s/SH NOTE$/SH NOTES/

This commit is contained in:
Michael Kerrisk 2007-05-16 02:54:18 +00:00
parent 99c7ba5573
commit 19c98696a2
40 changed files with 48 additions and 47 deletions

View File

@ -275,7 +275,7 @@ Portable programs should not rely on inheritance or non-inheritance
of file status flags and always explicitly set all required flags on
the socket returned from
.BR accept ().
.SH NOTE
.SH NOTES
The third argument of
.BR accept ()
was originally declared as an `int *' (and is that under libc4 and libc5

View File

@ -272,7 +272,7 @@ function first appeared in 4.2BSD).
.\" and
.\" .B EISDIR
.\" Unix-domain error conditions.
.SH NOTE
.SH NOTES
The third argument of
.BR bind ()
is in reality an

View File

@ -65,6 +65,6 @@ and
.I nbytes
arguments.
Therefore, the whole cache is always flushed.
.SH NOTE
.SH NOTES
This system call is only available on MIPS based systems.
It should not be used in programs intended to be portable.

View File

@ -235,7 +235,7 @@ function first appeared in 4.2BSD), POSIX.1-2001.
.\" .BR ENOSR .
.\" It also
.\" documents many additional error conditions not described here.
.SH NOTE
.SH NOTES
The third argument of
.BR connect ()
is in reality an

View File

@ -92,7 +92,7 @@ is a file, not a socket.
SVr4, 4.4BSD (the
.BR getpeername ()
function call first appeared in 4.2BSD), POSIX.1-2001.
.SH NOTE
.SH NOTES
The third argument of
.BR getpeername ()
is in reality an

View File

@ -92,7 +92,7 @@ SVr4, 4.4BSD (the
function call appeared in 4.2BSD), POSIX.1-2001.
.\" SVr4 documents additional ENOMEM
.\" and ENOSR error codes.
.SH NOTE
.SH NOTES
The third argument of
.BR getsockname ()
is in reality an `int *' (and this is what 4.x BSD and libc4 and libc5 have).

View File

@ -170,7 +170,7 @@ POSIX.1-2001.
.\" not document the
.\" .BR SO_SNDLOWAT ", " SO_RCVLOWAT ", " SO_SNDTIMEO ", " SO_RCVTIMEO
.\" options
.SH NOTE
.SH NOTES
The
.I optlen
argument of

View File

@ -212,7 +212,7 @@ The calling process has insufficient privilege to call
under Linux the
.B CAP_SYS_TIME
capability is required.
.SH NOTE
.SH NOTES
The prototype for
.BR settimeofday ()
and the defines for

View File

@ -112,7 +112,7 @@ The specified request does not apply to the kind of object that the
descriptor
.I d
references.
.SH NOTE
.SH NOTES
In order to use this call, one needs an open file descriptor.
Often the
.BR open (2)

View File

@ -514,7 +514,7 @@ The
flag was specified, and an incompatible lease was held on the file
(see
.BR fcntl (2)).
.SH NOTE
.SH NOTES
Under Linux, the O_NONBLOCK flag indicates that one wants to open
but does not necessarily have the intention to read or write.
This is typically used to open devices in order to get a file descriptor

View File

@ -323,7 +323,7 @@ appeared in 4.2BSD.
It is generally portable to/from
non-BSD systems supporting clones of the BSD socket layer (including
System V variants).
.SH NOTE
.SH NOTES
The manifest constants used under 4.x BSD for protocol families
are PF_UNIX, PF_INET, etc., while AF_UNIX etc. are used for address
families.

View File

@ -89,7 +89,7 @@ is out-of-bounds;
is invalid.
.SH "CONFORMING TO"
SVr4.
.SH NOTE
.SH NOTES
On Linux with the
.I proc
filesystem mounted on

View File

@ -45,7 +45,7 @@ Upon error, the return value is
.BR MM_NOTOK .
Possible errors include: out of memory, attempt to remove a
nonexistent or default severity class.
.SH NOTE
.SH NOTES
New severity classes can also be added by setting the environment variable
.BR SEV_LEVEL .
.SH "CONFORMING TO"

View File

@ -67,7 +67,7 @@ had completed.
.B EINTR
The call was ended by signal.
(Possibly the completion signal of one of the operations we were waiting for.)
.SH NOTE
.SH NOTES
One can achieve polling by using a non-NULL
.I timeout
that specifies a zero time interval.

View File

@ -65,7 +65,7 @@ The byte string functions perform operations on strings (byte arrays)
that are not necessarily null-terminated.
See the individual man pages
for descriptions of each function.
.SH NOTE
.SH NOTES
The functions
.BR bcmp (),
.BR bcopy ()

View File

@ -19,7 +19,7 @@ The
.BR cabs ()
function returns the absolute value of the complex number z. The
result is a real number.
.SH NOTE
.SH NOTES
The function is actually an alias for hypot(a,b) = sqrt(a*a+b*b).
.SH "CONFORMING TO"
C99

View File

@ -20,8 +20,9 @@ The
function returns the imaginary part of the complex number z.
.LP
One has z = creal(z) + I * cimag(z).
.SH NOTE
gcc also supports __imag__. That is a GNU extension.
.SH NOTES
gcc also supports __imag__.
That is a GNU extension.
.SH "CONFORMING TO"
C99
.SH "SEE ALSO"

View File

@ -138,10 +138,10 @@ specified is not supported on this system.
.B EPERM
.BR clock_settime ()
does not have permission to set the clock indicated.
.SH NOTE
.SH NOTES
Most systems require the program be linked with the librt
library to use these functions.
.SH NOTE for SMP systems
.SS Note for SMP systems
The
.B CLOCK_PROCESS_CPUTIME_ID
and

View File

@ -22,7 +22,7 @@ Every complex infinite value is projected to a single infinite value,
namely to positive infinity on the real axis.
.SH "CONFORMING TO"
C99
.SH NOTE
.SH NOTES
The glibc implementation is broken and does something entirely different.
.SH "SEE ALSO"
.BR cabs (3),

View File

@ -20,8 +20,9 @@ The
function returns the real part of the complex number z.
.LP
One has z = creal(z) + I * cimag(z).
.SH NOTE
The gcc supports also __real__. That is a GNU extension.
.SH NOTES
The gcc supports also __real__.
That is a GNU extension.
.SH "CONFORMING TO"
C99
.SH "SEE ALSO"

View File

@ -135,8 +135,8 @@ main(void)
encrypt(txt, 1); /* decode */
}
.fi
.SH "NOTE"
In glibc2.2 these functions use the DES algorithm.
.SH NOTES
In glibc 2.2 these functions use the DES algorithm.
.SH "CONFORMING TO"
The functions
.BR encrypt ()

View File

@ -63,7 +63,7 @@ The
.BR isinf ()
functions return 1 if \fIx\fP is plus infinity, \-1 is \fIx\fP
is minus infinity, and 0 otherwise.
.SH NOTE
.SH NOTES
Note that these functions are obsolete.
C99 defines macros
isfinite(), isinf() and isnan() (for all types) replacing them.

View File

@ -74,7 +74,7 @@ returns 1 if
is positive infinity, and \-1 if
.I x
is negative infinity.
.SH NOTE
.SH NOTES
In glibc 2.01 and earlier,
.BR isinf ()
returns a non-zero value (actually: 1) if

View File

@ -174,7 +174,7 @@ suitable for error reporting.
/etc/nsswitch.conf
.br
/etc/resolv.conf
.SH NOTE
.SH NOTES
In order to assist the programmer in choosing reasonable sizes
for the supplied buffers,
.I <netdb.h>

View File

@ -135,7 +135,7 @@ struct in_addr {
Note that on the i80x86 the host byte order is Least Significant Byte
first (little endian), whereas the network byte order, as used on the
Internet, is Most Significant Byte first (big endian).
.SH NOTE
.SH NOTES
When you using numbers-and-dots notation for addresses,
be aware that each number will be interpreted as octal
if preceded by a 0 and as hexadecimal if preceded by 0x.

View File

@ -151,7 +151,7 @@ is a BSD extension
and is also an SVr4 extension.
.BR isblank ()
conforms to POSIX.1-2001 and C99 7.4.1.3.
.SH NOTE
.SH NOTES
The details of what characters belong into which class depend on the current
locale.
For example,

View File

@ -53,7 +53,7 @@ true if x or y is NaN.
.TP
isunordered()
is true if x or y is NaN and false otherwise.
.SH NOTE
.SH NOTES
Not all hardware supports these functions, and where it doesn't, they
will be emulated by macros.
This will give you a performance penalty.

View File

@ -53,10 +53,9 @@ The function
.BR key_secretkey_is_set ()
can be used to determine whether a key has been
set for the effective UID of the calling process.
.SH NOTE
.SH NOTES
Note that we talk about two types of encryption here.
One is
asymmetric using a public and secret key.
One is asymmetric using a public and secret key.
The other is symmetric, the
64-bit DES.
.br

View File

@ -86,7 +86,7 @@ The
.BR logout ()
function returns 1 if the entry was successfully written to the
database, or 0 if an error occurred.
.SH NOTE
.SH NOTES
These functions are included in libutil, hence you'll need to add
.B \-lutil
to your compiler command line.

View File

@ -65,7 +65,7 @@ is made an empty string.
The last six characters of \fItemplate\fP were not XXXXXX.
.SH "CONFORMING TO"
4.3BSD, POSIX.1-2001.
.SH NOTE
.SH NOTES
The prototype is in
.I <unistd.h>
for libc4, libc5, glibc1; glibc2 follows the Single Unix Specification

View File

@ -32,7 +32,7 @@ This file must be writable to the user or
.BR mtrace ()
will do nothing.
If the file is not empty it will be truncated.
.SH NOTE
.SH NOTES
The output of
.BR mtrace ()
will be ASCII but not in a friendly format.

View File

@ -108,7 +108,7 @@ The externals
and
.I sys_errlist
conform to BSD.
.SH NOTE
.SH NOTES
The externals
.I sys_nerr
and

View File

@ -43,7 +43,7 @@ function returns the value of 10 raised to the
power \fIx\fP.
.SH "CONFORMING TO"
This is a GNU extension.
.SH NOTE
.SH NOTES
These functions are identical to the functions listed under
.BR exp10 (3).
.SH "SEE ALSO"

View File

@ -64,7 +64,7 @@ The
function returns no value.
.SH "CONFORMING TO"
SVr4, 4.3BSD, C89, C99.
.SH NOTE
.SH NOTES
Library routines suitable for use as the
.I compar
argument include

View File

@ -72,7 +72,7 @@ C89, C99, 4.3BSD, POSIX.1-2001.
.SH BUGS
Infelicities in the protocol underlying NFS can cause the unexpected
disappearance of files which are still being used.
.SH NOTE
.SH NOTES
Under libc4 and libc5,
.BR remove ()
was an alias for

View File

@ -575,7 +575,7 @@ http://invisible-island.net/vttest/
demonstrates many of these control sequences.
The \fIxterm\fP source distribution also contains sample
scripts which exercise other features.
.SH NOTE
.SH NOTES
ESC 8 (DECRC) is not able to restore the character set changed with
ESC %.
.SH BUGS

View File

@ -91,10 +91,10 @@ advantage.
146.82.138.7 master.debian.org master
209.237.226.90 www.opensource.org
.fi
.SH "NOTE"
.SH NOTES
Modifications to this file normally take effect immediately,
except in cases where the file is cached by applications.
.SH "HISTORICAL NOTES"
.SS "Historical Notes"
RFC\ 952 gave the original format for the host table, though it has
since changed.

View File

@ -108,7 +108,7 @@ If set to a non-existing executable, the user will be unable to login
through
.BR login (1).
.RE
.SH NOTE
.SH NOTES
If you want to create
user groups, their GIDs must be equal and there must be an entry in
\fI/etc/group\fP, or no group will exist.

View File

@ -36,7 +36,7 @@ services at least all over the ex-SU territory.
.PP
KOI8-R is defined by RFC\ 1489 (Registration of a Cyrillic Character
Set).
.SH NOTE
.SH NOTES
KOI8-R was designed for mixed Russian/English texts and covers
only Russian Cyrillic characters, so if you're looking for Ukrainian,
Byelorussian, etc.

View File

@ -403,7 +403,7 @@ or
.q Rolling
if the leap second time given by the other fields should be interpreted as
local wall clock time.
.SH NOTE
.SH NOTES
For areas with more than two types of local time,
you may need to use local standard time in the
.B AT