shell saves and restores the tty state (defined in termio(7)) before and after each command is invoked interactively from that shell.
show_patches(1) show_patches(1) NAME show_patches - HP-UX patch display utility SYNOPSIS show_patches [-a] [-s] [-i] [-o] [-t] [-d target] [-l {product|fileset}] DESCRIPTION The show_patches utility displays active and superseded patches in a formatted output, which may be easier to interpret than the output of the swlist command (see swlist(1M)).
size(1) size(1) NAME size - print section sizes of object files SYNOPSIS size [-d] [-o] [-x] [-V] [-v] [-f] [-F] [-n] [-U] files DESCRIPTION size produces section size information for each section in the object files. The size of the text, data and bss (uninitialized data) sections are printed along with the total size of the object file. If an archive file is input to the size command, the information for all archive members is displayed.
size(1) size(1) EXAMPLES Compare the sizes of the text, data, and bss sections for two versions of a program: size ./version1 ./version2 SEE ALSO System Tools: as(1) cc(1) ld(1) Miscellaneous: a.
sleep(1) sleep(1) NAME sleep - suspend execution for an interval SYNOPSIS sleep time DESCRIPTION sleep suspends execution for time seconds. It is used to execute a command after a certain amount of time, as in: (sleep 105; command)& or to execute a command periodically, as in: while true do command sleep 37 done RETURN VALUE sleep exits with one of the following values: 0 The execution was successfully suspended for time seconds, or a SIGALRM signal was received.
slp(1) slp(1) NAME slp - set printing options for a non-serial printer SYNOPSIS slp [-a] [-b] [-c cols ] [-d] [-i indent ] [-k] [-l lines ] [-n] [-o] [-r] [-C pages ] [-O pages ] DESCRIPTION slp sets printer formatting options such as the number of lines per page, number of characters per line, and indentation. These characteristics are controlled by the printer driver as described in lp(7). slp acts on the current standard output.
soelim(1) soelim(1) NAME soelim - eliminate .so’s from nroff input SYNOPSIS soelim [ file ... ] DESCRIPTION soelim reads the specified files or the standard input and performs the textual inclusion implied by nroff directives of the form .so some_file when they appear at the beginning of input lines. This is useful when using programs such as tbl(1) that do not normally do this, allowing placement of individual tables or other text objects in separate files to be run as a part of a large document.
sort(1) sort(1) NAME sort - sort or merge files SYNOPSIS sort [-m] [-o output ] [-bdfinruM ] [-t char ] [-k keydef ] [-y [kmem ] ] [-z recsz ] [-T dir ] [ file ... ] sort [-c] [-AbdfinruM ] [-t char ] [-k keydef ] [-y [ kmem ] ] [-z recsz ] [-T dir ] [file ... ] DESCRIPTION sort performs one of the following functions: 1. Sorts lines of all the named files together and writes the result to the specified output. 2.
sort(1) sort(1) The following options override the default ordering rules: -d Quasi-dictionary order: only alphanumeric characters and blanks (spaces and tabs), as defined by LC_CTYPE are significant in comparisons (see environ(5)). (UNIX Standard only, see standards(5)) The behavior is undefined for a sort key to which -i or -n also applies. -f Fold letters. Prior to being compared, all lowercase letters are effectively converted into their uppercase equivalents, as defined by LC_CTYPE .
sort(1) sort(1) A field_start position specified by m .n is interpreted to mean the nth character in the mth field. A missing n means .1 , indicating the first character of the mth field. If the -b option is in effect, n is counted from the first non-blank character in the mth field. A field_end position specified by m .n is interpreted to mean the nth character in the mth field. If n is missing, the mth field ends at the last character of the field.
sort(1) sort(1) International Code Set Support Single- and multi-byte character code sets are supported. EXAMPLES Sort the contents of infile with the second field as the sort key: sort -k 2,2 infile Sort, in reverse order, the contents of infile1 and infile2 , placing the output in outfile and using the first two characters of the second field as the sort key: sort -r -o outfile -k 2.1,2.
sort(1) sort(1) STANDARDS CONFORMANCE sort : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
spell(1) spell(1) NAME spell, hashmake, spellin, hashcheck - find spelling errors SYNOPSIS spell [-v] [-b] [-x] [-l] [-i] [+local_file ] [ files ] /usr/lbin/spell/hashmake /usr/lbin/spell/spellin n /usr/lbin/spell/hashcheck spelling_list DESCRIPTION The spell command collects words from the named files and looks them up in a spelling list.
spell(1) spell(1) EXAMPLES To check spelling of a single word: echo word | spell If word is spelled correctly, a prompt is returned. If it is spelled incorrectly, word is printed before the prompt is returned. To check spelling of multiple words, they can also be typed as a group on the same command line: echo worda wordb wordc ...
split(1) split(1) NAME split - split a file into pieces SYNOPSIS split [-l line_count ] [-a suffix_length ] [ file [ name ]] split [-b n[km] ] [-a suffix_length ] [ file [ name ]] Obsolescent split [-n ] [ file [ name ] ] DESCRIPTION split reads file and writes it in pieces (default 1000 lines) onto a set of output files. The name of the first output file is name with aa appended, and so on lexicographically, up to zz (only ASCII letters are used, a maximum of 676 files).
ssp(1) ssp(1) NAME ssp - remove multiple line-feeds from output SYNOPSIS ssp DESCRIPTION ssp (single-space) removes redundant blank lines from the standard input and sends the result to the standard output. All blank lines at the beginning of a file are removed, and all multiple blank lines elsewhere in the file (including end-of-file) are reduced to a single blank line. ssp is typically used in pipelines such as nroff -ms file1 | ssp ssp is equivalent to the 4.2BSD cat -s command.
strings(1) strings(1) NAME strings - find the printable strings in an object or other binary file SYNOPSIS strings [-a] [-t format ] [-n number ] [ file ] ... Obsolescent strings [-a] [-o] [-number ] [ file ] ... DESCRIPTION strings looks for ASCII strings in a file. If no file is specified, standard input is used. A string is any sequence of four or more printing characters ending with a newline or null character. strings is useful for identifying random object files and many other things.
strip(1) strip(1) NAME strip - strip symbol and line number information from an object file SYNOPSIS strip [-l] [-x] [-r] [-V] [-U] filename ... DESCRIPTION strip removes the symbol table and line number information from object files, including archives. Thereafter, no symbolic debugging access is available for that file; thus, this command is normally run only on production modules that have been debugged and tested. The effect is nearly identical to using the -s option of ld.
strip(1) strip(1) If any internationalization variable contains an invalid setting, strip behaves as if all internationalization variables are set to C. See environ(5). In addition, the following environment variable affects strip : TMPDIR Specifies a directory for temporary files (see tmpnam(3S)). International Code Set Support Single- and multi-byte character code sets are supported. DIAGNOSTICS strip: name : cannot open name cannot be read.
stty(1) stty(1) NAME stty - set the options for a terminal port SYNOPSIS stty [-a|-g|options] DESCRIPTION stty sets or reports current settings of certain terminal I/O options for the device that is the current standard input. The command takes four forms: stty stty -a stty -g Report the settings of a system-defined set of options; stty options Set terminal I/O options as defined by options.
stty(1) Input Modes ignbrk (-ignbrk ) stty(1) Ignore (do not ignore) break on input. ienqak (-ienqak ) brkint (-brkint ) ignpar (-ignpar ) parmrk (-parmrk ) inpck (-inpck ) istrip (-istrip ) inlcr (-inlcr ) igncr (-igncr ) icrnl (-icrnl ) iuclc (-iuclc ) ixon (-ixon ) Enable (disable) ENQ-ACK Handshaking. ixany (-ixany ) ixoff (-ixoff ) Allow any character (only DC1) to restart output. Signal (do not signal) INTR on break. Ignore (do not ignore) parity errors.
stty(1) stty(1) echoe (-echoe ) Echo (do not echo) ERASE character as a backspace-space-backspace string. Note: this mode erases the ERASEed character on many CRT terminals. However, it does not keep track of column position and, as a result, may not correctly erase escaped characters, tabs, and backspaces.
stty(1) stty(1) nl (-nl) Unset (set) icrnl and onlcr . In addition -nl unsets inlcr , igncr , ocrnl , and onlret . lcase (-lcase ) LCASE (-LCASE ) tabs (-tabs or tab3 ) ek sane term Set (unset) xcase , iuclc , and olcuc . Same as lcase (-lcase ). Preserve (expand to spaces) tabs when printing. Reset ERASE and KILL characters back to default # and @. Reset all modes to some reasonable values.
stty(1) stty(1) Any terminal port opened after this command is issued will see these new default values for the kill , intr , and werase control characters. WARNINGS Use of raw mode produces certain side effects which have varied from release to release in the past and may vary in the future. Relying on these side effects in applications can lead to unreliable results in the future and is therefore discouraged.
su(1) su(1) NAME su - switch user SYNOPSIS su [-] [username [arguments] ] su [-] -d [username] DESCRIPTION The su (set user or superuser) command allows one user to become another user without logging out. username is the name of a user defined in the /etc/passwd file (see passwd(4)). The default name is root (that is, superuser). To use su, the appropriate password must be supplied unless the current user is superuser and is not using the -d option.
su(1) su(1) If the shell specified in /etc/passwd is /usr/bin/sh , su sets the value of parameter 0 in the new shell (referenced as $0) to su. If the - option of the su command is specified, su sets parameter 0 to -su. If the shell specified in /etc/passwd is not /usr/bin/sh , su sets the value of parameter 0 in the new shell to shellname. If the - option of the su command is specified, su sets parameter 0 to -shellname.
su(1) su(1) su bin -c ’echo hello’ Become user DCEPrincipal in the DCE environment: su -d DCEPrincipal WARNINGS After a valid password is supplied, su uses information from /etc/passwd and /etc/logingroup to determine the user’s group ID and group access list. If /etc/group is linked to /etc/logingroup, and group membership for the user trying to log in is managed by the Network Information Service (NIS), and no NIS server is able to respond, su waits until a server does respond.
sum(1) sum(1) NAME sum - print checksum and block or byte count of file(s) SYNOPSIS sum [-r] [-p] [file ...] Remarks sum is obsolescent and should not be used in new applications that are intended to be portable between systems. Use cksum instead (see cksum(1)). DESCRIPTION sum calculates and prints to standard output a checksum for each named file, and also prints the size of the file in 512 byte blocks, rounded up. The default algorithm is a 16-bit sum of the bytes in which overflow is ignored.
sysdiff(1) sysdiff(1) NAME sysdiff - HP-UX installed software comparator SYNOPSIS sysdiff [-v] system1 system2 DESCRIPTION The sysdiff utility compares the SD-UX packaged software and active patches currently installed on two systems.
tabs(1) tabs(1) NAME tabs - set tabs on a terminal SYNOPSIS tabs [ tabspec ] [+m n ] [-T type ] DESCRIPTION tabs sets the tab stops on the user’s terminal according to the tab specification tabspec, after clearing any previous settings. The user’s terminal must have remotely-settable hardware tabs. If you are using a non-HP terminal, you should keep in mind that behavior will vary for some tab settings. Four types of tab specification are accepted for tabspec: ‘‘canned’’, repetitive, arbitrary, and file.
tabs(1) tabs(1) tabs -- file; pr file Any of the following can be used also; if a given option occurs more than once, the last value given takes effect: -Ttype tabs usually needs to know the type of terminal in order to set tabs and always needs to know the type to set margins. type is a name listed in term(5). If no -T option is supplied, tabs searches for the $TERM value in the environment (see environ(5)).
tail(1) tail(1) NAME tail - deliver the last part of a file SYNOPSIS tail [-f] [-b number ] [ file ] tail [-f] [-c number ] [ file ] tail [-f] [-n number ] [ file ] Obsolescent: tail [± [ number ] ] [lbc] [-f] [ file ] DESCRIPTION tail copies the named file to the standard output beginning at a designated place. If no file is named, standard input is used. Command Forms tail can be used in three forms as indicated above: tail -b number...
tail(1) tail(1) EXTERNAL INFLUENCES Environment Variables LC_CTYPE determines the locale for the interpretation of sequences of bytes of text data as characters (e.g., single- versus multibyte characters in arguments and input files). LC_MESSAGES determines the language in which messages are displayed. If LC_CTYPE or LC_MESSAGES is not specified in the environment or is set to the empty string, the value of LANG is used as a default for each unspecified or empty variable.
talk(1) talk(1) NAME talk - talk to another user SYNOPSIS talk talk_party [ ttyname ] DESCRIPTION The talk utility is a two-way, screen-oriented communication program. The command argument talk_party can take one the following forms: user user @host host !user host :user host .user where user is a login name and host is a host name. The optional command argument, ttyname, can be used to specify the terminal to be used when contacting a user who is logged in more than once.
tar(1) tar(1) NAME tar - tape file archiver SYNOPSIS tar [-]key [arg]... [file -C directory]... DESCRIPTION The tar command saves and restores archives of files on a magnetic tape, a flexible disk, or a regular file. The default archive file is /dev/rmt/0m . If the legacy DSF is disabled, the default value is /dev/rtape/tape1_BEST. See the -f option below. Its actions are controlled by the key argument.
tar(1) tar(1) b Use the next arg argument as the blocking factor for archive records. The default is 20; the maximum is at least 20. However, if the f - modifier is used to specify standard input, the default blocking factor is 1. The blocking factor is determined automatically when reading nine-track tapes (key letters x and t). On nine-track tapes, the physical tape record length is the same as the block size.
tar(1) tar(1) information about the archive entries than just the name. V Same as the v function modifier except that, when using the t option, tar also prints out a letter indicating the type of the archived file. w Cause tar to print the action being taken, followed by the name of the file, then wait for the user’s confirmation. If the user answers y, the action is performed. Any other input means "no". When end-of-tape is reached, tar prompts the user for a new special file and continues.
tar(1) tar(1) file. Link names are still limited to 100 characters when using the N function modifier. There is no way to ask for the n-th occurrence of a file. Tape errors are handled ungracefully. The u function key can be slow. If the archive is a file on disk, flexible disk, or cartridge tape, and if the blocking factor specified on output is not the default, the same blocking factor must be specified on input, because the blocking factor is not explicitly stored in the archive.
tbl(1) tbl(1) NAME tbl - format tables for nroff SYNOPSIS tbl [-TX ] [ file ... ] DESCRIPTION tbl is a preprocessor that formats tables for nroff(1). The input files are copied to the standard output, except for lines between .TS and .TE command lines, which are assumed to describe tables and are reformatted by tbl . (The .TS and .TE command lines are not altered by tbl ). .TS is followed by global options.
tbl(1) tbl(1) is not specified or is set to the empty string, a default of "C" (see lang(5)) is used instead of LANG . If any internationalization variable contains an invalid setting, tbl behaves as if all internationalization variables are set to "C". See environ(5). International Code Set Support Single- and multi-byte character code sets are supported. EXAMPLES If we redefine the tab character to a semicolon, then the input: .TS center box tab(;) ; cB s s cI | cI s ^ | c c l | n n.
tcpdchk(1) tcpdchk(1) NAME tcpdchk - check tcp wrapper configuration SYNOPSYS /usr/bin/tcpdchk [-a] [-d] [-i inet_conf ] [-v] DESCRIPTION tcpdchk examines the tcp wrapper configuration and reports all potential and real problems it can encounter. The command examines the tcpd access control files (by default, these are /etc/hosts.allow and /etc/hosts.deny), and compares the entries in these files against entries in the inetd configuration file.
tcpdchk(1) tcpdchk(1) inetd.conf(4), format of the inetd control file. hosts_access (5), format of the tcpd access control tables. hosts_options(5), format of the language extensions.
tcpdmatch(1) tcpdmatch(1) NAME tcpdmatch - evaluate tcp wrapper service requests SYNOPSYS /usr/bin/tcpdmatch [-d] [-i inet_conf] daemon client /usr/bin/tcpdmatch [-d] [-i inet_conf] daemon[@server] [user@]client DESCRIPTION tcpdmatch predicts how the tcp wrapper would handle a specific request for service. Examples are given below. The program examines the tcpd access control tables (default /etc/hosts.allow and /etc/hosts.deny) and prints its conclusion.
tcpdmatch(1) tcpdmatch(1) FILES The default locations of the tcpd access control tables are: /etc/hosts.allow /etc/hosts.deny (daemon, client) pairs that are granted access. (daemon, client) pairs that are denied access. SEE ALSO tcpdchk(1), tcpd configuration checker. inetd.conf(4), format of the inetd control file. hosts_access (5), format of the tcpd access control tables. hosts_options(5), format of the language extensions.
tee(1) tee(1) NAME tee - pipe fitting to copy standard output to file SYNOPSIS tee [-i] [-a] [file]... DESCRIPTION The tee command transcribes the standard input to the standard output and makes copies in the files. Options -i -a This option ignores interrupts. This option appends the output to the files rather than overwriting the files. EXTERNAL INFLUENCES Environment Variables LC_MESSAGES determines the language in which messages are displayed.
telnet(1) telnet(1) NAME telnet - user interface to the TELNET protocol SYNOPSIS telnet [ [ options ] host [ port ] ] DESCRIPTION telnet is used to communicate with another host using the TELNET protocol. If telnet is invoked without arguments, it enters command mode, indicated by its prompt (telnet> ). In this mode, it accepts and executes the commands listed below. If telnet is invoked with arguments, it performs an open command (see below) with those arguments.
telnet(1) telnet(1) manpage for more information. The fallback option can be set in the krb5.conf file within appdefaults Section. If fallback is set to true and the kerberos authentication fails, telnet will use the non-secure mode of authentication. Note: Command line options override configuration file options. The following options are Kerboros-specific: -a This option is applicable only in a secure environment based on Kerberos V5.
telnet(1) telnet(1) Note: Setting line-mode also sets local echo. Applications that expect to interpret user input character by character (such as more , csh , ksh , and vi ) do not work properly in line mode. status Show current status of telnet . telnet reports the current escape character. If telnet is connected, it reports the host to which it is connected and the current mode . If telnet is not connected to a remote host, it reports No connection .
telnet(1) telnet(1) the interrupt character is typed, a TELNET IP sequence (see send ip above) is sent to the remote host. The initial value for the interrupt character is taken to be the terminal’s intr character. quit If telnet is in localchars mode (see toggle localchars below) and the quit character is typed, a TELNET BRK sequence (see send brk above) is sent to the remote host. The initial value for the quit character is taken to be the terminal’s quit character.
telnet(1) telnet(1) crlf If TRUE, end-of-line sequences are sent as an ASCII carriage-return and linefeed pair. If FALSE, end-of-line sequences are sent as an ASCII carriage-return and NUL character pair. The initial value for this toggle is FALSE. crmod Toggle carriage return mode. When this mode is enabled, any carriage return characters received from the remote host are mapped into a carriage return and a line feed. This mode does not affect those characters typed by the user; only those received.
test(1) test(1) NAME test - condition evaluation command SYNOPSIS test expr [ expr ] DESCRIPTION The test command evaluates the expression expr and, if its value is True, returns a zero (true) exit status; otherwise, a nonzero (false) exit status is returned. test also returns a nonzero exit status if there are no arguments. The following primitives are used to construct expr: -r -w -x -f -d -c -b -p -u -g -k -s -h -t file True if file exists and is readable.
test(1) test(1) EXAMPLES Exit if there are not two or three arguments: if [ $# -l2 2 -o $# -gt 3 ]; then exit 1; fi Create a new file containing the text string default if the file does not already exist: [ ! -f thisfile ] && echo default > thisfile Wait for myfile to become non-readable: while test -r myfile do sleep 30 done echo ’"myfile" is no longer readable’ WARNINGS When the [ form of this command is used, the matching ] must be the final argument, and both must be separate arguments from the arg
tftp(1) tftp(1) NAME tftp - trivial file transfer program SYNOPSIS tftp [ -B val ] [ -s ] [ -t val ] [host [port]] DESCRIPTION tftp is the user interface to the Internet TFTP (Trivial File Transfer Protocol), that allows users to transfer files to and from a remote machine. The remote host can be specified on the command line, in which case tftp uses host as the default host for future transfers (see the connect command below). Note tftp now conforms to the RFCs: 2347, 2348, and 2349.
tftp(1) tftp(1) verbose Toggle verbose mode. trace Toggle packet tracing. status Show current status. rexmt retransmission-timeout Set the per-packet retransmission timeout, in seconds. timeout total-transmission-timeout Set the total transmission timeout, in seconds. ascii Shorthand for "mode ascii" binary Shorthand for "mode binary" blksize val Set the block size for data transfer. The client and the server communicate to arrive upon a block size that is suitable for use on the network medium.
time(1) time(1) NAME time - time a command SYNOPSIS time command time [-p] utility [argument ...] DESCRIPTION When a specified command or utility completes execution, time prints the elapsed time during the command or utility, the time spent in the system, and the time spent executing the command or utility. Times are reported in seconds. Execution time can depend on the performance of the memory in which the program is running. The times are printed to standard error.
timex(1) timex(1) NAME timex - time a command; report process data and system activity SYNOPSIS timex [-o] [-p[fhkmrt ] ] [-s] command DESCRIPTION timex reports in seconds the elapsed time, user time, and system time spent in execution of the given command. Optionally, process accounting data for command and all its children can be listed or summarized, and total system activity during the execution interval can be reported. The output of timex is written on the standard error.
top(1) top(1) NAME top - display and update information about the top processes on the system SYNOPSIS top [-s time] [-d count] [-q] [-u] [-w] [-h] [-P] [-n number] [-f filename] [-p pset_id] DESCRIPTION top displays the top processes on the system and periodically updates the information. Raw CPU percentage is used to rank the processes. Options top recognizes the following command-line options: -s time Set the delay between screen updates to time seconds.
top(1) top(1) Display Description Three general classes of information are displayed by top : System Data The first few lines at the top of the display show general information about the state of the system, including: • System name and current time. • Load averages in the last one, five, and fifteen minutes of all the active processors in the system. • Number of existing processes and the number of processes in each state (sleeping, waiting, running, starting, zombie, and stopped).
top(1) top(1) top -P -s2 -d5 To display information about pset 2, use: top -p 2 top -P -p 2 To display individual CPU information in place of individual process information, use: top -w and press the w key. AUTHOR top was developed by HP and William LeFebvre of Rice University.
touch(1) touch(1) NAME touch - update access, modification, and/or change times of file SYNOPSIS touch [-amc ] [-r ref_file | -t time] file_name... Obsolescent touch time_str file_name... DESCRIPTION touch updates the access, modification, and last-change times of each argument. The file name is created if it does not exist. If no time is specified (see date(1)) the current time is used. The -r and -t options are mutually exclusive.
touch(1) touch(1) This is for backward compatibility. The -t form given above is recommended for future portability. The -- option delimiter can be used before the first file_name if there is a possibility that file_name consists of all digits, in order to ensure that the first syntax is used. touch succeeds only when invoked by the owner of the file if any of the following are true: • A time is specified. • Only the access time of the file is being updated.
touch(1) touch(1) SEE ALSO date(1), utime(2). STANDARDS CONFORMANCE touch : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
tput(1) tput(1) NAME tput - query terminfo database SYNOPSIS tput [-T type] capname . . . tput [-T type] capname [parms . . . ] tput -S DESCRIPTION The tput command uses the terminfo database to make terminal-dependent capabilities and information available to the shell (see terminfo(4)). The tput command outputs a string if the attribute (capname) is of type string, or an integer if the attribute is of type integer.
tput(1) tput(1) Clear the screen, move the cursor to line 10, column 20 and turn on bold. tput -S <4 The capability name is of type integer and does not exist. Usage error. Unknown terminal type.
tr(1) tr(1) NAME tr - translate characters SYNOPSIS tr [-Acs ] string1 string2 tr -s [-Ac ] string1 tr -d [-Ac ] string1 tr -ds [-Ac ] string1 string1 DESCRIPTION tr copies the standard input to the standard output with substitution or deletion of selected characters. Input characters from string1 are replaced with the corresponding characters in string2. If necessary, string1 and string2 can be quoted to avoid pattern matching by the shell.
tr(1) tr(1) specification is interpreted as a request for case conversion. When [:lower:] appears in string1 and [:upper:] appears in string2, the arrays contain the characters from the toupper mapping in the LC_CTYPE category of the current locale. When [:upper:] appears in string1 and [:lower:] appears in string2, the arrays contain the characters from the tolower mapping in the LC_CTYPE category of the current locale.
tr(1) tr(1) Translate each digit in file1 to a # (number sign), and write the result to file2. tr "0-9" "[#*]" file2 The * (asterisk) tells tr to repeat the # (number sign) enough times to make the second string as long as the first one. AUTHOR tr was developed by OSF and HP. SEE ALSO ed(1), sh(1), ascii(5), environ(5), lang(5), regexp(5). STANDARDS CONFORMANCE tr: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
true(1) true(1) NAME true, false - return exit status zero or one respectively SYNOPSIS true false DESCRIPTION The command true does nothing, and returns exit code zero. The command false does nothing, and returns exit code one. They are typically used to construct command procedures. RETURN VALUE Exit values are: 0 1 always from true. always from false. EXAMPLES This command loop repeats without end: while true do command done WARNINGS true is typically used in shell scripts.
tryfrom(1) tryfrom(1) NAME tryfrom, sffinger - utility programs for TCP Wrappers SYNOPSIS /usr/bin/tryfrom /usr/bin/sffinger DESCRIPTION tryfrom This program identifies the end-point details related to a connection. This program must be called via a remote shell command as shown below. It is used to find out if the hostname and the address are properly recognized, and also if the username lookup works properly.
tset(1) tset(1) NAME tset, reset - terminal-dependent initialization SYNOPSIS tset [options] [-m [ident] [test baudrate] :type]... reset [type] DESCRIPTION tset sets up the terminal when logging in on an HP-UX system. It does terminal-dependent processing, such as setting erase and kill characters, setting or resetting delays, and sending any sequences needed to properly initialize the terminal.
tset(1) tset(1) On terminals that can backspace but not overstrike (such as a CRT), and when the erase character is the default erase character (# on standard systems), the erase character is changed to Backspace. Options tset recognizes the following options: -ec Set the erase character to be the named character c; c defaults to what the terminfo database (see terminfo(4)) entry reports to be the character sent by the Backspace key (usually ˆH ).
tset(1) tset(1) EXAMPLES These examples all assume the sh(1). Note that a typical use of tset in a .profile also uses the -e and -k options, and often the -m or -Q options as well. These options have been omitted here to keep the examples small. Assume, for the moment, that you are on an HP 2622. This is suitable for typing by hand but not for a .profile unless you are always on a 2622.
tsm(1) tsm(1) NAME tsm - Terminal Session Manager SYNOPSIS tsm DESCRIPTION tsm allows a user to interact with more than one shell or application (session) from a single terminal. Each session is bound to a virtual device emulating the physical terminal. The emulation includes maintaining display state, softkeys, and terminal modes for each session. The virtual device can be manipulated like the actual terminal by using stty and ioctl (see stty(1) and ioctl(2)).
tsm(1) tsm(1) o Output the current display to a printer (screen dump). The print mechanism is specified in a file named .tsmprint searched for in the standard way. Character attribute information is ignored. k Load the softkeys of the current session from a file. To load tsm defaults, specify "file" +. To load terminal defaults, specify "file" -. g x Same as k above but softkeys are loaded "globally" into all sessions.
tsm.command(1) tsm.command(1) NAME tsm.command - send commands to the Terminal Session Manager, TSM SYNOPSIS /usr/tsm/bin/tsm.command command DESCRIPTION tsm.command is used to send a command string programmaticly to the Terminal Session Manager (TSM), as if the string were typed on the TSM command line. tsm.command fails unless it is run from inside a TSM session. Actions caused by tsm.command affect only the instance of TSM that tsm.command is run under.
tsm.info(1) tsm.info(1) NAME tsm.info - get Terminal Session Manager state information SYNOPSIS /usr/tsm/bin/tsm.info request DESCRIPTION tsm.info is used to obtain information about TSM. When run from inside a TSM session it returns valid information; otherwise it fails with a nonzero error code. Information returned is written to standard output. request can have any of the following values: is_a_window Successful (returns zero) if executed from a TSM session, nonzero error code otherwise.
tsort(1) tsort(1) NAME tsort - topological sort SYNOPSIS tsort [ file ] DESCRIPTION tsort produces on the standard output a totally ordered list of items consistent with a partial ordering of items mentioned in the input text file. If no file is specified, the standard input is understood. tsort is generally used in conjunction with the lorder command to sort the objects to be installed in a library by ar (see lorder(1) and ar(1)).
tty(1) tty(1) NAME tty, pty - get the name of the terminal SYNOPSIS tty [-s] pty [-s] DESCRIPTION tty and pty print the path name of the user’s terminal. The -s option inhibits printing of the terminal path name and any diagnostics, providing a means to test only the exit code. RETURN VALUE Exit status codes for tty are: 2 1 0 Invalid options were specified, The standard input is not a terminal or pseudo-terminal, The standard input is a terminal or pseudo-terminal.
ttytype(1) ttytype(1) NAME ttytype - terminal identification program SYNOPSIS ttytype [-apsv ] [-t type] DESCRIPTION ttytype automatically identifies the current terminal type by sending an identification request sequence to the terminal. This method works for local, modem, and remote terminal connections, as well as for the hpterm and xterm terminal emulators. Once the terminal has been identified, ttytype prints the terminal’s type to the standard output (see terminfo(4)).
ttytype(1) ttytype(1) 4. If none of the above steps succeed, ttytype prompts interactively for the correct terminal type unless the -a option has been given. ttytype may skip one or more of the first three steps, depending on the presence of -t options. The HP ID request sequence can switch some ANSI terminals into an unexpected operating mode. Recovery from such a condition sometimes requires cycling power on the terminal. To avoid this problem, ttytype always sends the HP identification sequence last.
ul(1) ul(1) NAME ul - do underlining SYNOPSIS ul [-t terminal ] [-i] [ name ... ] DESCRIPTION ul reads the named files (or standard input if none are given) and translates occurrences of underscores to the sequence which indicates underlining for the terminal in use, as specified by the environment variable TERM . The -t option overrides the terminal type specified in the environment. The terminfo(4) file corresponding to TERM is read to determine the appropriate sequences for underlining.
umask(1) umask(1) NAME umask - set or display the file mode creation mask SYNOPSIS Set Mask umask mask Display Mask umask [-S] DESCRIPTION The umask command sets the value of the file mode creation mask or displays the current one. The mask affects the initial value of the file mode (permission) bits for subsequently created files. Setting the File Mode Creation Mask The umask mask command sets a new file mode creation mask for the current shell execution environment.
umask(1) umask(1) Numeric Mask Value (Obsolescent) A numeric mask replaces the current file mode creation mask.
umask(1) umask(1) RETURN VALUE umask exits with one of the following values: 0 The file mode creation mask was successfully changed or no mask operand was supplied. >0 An error occurred. EXAMPLES In these examples, each line show an alternate way of accomplishing the same task.
umodem(1) umodem(1) NAME umodem - XMODEM-protocol file transfer program SYNOPSIS umodem [options] files ... umodem -c DESCRIPTION umodem is a file transfer program that incorporates the well-known XMODEM protocol used on CP/M systems and on the HP 110 portable computer. Options umodem recognizes the following options and command-line arguments: -1 (one) Employ TERM II FTP 1. -3 Enable TERM FTP 3 (CP/M UG). -7 Enable 7-bit transfer mask. -a Turn on ARPA Net flag. -c Enter command mode.
uname(1) uname(1) NAME uname - display information about computer system; set node name (system name) SYNOPSIS uname [-ailmnrsv ] uname [-S nodename] DESCRIPTION In the first form above, the uname command displays selected information about the current computer system, derived from the utsname structure (see uname(2)). In the second form, uname sets the node name (system name) that is used in the utsname structure. Options uname recognizes the options listed below.
uname(1) uname(1) Many types of networking services are supported on HP-UX, each of which uses a separately assigned system name and naming convention. To ensure predictable system behavior, it is essential that system names (also called host names or node names) be assigned in such a manner that they do not create conflicts when the various networking facilities interact with each other.
unget(1) unget(1) NAME unget - undo a previous get of an SCCS file SYNOPSIS unget [-r SID] [-s ] [-n ] file ... DESCRIPTION The unget command undoes the effect of a get -e done prior to creating the intended new delta. If file is a directory name, unget treats each file in the directory as a file to be processed, except that non-SCCS files and unreadable files are silently ignored.
unifdef(1) unifdef(1) NAME unifdef - remove preprocessor lines SYNOPSIS unifdef [-clt ] [ [-D sym ] [-U sym ] [-iD sym ] [-iU sym ] ] ... [ file ] DESCRIPTION unifdef simulates some of the actions of cpp in interpreting C language preprocessor command lines (see cpp(1)). For unifdef , a valid preprocessor command line contains as its first character a # and one of the following keywords: ifdef , ifndef , if , else , or endif .
unifdef(1) unifdef(1) 100 CONTINUE #endif END The command sequence: unifdef -DANSI77 -UDEBUG -DTEST foo.f > /tmp/foo.f produces the following result in file /tmp/foo.f : PROGRAM TEST1 INTEGER I, J DO I=1,10 J=J+1 PRINT *,J ENDDO END WARNINGS Any symbol name defined in the file must be specified in the unifdef command line; otherwise, unifdef will ignore the line. AUTHOR unifdef was developed in the public domain. SEE ALSO cpp(1).
uniq(1) uniq(1) NAME uniq - report repeated lines in a file SYNOPSIS uniq [-udc [-f fields ] [-s chars ] [ input_file [ output_file ] ] DESCRIPTION uniq reads the input text file input_file, comparing adjacent lines, and copies the result to output_file. If input_file is not specified, the standard input and standard output are used. If input_file is specified, but output_file is not, results are printed to standard output. input_file and output_file must not be the same file.
uniq(1) uniq(1) SEE ALSO comm(1), sort(1). STANDARDS CONFORMANCE uniq : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
units(1) units(1) NAME units - conversion program SYNOPSIS units [- file] DESCRIPTION units converts quantities expressed in various standard scales to their equivalents in other scales. It works interactively as follows: System Prompt User Response You have: You want: inch cm The system responds with two factors; one used if multiplying (preceded by *), the other if dividing (preceded by /): * 2.540000e+00 / 3.
uptime(1) uptime(1) NAME uptime, w - show how long system has been up, and/or who is logged in and what they are doing SYNOPSIS uptime [-hlsuw ] [user] uptime [-p[pset_list]] w [-hlsuw ] [user] w [-p[pset_list]] DESCRIPTION uptime prints the current time, the length of time the system has been up, the number of users logged on to the system, and the average number of jobs in the run queue over the last 1, 5, and 15 minutes for the active processors.
uptime(1) uptime(1) load average for pset 97 : 1.00, 1.00, 1.01 The command: uptime -p94,95 or uptime -p"94 95" gives the output which looks like the following, if 94 and 95 are valid pset ids: 7:59pm up 11 days, 6:25, 12 users load average for pset 94 : 0.00, 0.00, 0.00 load average for pset 95 : 0.00, 0.00, 0.00 AUTHOR uptime was developed by the University of California, Berkeley and HP.
users(1) users(1) NAME users - compact list of users who are on the system SYNOPSIS users DESCRIPTION users lists the login names of the users currently on the system in a compact, one-line format. The login names are sorted in ascending collation order (see Environment Variables below). EXTERNAL INFLUENCES Environment Variables LC_COLLATE determines the order in which the output is sorted.
uucp(1) uucp(1) NAME uucp, uulog, uuname, uutry - UNIX system to UNIX system copy SYNOPSIS uucp [options] source_files destination_file uulog -f system [-x] [-number] uulog [-s system ]... [-x] [-number] uuname [-l] uutry -r1 -s system [-x debug_level] DESCRIPTION uucp copies files named by the source_files argument to the destination identified by the destination_file argument.
uucp(1) -j uucp(1) Output the ASCII job identification string on standard output. This job identification can be used by uustat to obtain the status or terminate a job (see uustat(1)). -mfile Send mail to the requester when the copy is completed. -nuser Notify user on the remote system that a file was sent. -r Do not start the file transfer; just queue the job. -sfile Report status of the transfer to file. Note that file must be a full path name. -x debug_level Produce debugging on standard output.
uucp(1) uucp(1) WARNINGS The domain of remotely accessible files can (and for obvious security reasons, usually should) be severely restricted. In most cases, you cannot fetch files by path name from a remote system. Ask a responsible person on the remote system to send them to you. For the same reasons, you probably cannot send files to arbitrary path names. As distributed, remotely accessible files are those whose names begin /var/spool/uucppublic (equivalent to ˜/).
uuencode(1) uuencode(1) NAME uuencode, uudecode - encode/decode a binary file for transmission by mailer SYNOPSIS uuencode [-m] [ source_file ] remotedest uudecode [-o outfile] [ encoded_file ] DESCRIPTION uuencode and uudecode can be used to send a binary file to another machine by means of such services as elm , mailx , or uucp (see elm(1), mailx(1), and uucp(1)). uuencode takes the named source file (default standard input) and produces an encoded version on the standard output.
uuencode(1) uuencode(1) 13 14 15 16 N O P Q 30 31 32 33 e f g h 47 48 49 50 v w x y (pad) = When encoding a bit stream via the Base64 encoding, the bit stream is presumed to be ordered with the most-significant bit first. That is, the first bit in the stream shall be the high-order bit in the first byte, and the eighth bit shall be the low-order bit in the first byte, and so on. Each line of the encoded output can have only 76 characters or less.
uuencode(1) uuencode -m abc xyz uuencode(1) > outfile The following example shows how to encode and send a compiled program foo to user friend : uuencode foo foo | mailx -s new_program friend After receiving the mail message, user friend can decode the program to a file with the same name as the original file by first saving the message in a file foo.mail and executing the command: uudecode foo.mail Similarly, the user friend can also decode the program to a file named foo.
uupath(1) uupath(1) (TO BE OBSOLETED) NAME uupath, mkuupath - access and manage the pathalias database SYNOPSIS uupath [-f pathsfile ] mailaddress mkuupath [-v] pathsfile DESCRIPTION The uucp commands, including uupath and mkuupath , are targeted for removal from HP-UX; see the WARNINGS below. uupath provides electronic message routing by expanding a simple UUCP address into a full UUCP path (see uucp(1)). For example, host !user could be expanded into hostA !hostB !host!user.
uustat(1) uustat(1) NAME uustat - uucp status inquiry and job control SYNOPSIS uustat uustat uustat uustat uustat uustat uustat -a -m -p -q -k jobid ] -r jobid ] [-s sys ] [-u user ] DESCRIPTION uustat displays the status of, or cancels, previously specified uucp commands, or provide general status on uucp connections to other systems (see uucp(1)). Only one of the following options can be specified with uustat per command execution: -a -m -p -q Output all jobs in queue.
uustat(1) uustat(1) When no options are given, uustat outputs the status of all uucp requests issued by the current user. The format used is the same as with the -s or -u options. EXTERNAL INFLUENCES Environment Variables LC_TIME determines the format and contents of date and time strings. LANG determines the language in which messages are displayed. If LC_TIME is not specified in the environment or is set to the empty string, the value of LANG is used as a default for each unspecified or empty variable.
uuto(1) uuto(1) NAME uuto, uupick - public UNIX system to UNIX system file copy SYNOPSIS uuto [ options ] source-files destination uupick [-s system ] DESCRIPTION uuto sends source-files to destination. uuto uses the uucp facility to send files (see uucp(1)), while allowing the local system to control the file access. A source-file name is a path name on your machine.
uuto(1) uuto(1) Grace Todino and Dale Dougherty, Using UUCP and Usenet, O’Reilly & Associates, Inc. USA.
uux(1) uux(1) NAME uux - UNIX system to UNIX system command execution SYNOPSIS uux [ options ] command-string DESCRIPTION uux gathers zero or more files from various systems, executes a command on a specified system, then sends standard output to a file on a specified system. Note that, for security reasons, many installations limit the list of commands executable on behalf of an incoming request from uux .
uux(1) uux(1) -n -r -sfile -xdebug_level Do not notify the user if the command fails. -z Send success notification to user. Do not start the file transfer, just queue the job. Report status of the transfer in file. Produce debugging output on standard output. The debug_level is a number between 0 and 9. The higher the number, the more detailed the information returned. WARNINGS Only the first command of a shell pipeline can have a system-name !.
vacation(1) vacation(1) NAME vacation - return "I am not here" indication SYNOPSIS vacation -i vacation [-a alias]... login DESCRIPTION The vacation program returns a message to the sender of a message telling them that you are currently not reading your mail. The intended use is in a .forward file in $HOME . For example, your .
vacation(1) vacation(1) DIAGNOSTICS On error, vacation exits with a value from and causes sendmail to report an error back to the sender of the original message. Errors such as the absence of .vacation.msg or calling vacation with incorrect arguments, are logged using syslogd on the system where vacation actually runs (see syslogd(1M)). The syslog file (/var/adm/syslog/mail.log by default; see /etc/syslog.
val(1) val(1) NAME val - validate SCCS file SYNOPSIS val val [-s] [-r SID] [-m name ] [-y type ] [-v] files DESCRIPTION The val command reads one or more files to determine whether each file read is an SCCS file meeting the characteristics specified by the optional argument list. Command-line options may appear in any order, and are described below. Options The val command recognizes the following options and command-line arguments. The effects of each option apply independently to each specified file.
val(1) val(1) Note that val can process two or more files on a given command line, and in turn can process multiple command lines (when reading the standard input). In these cases an aggregate code is returned; a logical OR of the codes generated for each command line and file processed. DIAGNOSTICS val generates diagnostic messages on the standard output for each command line and file processed, and also returns a single 8-bit code upon exit as described earlier under RETURN VALUE.
vc(1) vc(1) NAME vc - substitutes assigned values in place of identification keywords. SYNOPSIS vc [-a] [-t] [-c char ] [-s] [ keyword=value ... keyword=value ] DESCRIPTION The vc, or version control command copies lines from the standard input to the standard output under control of command line arguments and control statements encountered in the standard input.
vc(1) vc(1) The syntax of a condition may include the following: ::= [ "not" ] ::= | "|" ::= | "&" ::= "(" ")" | ::= "=" | "!=" | "<" | ">" ::= | The following are available operators and their meanings: = != & | > < ( ) not equal not equal and or greater than less than used for logical groupings allowed only immediately after the if, and when present, invert
vc(1) vc(1) SEE ALSO ed(1), sccshelp(1).
vi(1) vi(1) NAME vi, view, vedit - screen-oriented (visual) text editor SYNOPSIS vi [-] [-l] [-r] [-R] [-t tag] [-v] [-V] [-wsize] [-x] [-C] [+command] [file]... UNIX Standard Synopsis vi [-rR ] [-c command] [-t tag] [-w size] [file]... Obsolescent Options vi [-rR ] [+command] [-t tag] [-w size] [file]... view [-] [-l] [-r] [-R] [-t tag] [-v] [-V] [-wsize] [-x] [-C] [+command] [file]... vedit [-] [-r] [-R] [-l] [-t tag] [-v] [-V] [-wsize] [-x] [-C] [+command] [file]...
vi(1) vi(1) transformed version of the key typed in for the -x option (see the crypt command in ex(1)). -C Encryption option. Same as the -x option, except that all text read in is assumed to have been encrypted. -c command +command (Under UNIX Standard only, see standards(5)) (Obsolescent) Begin editing by executing the specified ex command-mode commands.
vi(1) vi(1) ^B Scroll backward to display the previous window of text. A preceding count specifies the number of windows to go back. Two lines of overlap are kept if possible. ^D Scroll forward a half-window of text. A preceding count gives the number of (logical) lines to scroll, and is remembered for future ˆD and ˆU commands. ^D (input mode) Backs up over the indentation provided by autoindent or ˆT to the next multiple of shiftwidth spaces.
vi(1) vi(1) ^] Take the word at or after the cursor as a tag and execute the tag MbobC editor command (see ex(1)). ^ˆ Return to the previous file (equivalent to :ex #). space Move one space to the right (stops at the end of the line). A preceding count specifies the number of spaces to go forward (same as l). erase Erase, where erase is the user-designated erase character (see stty(1)). Same as ˆH . kill Kill, where kill is the user-designated kill character (see stty(1)).
vi(1) vi(1) ) Move forward to the beginning of a sentence. If a count is specified, the cursor advances the specified number of sentences (see (). { Move back to the beginning of the preceding paragraph. A paragraph is defined by the value of the paragraphs option. A completely empty line and a section boundary (see [[ above) are also interpreted as the beginning of a paragraph. If a count is specified, the cursor moves backward the specified number of paragraphs.
vi(1) vi(1) specifies how many characters in the current line are switched. A B Append at the end of line (same as $a ). C D E Change the rest of the text on the current line (same as c$ ). F Must be followed by a single character; scans backwards in the current line, searching for that character and moving the cursor to it, if found. If a count is specified, the search is repeated the specified number of times.
vi(1) vi(1) W Move forward to the beginning of a word in the current line, where a word is a sequence of nonblank characters. If the current position is at the beginning of a word, the current position is within a bigword or the character at that position cannot be a part of a bigword, the current position shall move to the first character of the next bigword.
vi(1) vi(1) s Delete the single character under the cursor and enter input mode; the entered text replaces the deleted character. A preceding count specifies how many characters on the current line are changed. The last character being changed is marked with a $, as for c. t Must be followed by a single character; scan the remainder of the line for that character. The cursor moves to the column prior to the character if the character is found.
vi(1) vi(1) terminfo entry command mode map input mode map map name description key_ic key_eic key_up key_down key_left key_right key_home key_il key_dl key_clear key_eol key_sf key_dc key_npage key_ppage key_sr key_eos i i k j h l H oˆ[ dd ˆL d$ ^E x ˆF ˆB ^Y dG ^[ ^[ ^[ka ^[ja ^[ha ^[la ^[Ha ^[oˆ[a ^[dda ^[ˆLa ^[d$a ^[ˆEa ^[xa ^[ˆFa ^[ˆBa ^[ˆYa ^[dGa inschar inschar up down left right home insline delline clear clreol scrollf delchar npage ppage sr clreos insert char end insert char arrow up ar
vi(1) vi(1) contains an invalid setting, the editor behaves as if all internationalization variables are set to "C". See environ(5). International Code Set Support Single- and multi-byte character code sets are supported. WARNINGS See also the WARNINGS section in ex(1). Program Limits vi places the following limits on files being edited. Maximum Line Length 4096 characters including 2-3 bytes for overhead. Thus, a line length up to 4092 characters should cause no problem.
vis(1) vis(1) NAME vis, inv - make unprintable and non-ASCII characters in a file visible or invisible SYNOPSIS vis [-n] [-s] [-t] [-u] [-x] file . . . inv [-n] [-s] [-t] [-u] [-x] file . . . DESCRIPTION vis reads characters from each file in sequence and writes them to the standard output, converting those that are not printable or not ASCII into a visible form.
vis(1) vis(1) WARNINGS Redirecting output to an input file destroys the original data. Therefore, command forms such as vis file1 file2 >file1 should be avoided unless the source file can be safely discarded. AUTHOR vis was developed by HP. SEE ALSO cat(1), echo(1), od(1).
vmstat(1) vmstat(1) NAME vmstat - report virtual memory statistics SYNOPSIS vmstat [-dnS ] [interval [count] ] vmstat -f -s -z DESCRIPTION The vmstat command reports certain statistics kept about process, virtual memory, trap, and CPU activity. It also can clear the accumulators in the kernel sum structure. Options vmstat recognizes the following options: -d Report disk transfer information as a separate section, in the form of transfers per second.
vmstat(1) vmstat(1) re at si so pi po fr de sr faults Page reclaims (without -S) Address translation faults (without -S) Processes swapped in (with -S) Processes swapped out (with -S) Pages paged in Pages paged out Pages freed per second Anticipated short term memory shortfall Pages scanned by clock algorithm, per second Trap/interrupt rate averages per second over last 5 seconds.
vmstat(1) vmstat(1) CPU cpu us sy id 0 0 100 4. r 0 b in 0 111 r 0 0 0 memory faults cpu w avm free sy cs us sy id 0 1158 430 18 7 0 0 100 page b in 0 111 0 108 memory faults cpu w avm free sy cs us sy id 0 1158 456 18 7 0 0 100 0 1221 436 65 18 0 1 99 si so pi po fr de sr 0 0 0 0 0 0 0 page re at pi po fr de sr 0 0 0 0 0 0 0 5 0 5 0 0 0 0 Display the default output twice in 80-column format at five-second intervals. Note that the headers are not repeated.
vmstat(1) avm 1219 CPU vmstat(1) free 425 cpu us sy id 1 8 92 re 0 r 0 at 0 procs b 0 pi 0 po 0 fr 0 de 0 sr 0 in 111 sy 54 cs 15 w 0 Disk Transfers device xfer/sec c0t6d0 0 c0t1d0 0 c0t3d0 0 c0t5d0 0 8. Display the number of forks and pages of virtual memory since boot-up. vmstat -f 24558 forks, 1471595 pages, average= 9. 59.92 Display the counts of paging-related events. vmstat -s 0 swap ins 0 swap outs 0 pages swapped in 0 pages swapped out 1344563 total address trans.
vt(1) vt(1) NAME vt - log into another system over lan SYNOPSIS /usr/bin/vt nodename [ lan_device ] /usr/bin/vt -p [ lan_device ] DESCRIPTION vt enables a user to log into another HP 9000 system (nodename) over an HP local area network. The -p option causes vt to send a poll request over the local area network to find out what systems currently have vtdaemon running (see vtdaemon(1M)). An asterisk (*) following a nodename in the response indicates that the system is a vt gateway.
vt(1) vt(1) DIAGNOSTICS The diagnostics produced by vt are intended to be self-explanatory. WARNINGS vt uses the Hewlett-Packard LLA (Link Level Access) direct interface to the HP network drivers. vt uses the multicast address 0x01AABBCCBBAA. It should not be used or deleted by other applications accessing the network. vt uses the following IEEE 802.
wait(1) wait(1) NAME wait - await process completion SYNOPSIS wait [ pid ] DESCRIPTION If no argument is specified, wait waits until all processes (started with &) of the current shell have completed, and reports on abnormal terminations. If a numeric argument pid is given and is the process ID of a background process, wait waits until that process has completed. Otherwise, if pid is not a background process, wait exits without waiting for any processes to complete.
wc(1) wc(1) NAME wc - count words, lines, and bytes or characters in a file SYNOPSIS wc [-c-m] [-lw] [file]... DESCRIPTION The wc command counts lines, words, and bytes or characters in the named files, or in the standard input if no file names are specified. It also keeps a total count for all named files. A word is a string of characters delimited by spaces, tabs, or newlines. Options wc recognizes the following options: -c Report the number of bytes in each input file.
wc(1) wc(1) International Code Set Support Single- and multibyte character code sets are supported. with a newline character, the count will be off by one. WARNINGS The wc command counts the number of newlines to determine the line count. If a text file has a final line that is not terminated with a newline character, the count will be off by one.
what(1) what(1) NAME what - get SCCS identification information SYNOPSIS what [-s] file... DESCRIPTION The what command searches the given files for all occurrences of the pattern that get(1) substitutes for %Z% (currently @(#) at this printing) and prints out what follows until the first ", >, newline, \, or null character. For example, if the C program in file f.c contains char ident[] = "@(#)identification information"; and f.c is compiled to yield f.o and a.out , the command what f.c f.o a.
whereis(1) whereis(1) NAME whereis - locate source, binary, and/or manual for program SYNOPSIS whereis [-bsm ] [-u] [-BMS dir... -f] name... DESCRIPTION whereis locates source, binary, and manuals sections for specified files. The supplied names are first stripped of leading path name components and any (single) trailing extension of the form .ext (such as .c ). Prefixes of s. resulting from use of SCCS are also dealt with. whereis then attempts to locate the desired program in a list of standard places.
which(1) which(1) NAME which - locate a program file including aliases and paths SYNOPSIS which [name...] DESCRIPTION For each name given, which searches for the file that would be executed if name were given as a command, and displays the absolute path of that file. Each argument is expanded if it is aliased, and searched for along the user’s path. Both aliases and path are determined by sourcing (executing) the user’s .cshrc file.
who(1) who(1) NAME who - who is on the system SYNOPSIS who [-muTlHqpdbrtasARW] [ file ] who am i who am I DESCRIPTION The who command can list the user’s name, terminal line, login time, elapsed time since input activity occurred on the line, the user’s host name, and the process-ID of the command interpreter (shell) for each current system user. It examines the utmps database to obtain the information. If file is given, that file is examined, file should be a utmp like file.
who(1) who(1) -d This option displays all processes that have expired and have not been respawned by init . The exit field appears for dead processes and contains the termination and exit values of the dead process (as returned by wait() — see wait(2)). This can be useful in determining why a process terminated. -b -r Indicates the time and date of the last reboot. -t Indicates the last change to the system clock (via the date command) by root . See su(1).
who(1) who(1) and look for a plus (+) after the user ID. AUTHOR who was developed by AT&T and HP. FILES /etc/inittab /etc/utmp /var/adm/wtmp /var/adm/wtmps SEE ALSO date(1), login(1), mesg(1), su(1), init(1M), utmpd(1M), gethostname(2), getutsent(3C), getbwent(3C), inittab(4), utmp(4), standards(5). wait(2), gethostent(3N), STANDARDS CONFORMANCE who : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
whoami(1) whoami(1) NAME whoami - print effective current user ID SYNOPSIS whoami DESCRIPTION whoami prints your current user name, even if you have used su to change it since your initial login (see su(1)). The command who am i reports your initial login name because it uses /etc/utmp . FILES /etc/passwd Name data base AUTHOR whoami was developed by the University of California, Berkeley. SEE ALSO who(1).
whois(1) whois(1) NAME whois - Internet user name directory service SYNOPSIS whois [-h hostname ] name DESCRIPTION whois looks up records in the Network Information Center database. The operands specified to whois are concatenated together (separated by white-space) and presented to the whois server.
write(1) write(1) NAME write - interactively write (talk) to another user SYNOPSIS write user [terminal] DESCRIPTION The write command copies lines from your terminal to that of another user. When first called, it sends the message: Message from yourname (yourterminal) [ date ] ... to the receiving user’s terminal. When it has successfully completed the connection, it also sends two bells to your own terminal to indicate that what you are typing is being sent.
write(1) write(1) Your correspondent sent end-of-file, or you set your terminal to mesg n and your correspondent tried to write to you. If you have a write session established, you can continue to write to your correspondent. Permission denied. The user you are trying to write to has denied write permission (with mesg n). Warning: You have your terminal set to "mesg -n". No reply possible. Your terminal is set to mesg n and the recipient cannot respond to you.
xargs(1) xargs(1) NAME xargs - construct argument lists and execute command SYNOPSIS xargs [options] [command [initial-arguments] ] DESCRIPTION xargs combines the fixed initial-arguments with arguments read from standard input to execute the specified command one or more times. The number of arguments read for each command invocation and the manner in which they are combined are determined by the options specified. command, which can be a shell file, is searched for, using the $PATH environment variable.
xargs(1) xargs(1) -t Trace mode: The command and each constructed argument list are echoed to standard error just prior to their execution. -p Prompt mode: The user is asked whether to execute command prior to each invocation. Trace mode (-t) is turned on to print the command instance to be executed, followed by a ?... prompt.
xargs(1) xargs(1) ls | xargs -p -l | xargs ar r arch Execute diff (see diff(1)) with successive pairs of arguments originally typed as shell arguments: echo $* | xargs -n2 diff SEE ALSO sh(1). STANDARDS CONFORMANCE xargs : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
xstr(1) xstr(1) NAME xstr - extract strings from C programs to implement shared strings SYNOPSIS xstr [-c] [-] [ file ] DESCRIPTION xstr maintains a file strings into which strings in component parts of a large program are hashed. These strings are replaced with references to this common area. This serves to implement shared constant strings, which are most useful if they are also read-only.
yes(1) yes(1) NAME yes - be repetitively affirmative SYNOPSIS yes [ expletive ] DESCRIPTION yes repeatedly outputs y, or if expletive is given, the expletive is output repeatedly. Termination is by interrupt. AUTHOR yes was developed by the University of California, Berkeley.
ypcat(1) ypcat(1) NAME ypcat - print all values in Network Information Service map SYNOPSIS ypcat [-k] [-t] [-d domain ] mname ypcat -x Remarks The Network Information Service (NIS) was formerly known as Yellow Pages (YP). The functionality of the two remains the same; only the name has changed. DESCRIPTION ypcat prints all values in a Network Information Service (NIS) map specified by mname, which can be either a mapname or a map nickname.
ypmatch(1) ypmatch(1) NAME ypmatch - print values of selected keys in Network Information Service map SYNOPSIS ypmatch [-k] [-t] [-d domain] key [key ...] ypmatch -x mname Remarks The Network Information Service (NIS) was formerly known as Yellow Pages (yp). Although the name has changed, the functionality of the service remains the same. DESCRIPTION ypmatch prints the values associated with one or more keys in a Network Information Service (NIS) map specified by mname.
yppasswd(1) yppasswd(1) NAME yppasswd - change login password in Network Information System (NIS) SYNOPSIS yppasswd [name] Remarks The Network Information Service (NIS) was formerly known as Yellow Pages (YP). The functionality remains the same; only the name has changed. DESCRIPTION yppasswd changes or installs a password associated with the login name in the Network Information System (NIS). The NIS password can be different from the one on your own machine.
ypwhich(1) ypwhich(1) NAME ypwhich - list which host is Network Information System server or map master SYNOPSIS ypwhich ypwhich [-d domain ] [-V1 -V2 ] [ hostname ] ypwhich [-d domain ] [-t] [-m [ mname ] ] ypwhich -x Remarks The Network Information Service (NIS) was formerly known as Yellow Pages (yp). Although the name has changed, the functionality of the service remains the same.