Intel XENIX 286 Programmers Guide (86) - Tenox.tc
Intel XENIX 286 Programmers Guide (86) - Tenox.tc Intel XENIX 286 Programmers Guide (86) - Tenox.tc
XENIX Programming Programming Commands csh (continued) cdpath child echo histchars history home ignoreeof mail noclobber noglob Gives a list of alternate directories searched to find subdirectories in cd commands. The process number printed when the last command was forked with &. This variable is unset when this process terminates. Set when the -x command line option is given. Causes each command and its arguments to be echoed just before it is executed. For nonbuilt-in commands, all expansions occur before echoing. Built-in commands are echoed before command and file name substitution, since these substitutions are then done selectively. Can be assigned a two-character string. The first character is used as a history character in place of !; the second character is used in place of the " substitution mechanism. For example, set histchars=",;" will cause the history characters to be comma and sem icolon. Can be given a nu meric value to control the size of the history list. Any command that has been referenced in this many events will not be discarded. A history that is too large may run the shell out of memory. The last executed command is always saved on the history list. The home directory of the invoker, initialized from the environment. The file name expansion of - refers to this variable. If set, the shell ignores end-of-file from input devices that are terminals. This prevents a shell from accidentally being term inated by typing a CONTROL-D. The files where the shell checks for mail. This is done after each command completion and will result in a prompt, if a specified interval has elapsed. The shell says You have new mail if the file exists with an access time not greater than its modify time. If the first word of the value of mail is numeric, it specifies a different mail checking interval, in seconds, than the default, which is 10 minutes. If multiple mail files are specified, then the shell says New mail in name when there is mail in the file name. As described earlier, in the "Input/Output" section of this entry, restrictions are placed on output redirection to ensure that files are not accidentally destroyed and that >> redirections refer to existing files. If set, file name expansion is inhibited. This is most useful in shell scripts that are not dealing with file names, and when a list of file names has been obtained and further expansions are not desirable. B-51
Programming Commands XENIX Programming csh (continued) nonomatch path prompt shell status time verbose B-52 If set, it is not an error for a file name expansion to not match any existing files; rather, the primitive pattern is returned. It is still an error for the primitive pattern to be malformed; that is, echo [ still gives an error. Each word of the path variable specifies a directory in which commands are to be sought for execution. A null word specifies the current directory. If there is no path variable, then only full path names will execute. The usual search path is /bin, /usr/bin, and ., but this may vary from system to system. For the super-user, the default search path is /etc, /bin, and /usr/bin. A shell that is given neither the -c nor the -t option will normally hash the contents of the directories in . the path variable after reading .cshrc and each time the path variable is reset. If new commands are added to these directories while the shell is active, it may be necessary to give the rehash. Otherwise, the commands may not be found. The string printed before each command is read from an interactive terminal input. If an ! appears in the string, it will be replaced by the current event number unless a preceding \ is given. Default is % for the user, # for the super-user. The file in which the shell resides. This is used in forking shells to interpret files that have execute bits set but are not executable by the system. (See the section "Nonbuilt-ln Command Execution," which follows.) Initialized to the system-dependent home of the shell. The status returned by the last command. If it terminated abnormally, then 0200 is added to the status. Abnormal termination results in a core dump. Built-in commands that fail return exit status 1; all other built-in commands set status 0. Controls automatic timing of commands. If set, then any command that takes more than this many CPU seconds will cause a line of information to be printed when the command terminates. This line gives the user, system, and real times and a utilization percentage, which is the ratio of user plus system times to real time to be printed when it terminates. Set by the -v command line option, causes the words of each command to be printed after history substitution.
- Page 266 and 267: APPENDIX B PROG RAMMING COMMANDS Th
- Page 268 and 269: XENIX Programming ad b (continued)
- Page 270 and 271: XENIX Programming Programming Comma
- Page 272 and 273: XENIX Programming Programming Comma
- Page 274 and 275: XENIX Programming Programming Comma
- Page 276 and 277: XENIX Programming Programming Comma
- Page 278 and 279: XENIX Programming Programming Comma
- Page 280 and 281: XENIX Programming Programming Comma
- Page 282 and 283: XENIX Programming Programming Comma
- Page 284 and 285: XENIX Programming as (continued) Fi
- Page 286 and 287: XENIX Programming Programming Comma
- Page 288 and 289: XENIX Programming Programming Comma
- Page 290 and 291: XENIX Programming Programm ing Comm
- Page 292 and 293: XENIX Programming Programming Comma
- Page 294 and 295: XENIX Programming Programming Comma
- Page 296 and 297: XENIX Programming Programm ing Comm
- Page 298 and 299: XENIX Programming Programming Comma
- Page 300 and 301: XENIX Programming Programming Comma
- Page 302 and 303: XENIX Programming Programming Comma
- Page 304 and 305: XENIX Programming Programming Comma
- Page 306 and 307: XENIX Programming Programming Comma
- Page 308 and 309: XENIX Programming Programming Comma
- Page 310 and 311: XENIX Programming Programming Comma
- Page 312 and 313: XENIX Programming Programming Comma
- Page 314 and 315: XENIX Programm ing Programming Comm
- Page 318 and 319: XENIX Programming Programming Comma
- Page 320 and 321: XENIX Programming Programming Comma
- Page 322 and 323: XENIX Programming Programming Comma
- Page 324 and 325: XENIX Programming Programming Comma
- Page 326 and 327: XENIX Programming Programming Comma
- Page 328 and 329: XENIX Programming Programming Comma
- Page 330 and 331: XENIX Programming Programming Comma
- Page 332 and 333: XENIX Programming Programming Comma
- Page 334 and 335: XENIX Programming Programming Comma
- Page 336 and 337: XENIX Programming Programming Comma
- Page 338 and 339: XENIX Programming Programming Comma
- Page 340 and 341: XENIX Programming Programming Comma
- Page 342 and 343: XENIX Programming Programming Comma
- Page 344 and 345: XENIX Programming lex (continued) E
- Page 346 and 347: XENIX Programming Programming Comma
- Page 348 and 349: XENIX Programming Programming Comma
- Page 350 and 351: XENIX Programming Programming Comma
- Page 352 and 353: XENIX Programming Programming Comma
- Page 354 and 355: XENIX Programming Programming Comma
- Page 356 and 357: XENIX Programming Programming Comma
- Page 358 and 359: XENIX Programming Programming Comma
- Page 360 and 361: XENIX Programm ing Programming Comm
- Page 362 and 363: XENIX Programming Programming Comma
- Page 364 and 365: XENIX Programming prs (continued) :
<strong>XENIX</strong> Programming Programming Commands<br />
csh (continued)<br />
cdpath<br />
child<br />
echo<br />
his<strong>tc</strong>hars<br />
history<br />
home<br />
ignoreeof<br />
mail<br />
noclobber<br />
noglob<br />
Gives a list of alternate directories searched to find subdirectories in<br />
cd commands.<br />
The process number printed when the last command was forked with &.<br />
This variable is unset when this process terminates.<br />
Set when the -x command line option is given. Causes each command<br />
and its arguments to be echoed just before it is executed. For<br />
nonbuilt-in commands, all expansions occur before echoing. Built-in<br />
commands are echoed before command and file name substitution,<br />
since these substitutions are then done selectively.<br />
Can be assigned a two-character string. The first character is used as<br />
a history character in place of !; the second character is used in place<br />
of the " substitution mechanism. For example, set his<strong>tc</strong>hars=",;" will<br />
cause the history characters to be comma and sem icolon.<br />
Can be given a nu meric value to control the size of the history list.<br />
Any command that has been referenced in this many events will not be<br />
discarded. A history that is too large may run the shell out of memory.<br />
The last executed command is always saved on the history list.<br />
The home directory of the invoker, initialized from the environment.<br />
The file name expansion of - refers to this variable.<br />
If set, the shell ignores end-of-file from input devices that are<br />
terminals. This prevents a shell from accidentally being term inated by<br />
typing a CONTROL-D.<br />
The files where the shell checks for mail. This is done after each<br />
command completion and will result in a prompt, if a specified interval<br />
has elapsed. The shell says You have new mail if the file exists with an<br />
access time not greater than its modify time. If the first word of the<br />
value of mail is numeric, it specifies a different mail checking interval,<br />
in seconds, than the default, which is 10 minutes. If multiple mail files<br />
are specified, then the shell says New mail in name when there is mail<br />
in the file name.<br />
As described earlier, in the "Input/Output" section of this entry,<br />
restrictions are placed on output redirection to ensure that files are<br />
not accidentally destroyed and that >> redirections refer to existing<br />
files.<br />
If set, file name expansion is inhibited. This is most useful in shell<br />
scripts that are not dealing with file names, and when a list of file<br />
names has been obtained and further expansions are not desirable.<br />
B-51