s/SH NOTE$/SH NOTES/

This commit is contained in:
Michael Kerrisk 2007-05-16 02:54:18 +00:00
parent 99c7ba5573
commit 19c98696a2
40 changed files with 48 additions and 47 deletions

View File

@ -275,7 +275,7 @@ Portable programs should not rely on inheritance or non-inheritance
of file status flags and always explicitly set all required flags on of file status flags and always explicitly set all required flags on
the socket returned from the socket returned from
.BR accept (). .BR accept ().
.SH NOTE .SH NOTES
The third argument of The third argument of
.BR accept () .BR accept ()
was originally declared as an `int *' (and is that under libc4 and libc5 was originally declared as an `int *' (and is that under libc4 and libc5

View File

@ -272,7 +272,7 @@ function first appeared in 4.2BSD).
.\" and .\" and
.\" .B EISDIR .\" .B EISDIR
.\" Unix-domain error conditions. .\" Unix-domain error conditions.
.SH NOTE .SH NOTES
The third argument of The third argument of
.BR bind () .BR bind ()
is in reality an is in reality an

View File

@ -65,6 +65,6 @@ and
.I nbytes .I nbytes
arguments. arguments.
Therefore, the whole cache is always flushed. Therefore, the whole cache is always flushed.
.SH NOTE .SH NOTES
This system call is only available on MIPS based systems. This system call is only available on MIPS based systems.
It should not be used in programs intended to be portable. It should not be used in programs intended to be portable.

View File

@ -235,7 +235,7 @@ function first appeared in 4.2BSD), POSIX.1-2001.
.\" .BR ENOSR . .\" .BR ENOSR .
.\" It also .\" It also
.\" documents many additional error conditions not described here. .\" documents many additional error conditions not described here.
.SH NOTE .SH NOTES
The third argument of The third argument of
.BR connect () .BR connect ()
is in reality an is in reality an

View File

@ -92,7 +92,7 @@ is a file, not a socket.
SVr4, 4.4BSD (the SVr4, 4.4BSD (the
.BR getpeername () .BR getpeername ()
function call first appeared in 4.2BSD), POSIX.1-2001. function call first appeared in 4.2BSD), POSIX.1-2001.
.SH NOTE .SH NOTES
The third argument of The third argument of
.BR getpeername () .BR getpeername ()
is in reality an is in reality an

View File

@ -92,7 +92,7 @@ SVr4, 4.4BSD (the
function call appeared in 4.2BSD), POSIX.1-2001. function call appeared in 4.2BSD), POSIX.1-2001.
.\" SVr4 documents additional ENOMEM .\" SVr4 documents additional ENOMEM
.\" and ENOSR error codes. .\" and ENOSR error codes.
.SH NOTE .SH NOTES
The third argument of The third argument of
.BR getsockname () .BR getsockname ()
is in reality an `int *' (and this is what 4.x BSD and libc4 and libc5 have). is in reality an `int *' (and this is what 4.x BSD and libc4 and libc5 have).

View File

@ -170,7 +170,7 @@ POSIX.1-2001.
.\" not document the .\" not document the
.\" .BR SO_SNDLOWAT ", " SO_RCVLOWAT ", " SO_SNDTIMEO ", " SO_RCVTIMEO .\" .BR SO_SNDLOWAT ", " SO_RCVLOWAT ", " SO_SNDTIMEO ", " SO_RCVTIMEO
.\" options .\" options
.SH NOTE .SH NOTES
The The
.I optlen .I optlen
argument of argument of

View File

@ -212,7 +212,7 @@ The calling process has insufficient privilege to call
under Linux the under Linux the
.B CAP_SYS_TIME .B CAP_SYS_TIME
capability is required. capability is required.
.SH NOTE .SH NOTES
The prototype for The prototype for
.BR settimeofday () .BR settimeofday ()
and the defines for and the defines for

View File

@ -112,7 +112,7 @@ The specified request does not apply to the kind of object that the
descriptor descriptor
.I d .I d
references. references.
.SH NOTE .SH NOTES
In order to use this call, one needs an open file descriptor. In order to use this call, one needs an open file descriptor.
Often the Often the
.BR open (2) .BR open (2)

View File

@ -514,7 +514,7 @@ The
flag was specified, and an incompatible lease was held on the file flag was specified, and an incompatible lease was held on the file
(see (see
.BR fcntl (2)). .BR fcntl (2)).
.SH NOTE .SH NOTES
Under Linux, the O_NONBLOCK flag indicates that one wants to open Under Linux, the O_NONBLOCK flag indicates that one wants to open
but does not necessarily have the intention to read or write. but does not necessarily have the intention to read or write.
This is typically used to open devices in order to get a file descriptor This is typically used to open devices in order to get a file descriptor

View File

@ -323,7 +323,7 @@ appeared in 4.2BSD.
It is generally portable to/from It is generally portable to/from
non-BSD systems supporting clones of the BSD socket layer (including non-BSD systems supporting clones of the BSD socket layer (including
System V variants). System V variants).
.SH NOTE .SH NOTES
The manifest constants used under 4.x BSD for protocol families The manifest constants used under 4.x BSD for protocol families
are PF_UNIX, PF_INET, etc., while AF_UNIX etc. are used for address are PF_UNIX, PF_INET, etc., while AF_UNIX etc. are used for address
families. families.

View File

@ -89,7 +89,7 @@ is out-of-bounds;
is invalid. is invalid.
.SH "CONFORMING TO" .SH "CONFORMING TO"
SVr4. SVr4.
.SH NOTE .SH NOTES
On Linux with the On Linux with the
.I proc .I proc
filesystem mounted on filesystem mounted on

View File

@ -45,7 +45,7 @@ Upon error, the return value is
.BR MM_NOTOK . .BR MM_NOTOK .
Possible errors include: out of memory, attempt to remove a Possible errors include: out of memory, attempt to remove a
nonexistent or default severity class. nonexistent or default severity class.
.SH NOTE .SH NOTES
New severity classes can also be added by setting the environment variable New severity classes can also be added by setting the environment variable
.BR SEV_LEVEL . .BR SEV_LEVEL .
.SH "CONFORMING TO" .SH "CONFORMING TO"

View File

@ -67,7 +67,7 @@ had completed.
.B EINTR .B EINTR
The call was ended by signal. The call was ended by signal.
(Possibly the completion signal of one of the operations we were waiting for.) (Possibly the completion signal of one of the operations we were waiting for.)
.SH NOTE .SH NOTES
One can achieve polling by using a non-NULL One can achieve polling by using a non-NULL
.I timeout .I timeout
that specifies a zero time interval. that specifies a zero time interval.

View File

@ -65,7 +65,7 @@ The byte string functions perform operations on strings (byte arrays)
that are not necessarily null-terminated. that are not necessarily null-terminated.
See the individual man pages See the individual man pages
for descriptions of each function. for descriptions of each function.
.SH NOTE .SH NOTES
The functions The functions
.BR bcmp (), .BR bcmp (),
.BR bcopy () .BR bcopy ()

View File

@ -19,7 +19,7 @@ The
.BR cabs () .BR cabs ()
function returns the absolute value of the complex number z. The function returns the absolute value of the complex number z. The
result is a real number. result is a real number.
.SH NOTE .SH NOTES
The function is actually an alias for hypot(a,b) = sqrt(a*a+b*b). The function is actually an alias for hypot(a,b) = sqrt(a*a+b*b).
.SH "CONFORMING TO" .SH "CONFORMING TO"
C99 C99

View File

@ -20,8 +20,9 @@ The
function returns the imaginary part of the complex number z. function returns the imaginary part of the complex number z.
.LP .LP
One has z = creal(z) + I * cimag(z). One has z = creal(z) + I * cimag(z).
.SH NOTE .SH NOTES
gcc also supports __imag__. That is a GNU extension. gcc also supports __imag__.
That is a GNU extension.
.SH "CONFORMING TO" .SH "CONFORMING TO"
C99 C99
.SH "SEE ALSO" .SH "SEE ALSO"

View File

@ -138,10 +138,10 @@ specified is not supported on this system.
.B EPERM .B EPERM
.BR clock_settime () .BR clock_settime ()
does not have permission to set the clock indicated. does not have permission to set the clock indicated.
.SH NOTE .SH NOTES
Most systems require the program be linked with the librt Most systems require the program be linked with the librt
library to use these functions. library to use these functions.
.SH NOTE for SMP systems .SS Note for SMP systems
The The
.B CLOCK_PROCESS_CPUTIME_ID .B CLOCK_PROCESS_CPUTIME_ID
and and

View File

@ -22,7 +22,7 @@ Every complex infinite value is projected to a single infinite value,
namely to positive infinity on the real axis. namely to positive infinity on the real axis.
.SH "CONFORMING TO" .SH "CONFORMING TO"
C99 C99
.SH NOTE .SH NOTES
The glibc implementation is broken and does something entirely different. The glibc implementation is broken and does something entirely different.
.SH "SEE ALSO" .SH "SEE ALSO"
.BR cabs (3), .BR cabs (3),

View File

@ -20,8 +20,9 @@ The
function returns the real part of the complex number z. function returns the real part of the complex number z.
.LP .LP
One has z = creal(z) + I * cimag(z). One has z = creal(z) + I * cimag(z).
.SH NOTE .SH NOTES
The gcc supports also __real__. That is a GNU extension. The gcc supports also __real__.
That is a GNU extension.
.SH "CONFORMING TO" .SH "CONFORMING TO"
C99 C99
.SH "SEE ALSO" .SH "SEE ALSO"

View File

@ -135,8 +135,8 @@ main(void)
encrypt(txt, 1); /* decode */ encrypt(txt, 1); /* decode */
} }
.fi .fi
.SH "NOTE" .SH NOTES
In glibc2.2 these functions use the DES algorithm. In glibc 2.2 these functions use the DES algorithm.
.SH "CONFORMING TO" .SH "CONFORMING TO"
The functions The functions
.BR encrypt () .BR encrypt ()

View File

@ -63,7 +63,7 @@ The
.BR isinf () .BR isinf ()
functions return 1 if \fIx\fP is plus infinity, \-1 is \fIx\fP functions return 1 if \fIx\fP is plus infinity, \-1 is \fIx\fP
is minus infinity, and 0 otherwise. is minus infinity, and 0 otherwise.
.SH NOTE .SH NOTES
Note that these functions are obsolete. Note that these functions are obsolete.
C99 defines macros C99 defines macros
isfinite(), isinf() and isnan() (for all types) replacing them. isfinite(), isinf() and isnan() (for all types) replacing them.

View File

@ -74,7 +74,7 @@ returns 1 if
is positive infinity, and \-1 if is positive infinity, and \-1 if
.I x .I x
is negative infinity. is negative infinity.
.SH NOTE .SH NOTES
In glibc 2.01 and earlier, In glibc 2.01 and earlier,
.BR isinf () .BR isinf ()
returns a non-zero value (actually: 1) if returns a non-zero value (actually: 1) if

View File

@ -174,7 +174,7 @@ suitable for error reporting.
/etc/nsswitch.conf /etc/nsswitch.conf
.br .br
/etc/resolv.conf /etc/resolv.conf
.SH NOTE .SH NOTES
In order to assist the programmer in choosing reasonable sizes In order to assist the programmer in choosing reasonable sizes
for the supplied buffers, for the supplied buffers,
.I <netdb.h> .I <netdb.h>

View File

@ -135,7 +135,7 @@ struct in_addr {
Note that on the i80x86 the host byte order is Least Significant Byte Note that on the i80x86 the host byte order is Least Significant Byte
first (little endian), whereas the network byte order, as used on the first (little endian), whereas the network byte order, as used on the
Internet, is Most Significant Byte first (big endian). Internet, is Most Significant Byte first (big endian).
.SH NOTE .SH NOTES
When you using numbers-and-dots notation for addresses, When you using numbers-and-dots notation for addresses,
be aware that each number will be interpreted as octal be aware that each number will be interpreted as octal
if preceded by a 0 and as hexadecimal if preceded by 0x. if preceded by a 0 and as hexadecimal if preceded by 0x.

View File

@ -151,7 +151,7 @@ is a BSD extension
and is also an SVr4 extension. and is also an SVr4 extension.
.BR isblank () .BR isblank ()
conforms to POSIX.1-2001 and C99 7.4.1.3. conforms to POSIX.1-2001 and C99 7.4.1.3.
.SH NOTE .SH NOTES
The details of what characters belong into which class depend on the current The details of what characters belong into which class depend on the current
locale. locale.
For example, For example,

View File

@ -53,7 +53,7 @@ true if x or y is NaN.
.TP .TP
isunordered() isunordered()
is true if x or y is NaN and false otherwise. is true if x or y is NaN and false otherwise.
.SH NOTE .SH NOTES
Not all hardware supports these functions, and where it doesn't, they Not all hardware supports these functions, and where it doesn't, they
will be emulated by macros. will be emulated by macros.
This will give you a performance penalty. This will give you a performance penalty.

View File

@ -53,10 +53,9 @@ The function
.BR key_secretkey_is_set () .BR key_secretkey_is_set ()
can be used to determine whether a key has been can be used to determine whether a key has been
set for the effective UID of the calling process. set for the effective UID of the calling process.
.SH NOTE .SH NOTES
Note that we talk about two types of encryption here. Note that we talk about two types of encryption here.
One is One is asymmetric using a public and secret key.
asymmetric using a public and secret key.
The other is symmetric, the The other is symmetric, the
64-bit DES. 64-bit DES.
.br .br

View File

@ -86,7 +86,7 @@ The
.BR logout () .BR logout ()
function returns 1 if the entry was successfully written to the function returns 1 if the entry was successfully written to the
database, or 0 if an error occurred. database, or 0 if an error occurred.
.SH NOTE .SH NOTES
These functions are included in libutil, hence you'll need to add These functions are included in libutil, hence you'll need to add
.B \-lutil .B \-lutil
to your compiler command line. to your compiler command line.

View File

@ -65,7 +65,7 @@ is made an empty string.
The last six characters of \fItemplate\fP were not XXXXXX. The last six characters of \fItemplate\fP were not XXXXXX.
.SH "CONFORMING TO" .SH "CONFORMING TO"
4.3BSD, POSIX.1-2001. 4.3BSD, POSIX.1-2001.
.SH NOTE .SH NOTES
The prototype is in The prototype is in
.I <unistd.h> .I <unistd.h>
for libc4, libc5, glibc1; glibc2 follows the Single Unix Specification for libc4, libc5, glibc1; glibc2 follows the Single Unix Specification

View File

@ -32,7 +32,7 @@ This file must be writable to the user or
.BR mtrace () .BR mtrace ()
will do nothing. will do nothing.
If the file is not empty it will be truncated. If the file is not empty it will be truncated.
.SH NOTE .SH NOTES
The output of The output of
.BR mtrace () .BR mtrace ()
will be ASCII but not in a friendly format. will be ASCII but not in a friendly format.

View File

@ -108,7 +108,7 @@ The externals
and and
.I sys_errlist .I sys_errlist
conform to BSD. conform to BSD.
.SH NOTE .SH NOTES
The externals The externals
.I sys_nerr .I sys_nerr
and and

View File

@ -43,7 +43,7 @@ function returns the value of 10 raised to the
power \fIx\fP. power \fIx\fP.
.SH "CONFORMING TO" .SH "CONFORMING TO"
This is a GNU extension. This is a GNU extension.
.SH NOTE .SH NOTES
These functions are identical to the functions listed under These functions are identical to the functions listed under
.BR exp10 (3). .BR exp10 (3).
.SH "SEE ALSO" .SH "SEE ALSO"

View File

@ -64,7 +64,7 @@ The
function returns no value. function returns no value.
.SH "CONFORMING TO" .SH "CONFORMING TO"
SVr4, 4.3BSD, C89, C99. SVr4, 4.3BSD, C89, C99.
.SH NOTE .SH NOTES
Library routines suitable for use as the Library routines suitable for use as the
.I compar .I compar
argument include argument include

View File

@ -72,7 +72,7 @@ C89, C99, 4.3BSD, POSIX.1-2001.
.SH BUGS .SH BUGS
Infelicities in the protocol underlying NFS can cause the unexpected Infelicities in the protocol underlying NFS can cause the unexpected
disappearance of files which are still being used. disappearance of files which are still being used.
.SH NOTE .SH NOTES
Under libc4 and libc5, Under libc4 and libc5,
.BR remove () .BR remove ()
was an alias for was an alias for

View File

@ -575,7 +575,7 @@ http://invisible-island.net/vttest/
demonstrates many of these control sequences. demonstrates many of these control sequences.
The \fIxterm\fP source distribution also contains sample The \fIxterm\fP source distribution also contains sample
scripts which exercise other features. scripts which exercise other features.
.SH NOTE .SH NOTES
ESC 8 (DECRC) is not able to restore the character set changed with ESC 8 (DECRC) is not able to restore the character set changed with
ESC %. ESC %.
.SH BUGS .SH BUGS

View File

@ -91,10 +91,10 @@ advantage.
146.82.138.7 master.debian.org master 146.82.138.7 master.debian.org master
209.237.226.90 www.opensource.org 209.237.226.90 www.opensource.org
.fi .fi
.SH "NOTE" .SH NOTES
Modifications to this file normally take effect immediately, Modifications to this file normally take effect immediately,
except in cases where the file is cached by applications. except in cases where the file is cached by applications.
.SH "HISTORICAL NOTES" .SS "Historical Notes"
RFC\ 952 gave the original format for the host table, though it has RFC\ 952 gave the original format for the host table, though it has
since changed. since changed.

View File

@ -108,7 +108,7 @@ If set to a non-existing executable, the user will be unable to login
through through
.BR login (1). .BR login (1).
.RE .RE
.SH NOTE .SH NOTES
If you want to create If you want to create
user groups, their GIDs must be equal and there must be an entry in user groups, their GIDs must be equal and there must be an entry in
\fI/etc/group\fP, or no group will exist. \fI/etc/group\fP, or no group will exist.

View File

@ -36,7 +36,7 @@ services at least all over the ex-SU territory.
.PP .PP
KOI8-R is defined by RFC\ 1489 (Registration of a Cyrillic Character KOI8-R is defined by RFC\ 1489 (Registration of a Cyrillic Character
Set). Set).
.SH NOTE .SH NOTES
KOI8-R was designed for mixed Russian/English texts and covers KOI8-R was designed for mixed Russian/English texts and covers
only Russian Cyrillic characters, so if you're looking for Ukrainian, only Russian Cyrillic characters, so if you're looking for Ukrainian,
Byelorussian, etc. Byelorussian, etc.

View File

@ -403,7 +403,7 @@ or
.q Rolling .q Rolling
if the leap second time given by the other fields should be interpreted as if the leap second time given by the other fields should be interpreted as
local wall clock time. local wall clock time.
.SH NOTE .SH NOTES
For areas with more than two types of local time, For areas with more than two types of local time,
you may need to use local standard time in the you may need to use local standard time in the
.B AT .B AT