Hyphenation/dash fixes

This commit is contained in:
Michael Kerrisk 2005-07-06 07:41:37 +00:00
parent e9496f74fa
commit 4d9b698450
79 changed files with 192 additions and 176 deletions

View File

@ -131,7 +131,7 @@ Do not follow any symbolic links, neither those that occur
in the parameter list nor those encountered during the recursive copy.
Just copy them as symbolic link.
.LP
There is no default - one should specify the desired behaviour.
There is no default: one should specify the desired behaviour.
.SH "GNU DETAILS"
.PP
Generally, files are written just as they are read. For exceptions,
@ -254,7 +254,7 @@ Remove each existing destination file before copying.
With file-utils 4.0 this option was implied by \-f.
.TP
.BI "\-\-sparse=" "WHEN"
A `sparse file' contains `holes' - sequences of zero bytes that
A `sparse file' contains `holes' \(em sequences of zero bytes that
do not occupy any physical disk blocks; the `read' system call
reads these as zeroes. This can both save considerable disk space
and increase speed, since many binary files contain lots of
@ -300,7 +300,7 @@ Backup suffix, see below.
.BR "\-\-target\-directory=\fIDIR\fP" " (since file-utils 4.1)"
Specify the destination directory. Meant for use with
.BR xargs (1),
as in "ls | xargs cp --target-directory=../d".
as in "ls | xargs cp \-\-target-directory=../d".
.TP
.B "\-u, \-\-update"
Do not copy a nondirectory that has an existing destination with

View File

@ -94,7 +94,7 @@ Set the permissions for the installed file or directory to
.IR mode ,
which can be either an octal number, or a symbolic mode as in
.BR chmod ,
with 0 as the point of departure. The default mode is 0755 - read,
with 0 as the point of departure. The default mode is 0755 \(em read,
write, and execute for the owner, and read and execute for group and other.
.TP
.BI "\-o " "owner" ", \-\-owner=" "owner"

View File

@ -109,7 +109,7 @@ maja 0501-1136285
and here typing Control-D ended the session.
The
.B "% "
here was the command prompt - it is the shell's way of indicating
here was the command prompt \(em it is the shell's way of indicating
that it is ready for the next command. The prompt can be customized
in lots of ways, and one might include stuff like user name,
machine name, current directory, time, etc.
@ -124,7 +124,7 @@ We see that there are commands
.LP
The command
.I ls
lists the contents of the current directory - it tells you what
lists the contents of the current directory \(em it tells you what
files you have. With a \-l option it gives a long listing,
that includes the owner and size and date of the file, and the
permissions people have for reading and/or changing the file.
@ -194,9 +194,9 @@ removes a directory if it is empty, and complains otherwise.
The command
.I find
(with a rather baroque syntax) will find files with given name
or other properties. For example, "find . -name tel" would find
or other properties. For example, "find . \-name tel" would find
the file "tel" starting in the present directory (which is called ".").
And "find / -name tel" would do the same, but starting at the root
And "find / \-name tel" would do the same, but starting at the root
of the tree. Large searches on a multi-GB disk will be time-consuming,
and it may be better to use
.BR locate (1).
@ -223,7 +223,7 @@ processes have.
The command
.I kill
allows you to get rid of them. Without option this is a friendly
request: please go away. And "kill -9" followed by the number
request: please go away. And "kill \-9" followed by the number
of the process is an immediate kill.
Foreground processes can often be killed by typing Control-C.
.SS "Getting information"

View File

@ -129,7 +129,7 @@ there are two ways to treat the user's request.
.B ln
can treat the destination just as it would a normal directory and
create the link in it. On the other hand, the destination can be
viewed as a non-directory - as the symlink itself. In that case,
viewed as a non-directory \(em as the symlink itself. In that case,
.B ln
must delete or backup that symlink before creating the new link.
The default is to treat a destination that is a symlink to a directory

View File

@ -260,7 +260,7 @@ This option is provided for compatibility with other versions of
Append a character to each file name indicating the file type. This is like
.B \-F
except that executables aren't marked.
(In fact fileutils-4.0 treats the --file-type option like --classify.)
(In fact fileutils-4.0 treats the \-\-file-type option like \-\-classify.)
.TP
.B "\-q, \-\-hide\-control\-chars"
Print question marks instead of nongraphic characters in file names. This
@ -385,7 +385,7 @@ Do not list files whose names match the shell pattern
in the shell, an initial `.' in a filename does not match a wildcard at
the start of
.I pattern.
For simple-minded root-kits: add LS_OPTIONS="$LS_OPTIONS -I mystuff"
For simple-minded root-kits: add LS_OPTIONS="$LS_OPTIONS \-I mystuff"
in /etc/profile or so, to hide your directories.
.TP
.B "\-L, \-\-dereference"

View File

@ -68,7 +68,7 @@ POSIX 1003.2
.SH "EXAMPLE OF USE"
The command `\fIrmdir foo\fP' will remove the directory \fIfoo\fP
if it is empty. To remove a nonempty directory, together with everything
below, use `\fIrm -r foo\fP'.
below, use `\fIrm \-r foo\fP'.
.SH NOTES
This page describes
.B rmdir

View File

@ -243,13 +243,13 @@ Mail suggestions and bug reports for GNU
.B time
to
.br
.I bug-utils@prep.ai.mit.edu
.I bug\-utils@prep.ai.mit.edu
.br
Please include the version of
.B time ,
which you can get by running
.br
.I time --version
.I time \-\-version
.br
and the operating system
and C compiler you used.

View File

@ -45,7 +45,7 @@ and if
.I op
is O_DSYNC, this call is the asynchronous analog of
.BR fdatasync (2).
Note that this is a request only - this call does not wait
Note that this is a request only \- this call does not wait
for I/O completion.
.LP
Apart from

View File

@ -49,7 +49,7 @@ the value whose sine is \fIx\fP. If \fIx\fP falls outside the range
\-1 to 1, \fBasin()\fP fails and \fIerrno\fP is set.
.SH "RETURN VALUE"
The \fBasin()\fP function returns the arc sine in radians and the
value is mathematically defined to be between -PI/2 and PI/2
value is mathematically defined to be between \-PI/2 and PI/2
(inclusive).
.SH ERRORS
.TP

View File

@ -48,7 +48,7 @@ The \fBatan()\fP function calculates the arc tangent of \fIx\fP; that is
the value whose tangent is \fIx\fP.
.SH "RETURN VALUE"
The \fBatan()\fP function returns the arc tangent in radians and the
value is mathematically defined to be between -PI/2 and PI/2
value is mathematically defined to be between \-PI/2 and PI/2
(inclusive).
.SH "CONFORMING TO"
SVID 3, POSIX, BSD 4.3, ISO 9899.

View File

@ -50,7 +50,7 @@ arc tangent of \fIy\fP / \fIx\fP, except that the signs of both
arguments are used to determine the quadrant of the result.
.SH "RETURN VALUE"
The \fBatan2()\fP function returns the result in radians, which
is between -PI and PI (inclusive).
is between \-PI and PI (inclusive).
.SH "CONFORMING TO"
SVID 3, POSIX, BSD 4.3, ISO 9899.
The float and long double variants are C99 requirements.

View File

@ -19,7 +19,7 @@ The cacos() function calculates the complex acos().
If y = cacos(z), then z = ccos(y).
The real part of y is chosen in the interval [0,pi].
.LP
One has cacos(z) = -i clog(z+csqrt(z*z-1)).
One has cacos(z) = \-i clog(z+csqrt(z*z-1)).
.SH "CONFORMING TO"
C99
.SH "SEE ALSO"

View File

@ -20,7 +20,7 @@ If y = casin(z), then z = csin(y).
The real part of y is chosen in the interval [-pi/2,pi/2].
.LP
One has
casin(z) = -i clog(iz+csqrt(1-z*z)).
casin(z) = \-i clog(iz+csqrt(1-z*z)).
.SH "CONFORMING TO"
C99
.SH "SEE ALSO"

View File

@ -203,7 +203,7 @@ In Linux,
.BR CMSG_DATA ,
and
.B CMSG_ALIGN
are constant expressions (assuming their argument is constant) -
are constant expressions (assuming their argument is constant);
this could be used to declare the size of global
variables. This may be not portable, however.
.SH "CONFORMS TO"

View File

@ -140,7 +140,7 @@ from the set [\fBa\fP\(en\fBzA\fP\(en\fBZ0\fP\(en\fB9./\fP].
The entire key is significant here (instead of only the first
8 bytes).
.LP
Programs using this function must be linked with -lcrypt.
Programs using this function must be linked with \-lcrypt.
.SH "CONFORMING TO"
SVID, X/OPEN, BSD 4.3, POSIX 1003.1-2001
.SH "SEE ALSO"

View File

@ -19,7 +19,7 @@ Calculate the square root of a given complex number,
with nonnegative real part, and
with a branch cut along the negative real axis.
(That means that csqrt(-1+eps*I) will be close to I while
csqrt(-1-eps*I) will be close to -I, if eps is a small positive
csqrt(-1-eps*I) will be close to \-I, if eps is a small positive
real number.)
.SH "CONFORMING TO"
C99

View File

@ -54,7 +54,7 @@ is only available if
or
.B _SVID_SOURCE
is defined (either explicitly, or implicitly, by not defining
_POSIX_SOURCE or compiling with the -ansi flag).
_POSIX_SOURCE or compiling with the \-ansi flag).
.SH "CONFORMING TO"
This is a BSD extension, present in 4.3BSD-Reno, not in 4.2BSD.
Present in libc5 (since 5.1.2) and in glibc2.

View File

@ -343,14 +343,14 @@ If this program were in a file named "foo.c", you would build the program
with the following command:
.RS
.LP
gcc -rdynamic -o foo foo.c -ldl
gcc \-rdynamic \-o foo foo.c \-ldl
.RE
.PP
Libraries exporting _init() and _fini() will want to be compiled as
follows, using bar.c as the example name:
.RS
.LP
gcc -shared -nostartfiles -o bar bar.c
gcc \-shared \-nostartfiles \-o bar bar.c
.RE
.SH NOTES
The symbols RTLD_DEFAULT and RTLD_NEXT are defined by

View File

@ -46,7 +46,7 @@ encrypt, setkey, encrypt_r, setkey_r \- encrypt 64-bit messages
.BI "void encrypt_r (char *" block ", int " edflag ", struct crypt_data *" data );
.sp
Each of these requires linking with
.BR -lcrypt .
.BR \-lcrypt .
.SH DESCRIPTION
These functions encrypt and decrypt 64-bit messages. The
.B setkey()

View File

@ -56,7 +56,7 @@ as
erf(x) = 2/sqrt(pi)* integral from 0 to x of exp(-t*t) dt
.PP
The \fBerfc()\fP function returns the complementary error function of
\fIx\fP, that is 1.0 - erf(x).
\fIx\fP, that is 1.0 \- erf(x).
.SH "CONFORMING TO"
SVID 3, BSD 4.3, C99.
The float and long double variants are requirements of C99.

View File

@ -292,7 +292,8 @@ Invalid seek
No such process
.TP
.B ESTALE
Reserved
Stale file handle
.\" Can occur for NFS and for other file systems
.\" ETIME is part of XSR option
.TP
.B ETIME

View File

@ -43,7 +43,7 @@ exp2, exp2f, exp2l \- base-2 exponential function
.BI "long double exp2l(long double " x );
.fi
.sp
Compile with -std=c99; link with \-lm.
Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
The \fBexp2()\fP function returns the value of 2
raised to the power of \fIx\fP.

View File

@ -13,7 +13,7 @@ fdim, fdimf, fdiml \- positive difference
.br
.BI "long double fdiml(long double " x ", long double " y );
.sp
Compile with -std=c99; link with \-lm.
Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
These functions return max(\fIx\fP-\fIy\fP,0).
If

View File

@ -27,7 +27,7 @@
.SH NAME
feclearexcept, fegetexceptflag, feraiseexcept, fesetexceptflag,
fetestexcept, fegetenv, fegetround, feholdexcept, fesetround,
fesetenv, feupdateenv - C99 floating point rounding and exception handling
fesetenv, feupdateenv \- C99 floating point rounding and exception handling
.SH SYNOPSIS
.nf
.B #include <fenv.h>
@ -75,7 +75,7 @@ is not equal to the infinite precision result.
It may occur whenever Overflow or Underflow occurs.
.LP
The Invalid exception occurs when there is no well-defined result
for an operation, as for 0/0 or infinity - infinity or sqrt(-1).
for an operation, as for 0/0 or infinity \- infinity or sqrt(-1).
.SS "Exception handling"
Exceptions are represented in two ways: as a single bit
(exception present/absent), and these bits correspond in some

View File

@ -17,7 +17,7 @@ fma, fmaf, fmal \- floating-point multiply and add
.BI "long double fmal(long double " x ", long double " y ", long double " z );
.fi
.sp
Compile with -std=c99; link with \-lm.
Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
The
.B fma()

View File

@ -13,7 +13,7 @@ fmax, fmaxf, fmaxl \- find maximum value
.br
.BI "long double fmaxl(long double " x ", long double " y );
.sp
Compile with -std=c99; link with \-lm.
Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
Find the larger value of x and y.
.SH "CONFORMING TO"

View File

@ -13,7 +13,7 @@ fmin, fminf, fminl \- find minimum value
.br
.BI "long double fminl(long double " x ", long double " y );
.sp
Compile with -std=c99; link with \-lm.
Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
Find the lesser value of x and y.
.SH "CONFORMING TO"

View File

@ -21,7 +21,7 @@ fpclassify, isfinite, isnormal, isnan \- floating-point classification macros
.BI "int isinf(" x );
.fi
.sp
Compile with -std=c99; link with \-lm.
Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
Floating point numbers can have special values, such as
infinite or NaN. With the macro

View File

@ -71,7 +71,7 @@ The prototype for
is only available if
.B _BSD_SOURCE
is defined (either explicitly, or implicitly, by not defining
_POSIX_SOURCE or compiling with the -ansi flag).
_POSIX_SOURCE or compiling with the \-ansi flag).
.SH "SEE ALSO"
.BR getgroups (2),
.BR setgroups (2)

View File

@ -24,7 +24,7 @@ to test a relation
.BI "int isunordered(x,y);
.fi
.sp
Compile with -std=c99; link with \-lm.
Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
The normal relation operations (like less) will fail if one of the
operands is NaN. This will cause an exception. To avoid this, C99 defines

View File

@ -22,7 +22,7 @@ lgamma, lgammaf, lgammal, lgamma_r, lgammaf_r, lgammal_r \- log gamma function
.BI "long double lgammal_r(long double " x ", int *" signp );
.fi
.sp
Compile with -std=c99; link with \-lm.
Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
For the definition of the Gamma function, see
.BR tgamma (3).

View File

@ -36,7 +36,7 @@ log1p \- logarithm of 1 plus argument
.BI "long double log1pl(long double " x );
.sp
.fi
Compile with -std=c99; link with \-lm.
Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
.BI log1p( x )
returns a value equivalent to `log (1 + \fIx\fP)'. It is computed in a way

View File

@ -43,7 +43,7 @@ log2, log2f, log2l \- base-2 logarithmic function
.BI "long double log2l(long double " x );
.fi
.sp
Compile with -std=c99; link with \-lm.
Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
The \fBlog2()\fP function returns the base 2 logarithm of \fIx\fP.
.SH ERRORS

View File

@ -40,7 +40,7 @@ lrint, lrintf, lrintl, llrint, llrintf, llrintl \- round to nearest integer
.BI "long long int llrintl(long double " x );
.fi
.sp
Compile with -std=c99; link with \-lm.
Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
These functions round their argument to the nearest integer value,
using the current rounding direction.

View File

@ -40,7 +40,7 @@ lround, lroundf, lroundl, llround, llroundf, llroundl \- round to nearest intege
.BI "long long int llroundl(long double " x );
.fi
.sp
Compile with -std=c99; link with \-lm.
Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
These functions round their argument to the nearest integer value,
rounding away from zero, regardless of the current rounding direction.

View File

@ -15,7 +15,7 @@ nan, nanf, nanl \- return 'Not a Number'
.br
.BI "long double nanl(const char *" tagp );
.sp
Compile with -std=c99; link with \-lm.
Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
These functions return a representation (determined by
.IR tagp )

View File

@ -45,7 +45,7 @@ openpty, login_tty, forkpty \- tty utility functions
.sp
.BI "pid_t forkpty(int *" amaster ", char *" name ", struct termios *" termp ", struct winsize *" winp );
.sp
Link with -lutil.
Link with \-lutil.
.SH DESCRIPTION
The
.B openpty()

View File

@ -99,7 +99,7 @@ ANSI - C, POSIX.1
.SH BUGS
It is not advisable to mix calls to output functions from the
.B stdio
library with low - level calls to
library with low-level calls to
.B write()
for the file descriptor associated with the same output stream; the results
will be undefined and very probably not what you want.

View File

@ -34,7 +34,7 @@ round, roundf, roundl \- round to nearest integer, away from zero
.BI "long double roundl(long double " x );
.fi
.sp
Compile with -std=c99; link with \-lm.
Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
These functions round \fIx\fP to the nearest integer, but
round halfway cases away from zero (regardless of the current rounding

View File

@ -45,7 +45,7 @@ multiply floating-point number by integral power of radix
.br
.BI "long double scalblnl(long double " x ", long int " exp );
.sp
Link with -lm.
Link with \-lm.
.SH DESCRIPTION
These functions multiply their first argument
.I x

View File

@ -334,12 +334,24 @@ the return value.
.SH "RETURN VALUE"
These functions return the number of input items assigned, which can be
fewer than provided for, or even zero, in the event of a matching failure.
Zero indicates that, while there was input available, no conversions were
assigned; typically this is due to an invalid input character, such as an
alphabetic character for a `%d' conversion. The value
A return of zero indicates that, while there was input available,
no conversions were assigned;
typically this is due to an invalid input character, such as an
alphabetic character for a `%d' conversion.
The value
.B EOF
is returned if an input failure occurs before any conversion such as an
end-of-file occurs. If an error or end-of-file occurs after conversion has
is returned if the end of input is reached before the first
successful conversion or matching failure.
.B EOF
is also returned if a read error occurs,
in which case the error indicator for the stream (see
.BR ferror (3))
is set, and
.I errno
is set indicate the error.
If an error or end-of-file occurs after conversion has
begun, the number of conversions which were successfully completed is
returned.
.SH "SEE ALSO"

View File

@ -9,7 +9,7 @@ signbit \- test sign of a real floating point number
.sp
.BI "int signbit (" X ");"
.sp
Compile with -std=c99; link with \-lm.
Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
`signbit' is a generic macro which can work on all real floating-point
types. It returns a non-zero value if the value of X has its sign

View File

@ -15,7 +15,7 @@ tgamma, tgammaf, tgammal \- true gamma function
.br
.BI "long double tgammal(long double " x );
.sp
Compile with -std=c99; link with \-lm.
Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
The Gamma function is defined by
.sp

View File

@ -60,7 +60,7 @@ on the current locale. For example, the default
.B """C"""
locale does not know about umlauts, so no conversion is done for them.
.PP
In some non - English locales, there are lowercase letters with no
In some non-English locales, there are lowercase letters with no
corresponding uppercase equivalent; the German sharp s is one
example.
.SH "SEE ALSO"

View File

@ -34,7 +34,7 @@ trunc, truncf, truncl \- round to integer, towards zero
.BI "long double truncl(long double " x );
.fi
.sp
Compile with -std=c99; link with \-lm.
Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
These functions round \fIx\fP to the nearest integer
not larger in absolute value.

View File

@ -103,7 +103,7 @@ or
.IR "screen positions" .
The array must contain a terminating null byte, unless a precision is given
and it is so small that the number of converted wide characters reaches it
before the end of the array is reached. -- If an
before the end of the array is reached. If an
.B l
modifier is present: The
.IR "" `` "const wchar_t *" ''

View File

@ -39,7 +39,7 @@ on the console;
(b) ask
.BR openvt (1)
to start a process on the console;
(c) start X - it will find the first unused console,
(c) start X \(em it will find the first unused console,
and display its output there.
(There is also the ancient
.BR doshell (8).)

View File

@ -339,8 +339,8 @@ ESC [ 14 ; \fIn\fP ] Set the VESA powerdown interval in minutes.
.SH "CHARACTER SETS"
The kernel knows about 4 translations of bytes into console-screen symbols.
The four tables are: a) Latin1 -> PC, b) VT100 graphics -> PC, c) PC -> PC,
d) user-defined.
The four tables are: a) Latin1 \-> PC,
b) VT100 graphics \-> PC, c) PC \-> PC, d) user-defined.
There are two character sets, called G0 and G1, and one of them
is the current character set. (Initially G0.)

View File

@ -46,7 +46,7 @@ signal.
FIFO special files can be created by
.BR mkfifo (3),
and are specially indicated in
.IR "ls -l" .
.IR "ls \-l" .
.SH "SEE ALSO"
.BR mkfifo (1),
.BR open (2),

View File

@ -66,25 +66,25 @@ refers to the third DOS `primary' partition on the second one.
They are typically created by:
.RS
.sp
mknod -m 660 /dev/hda b 3 0
mknod \-m 660 /dev/hda b 3 0
.br
mknod -m 660 /dev/hda1 b 3 1
mknod \-m 660 /dev/hda1 b 3 1
.br
mknod -m 660 /dev/hda2 b 3 2
mknod \-m 660 /dev/hda2 b 3 2
.br
\&...
.br
mknod -m 660 /dev/hda8 b 3 8
mknod \-m 660 /dev/hda8 b 3 8
.br
mknod -m 660 /dev/hdb b 3 64
mknod \-m 660 /dev/hdb b 3 64
.br
mknod -m 660 /dev/hdb1 b 3 65
mknod \-m 660 /dev/hdb1 b 3 65
.br
mknod -m 660 /dev/hdb2 b 3 66
mknod \-m 660 /dev/hdb2 b 3 66
.br
\&...
.br
mknod -m 660 /dev/hdb8 b 3 72
mknod \-m 660 /dev/hdb8 b 3 72
.br
chown root:disk /dev/hd*
.RE

View File

@ -39,7 +39,7 @@ when read-only or write-only bits are present.
It is typically created by:
.RS
.sp
mknod -m 660 /dev/mem c 1 1
mknod \-m 660 /dev/mem c 1 1
.br
chown root:kmem /dev/mem
.sp
@ -51,7 +51,7 @@ rather than physical memory is accessed.
It is typically created by:
.RS
.sp
mknod -m 640 /dev/kmem c 1 2
mknod \-m 640 /dev/kmem c 1 2
.br
chown root:kmem /dev/kmem
.sp
@ -62,7 +62,7 @@ chown root:kmem /dev/kmem
It is typically created by:
.RS
.sp
mknod -m 660 /dev/port c 1 4
mknod \-m 660 /dev/port c 1 4
.br
chown root:mem /dev/port
.sp

View File

@ -33,9 +33,9 @@ reads from \fBzero\fP always return \e0 characters.
\fBnull\fP and \fBzero\fP are typically created by:
.RS
.sp
mknod -m 666 /dev/null c 1 3
mknod \-m 666 /dev/null c 1 3
.br
mknod -m 666 /dev/zero c 1 5
mknod \-m 666 /dev/zero c 1 5
.br
chown root:root /dev/null /dev/zero
.sp

View File

@ -30,7 +30,7 @@ The \fBRam\fP device is a block device to access the ram disk in raw mode.
It is typically created by:
.RS
.sp
mknod -m 660 /dev/ram b 1 1
mknod \-m 660 /dev/ram b 1 1
.br
chown root:disk /dev/ram
.sp

View File

@ -120,7 +120,7 @@ are also supported. If the
.BR ioctl (2)
parameter is required, and it is NULL, then
.IR ioctl ()
will return -EINVAL.
will return \-EINVAL.
.SH FILES
/dev/sd[a-h]: the whole device
.br

View File

@ -369,9 +369,9 @@ reflects the fact, that interrupt moderation is always enabled, regardless how m
.br
.IR Dynamic
Interrupt moderation might be applied on the adapter card, depending on the load of the system. If the driver detects that the system load is too high, the driver tries to shield the system against too much network load by enabling interrupt moderation. If - at a later time - the CPU utilization decreases again (or if the network load is negligible) the interrupt moderation will automatically be disabled.
Interrupt moderation might be applied on the adapter card, depending on the load of the system. If the driver detects that the system load is too high, the driver tries to shield the system against too much network load by enabling interrupt moderation. If \(em at a later time \(em the CPU utilization decreases again (or if the network load is negligible) the interrupt moderation will automatically be disabled.
Interrupt moderation should be used when the driver has to handle one or more interfaces with a high network load, which - as a consequence - leads also to a high CPU utilization. When moderation is applied in such high network load situations, CPU load might be reduced by 20-30% on slow computers.
Interrupt moderation should be used when the driver has to handle one or more interfaces with a high network load, which \(em as a consequence \(em leads also to a high CPU utilization. When moderation is applied in such high network load situations, CPU load might be reduced by 20-30% on slow computers.
Note that the drawback of using interrupt moderation is an increase of the round-trip-time (RTT), due to the queuing and serving of interrupts at dedicated
moderation times.

View File

@ -20,7 +20,7 @@
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
.TH ST 4 2005-03-13 "Linux 2.0 - 2.6" "Linux Programmer's Manual"
.TH ST 4 2005-03-13 "Linux 2.0 \- 2.6" "Linux Programmer's Manual"
.SH NAME
st \- SCSI tape device
.SH SYNOPSIS

View File

@ -30,13 +30,13 @@ ttyS \- serial terminal lines
They are typically created by:
.RS
.sp
mknod -m 660 /dev/ttyS0 c 4 64 # base address 0x3f8
mknod \-m 660 /dev/ttyS0 c 4 64 # base address 0x3f8
.br
mknod -m 660 /dev/ttyS1 c 4 65 # base address 0x2f8
mknod \-m 660 /dev/ttyS1 c 4 65 # base address 0x2f8
.br
mknod -m 660 /dev/ttyS2 c 4 66 # base address 0x3e8
mknod \-m 660 /dev/ttyS2 c 4 66 # base address 0x3e8
.br
mknod -m 660 /dev/ttyS3 c 4 67 # base address 0x2e8
mknod \-m 660 /dev/ttyS3 c 4 67 # base address 0x2e8
.br
chown root:tty /dev/ttyS[0-3]
.sp

View File

@ -61,8 +61,8 @@ requests are supported.
You may do a screendump on vt3 by switching to vt1 and typing
\fIcat /dev/vcs3 >foo\fP. Note that the output does not contain
newline characters, so some processing may be required, like
in \fIfold -w 81 /dev/vcs3 | lpr\fP or (horrors)
\fIsetterm -dump 3 -file /proc/self/fd/1\fP.
in \fIfold \-w 81 /dev/vcs3 | lpr\fP or (horrors)
\fIsetterm \-dump 3 \-file /proc/self/fd/1\fP.
.LP
The \fI/dev/vcsa0\fP device is used for Braille support.

View File

@ -140,7 +140,7 @@ Bruce Janson \- bruce@cs.usyd.edu.au
.br
Jean Tourrilhes \- jt@hplb.hpl.hp.com
.br
(+ others - see source code for details)
(and others; see source code for details)
.\"
.\" SEE ALSO part
.\"

View File

@ -8,7 +8,7 @@ complex \- basics of complex mathematics
.B #include <complex.h>
.SH DESCRIPTION
Complex numbers are numbers of the form z = a+b*i, where a and b are
real numbers and i = sqrt(-1), so that i*i = -1.
real numbers and i = sqrt(\-1), so that i*i = \-1.
.br
There are other ways to represent that number. The pair (a,b) of real
numbers may be viewed as a point in the plane, given by X- and
@ -21,15 +21,15 @@ The basic operations are defined on z = a+b*i and w = c+d*i as:
.TP
.B addition: z+w = (a+c) + (b+d)*i
.TP
.B multiplication: z*w = (a*c - b*d) + (a*d + b*c)*i
.B multiplication: z*w = (a*c \- b*d) + (a*d + b*c)*i
.TP
.B division: z/w = ((a*c + b*d)/(c*c + d*d)) + ((b*c - a*d)/(c*c + d*d))*i
.B division: z/w = ((a*c + b*d)/(c*c + d*d)) + ((b*c \- a*d)/(c*c + d*d))*i
.PP
Nearly all math function have a complex counterpart but there are
some complex only functions.
.SH EXAMPLE
Your C-compiler can work with complex numbers if it supports the C99 standard.
Link with -lm. The imaginary unit is represented by I.
Link with \-lm. The imaginary unit is represented by I.
.sp
.nf
/* check that exp(i*pi) == -1 */

View File

@ -278,7 +278,7 @@ can, however, be specified, which would have the same effect.
.SH "ESCAPE SEQUENCES"
To specify control- or blank characters in the color sequences or
filename extensions, either C-style \e-escaped notation or
.BR stty -style
.BR stty \-style
^-notation can be used. The C-style notation
includes the following characters:
.sp

View File

@ -11,7 +11,7 @@ supplying a password.
.PP
The file uses the following format:
.TP
\fI[ + | - ]\fP \fI[hostname]\fP \fI[username]\fP
\fI[ + | \- ]\fP \fI[hostname]\fP \fI[username]\fP
.PP
The \fIhostname\fP is the name of a host which is logically equivalent
to the local host. Users logged into that host are allowed to access
@ -19,7 +19,7 @@ like-named user accounts on the local host without supplying a password.
The \fIhostname\fP may be (optionally) preceded by a plus (+) sign.
If the plus sign is used alone it allows any host to access your system.
You can explicitly deny access to a host by preceding the \fIhostname\fP
by a minus (-) sign. Users from that host must always supply a password.
by a minus (\-) sign. Users from that host must always supply a password.
For security reasons you should always use the FQDN of the hostname and
not the short hostname.
.PP
@ -28,7 +28,7 @@ accounts (except root) without supplying a password. That means the
user is NOT restricted to like-named accounts. The \fIusername\fP may
be (optionally) preceded by a plus (+) sign. You can also explicitly
deny access to a specific user by preceding the \fIusername\fP with
a minus (-) sign. This says that the user is not trusted no matter
a minus (\-) sign. This says that the user is not trusted no matter
what other entries for that host exist.
.PP
Netgroups can be specified by preceding the netgroup by an @ sign.

View File

@ -19,7 +19,7 @@
.\"
.TH NSCD.CONF 5 1999-10 "GNU C Library"
.SH NAME
/etc/nscd.conf - name service cache daemon configuration file
/etc/nscd.conf \- name service cache daemon configuration file
.SH DESCRIPTION
The file
.B /etc/nscd.conf

View File

@ -199,13 +199,13 @@ The service is temporarily unavailable. This could mean a file is
locked or a server currently cannot accept more connections. The
default action is `continue'.
.LP
.SS Interaction with +/- syntax (compat mode)
.SS Interaction with +/\- syntax (compat mode)
Linux libc5 without NYS does not have the name service switch but does
allow the user some policy control. In
.B /etc/passwd
you could have entries of the form +user or +@netgroup
(include the specified user from the NIS passwd map),
-user or -@netgroup (exclude the specified user),
\-user or \-@netgroup (exclude the specified user),
and + (include every user, except the excluded ones, from the NIS
passwd map). Since most people only put a + at the end of
.B /etc/passwd

View File

@ -80,7 +80,7 @@ cd /proc/20/cwd; /bin/pwd
.ft
Note that the pwd command is often a shell builtin, and might
not work properly. In bash, you may use pwd -P.
not work properly. In bash, you may use pwd \-P.
.TP
.I /proc/[number]/environ
This file contains the environment for the process.
@ -101,7 +101,7 @@ Thus, to print out the environment of process 1, you would do:
.I /proc/[number]/exe
Under Linux 2.2 and later, this file is a symbolic link
containing the actual path name of the executed command.
This symbolic link can be dereferenced normally - attempting to open
This symbolic link can be dereferenced normally; attempting to open
it will open the executable. You can even type
.I /proc/[number]/exe
to run another copy of the same executable as is being run by
@ -120,7 +120,7 @@ For example, [0301]:1502 would be inode 1502 on device major 03 (IDE,
MFM, etc. drives) minor 01 (first partition on the first drive).
.BR find (1)
with the -inum option can be used to locate the file.
with the \-inum option can be used to locate the file.
.TP
.I /proc/[number]/fd
This is a subdirectory containing one entry for each file which the
@ -130,8 +130,8 @@ standard input, 1 standard output, 2 standard error, etc.
Programs that will take a filename, but will not take the standard
input, and which write to a file, but will not send their output to
standard output, can be effectively foiled this way, assuming that -i
is the flag designating an input file and -o is the flag designating
standard output, can be effectively foiled this way, assuming that \-i
is the flag designating an input file and \-o is the flag designating
an output file:
.br
.nf
@ -358,13 +358,13 @@ The bitmap of caught signals.
This is the "channel" in which the process is waiting. It is the
address of a system call, and can be looked up in a namelist if you
need a textual name. (If you have an up-to-date /etc/psdatabase, then
try \fIps -l\fP to see the WCHAN field in action.)
try \fIps \-l\fP to see the WCHAN field in action.)
.TP
\fInswap\fP %lu
Number of pages swapped - not maintained.
Number of pages swapped (not maintained).
.TP
\fIcnswap\fP %lu
Cumulative \fInswap\fP for child processes - not maintained.
Cumulative \fInswap\fP for child processes (not maintained).
.TP
\fIexit_signal\fP %d
Signal to be sent to parent when we die.
@ -1510,7 +1510,7 @@ This file displays various virtual memory statistics.
.SH CAVEATS
Note that many strings (i.e., the environment and command line) are in
the internal format, with sub-fields terminated by NUL bytes, so you
may find that things are more readable if you use \fIod -c\fP or \fItr
may find that things are more readable if you use \fIod \-c\fP or \fItr
"\\000" "\\n"\fP to read them.
Alternatively, \fIecho `cat <file>`\fP works well.

View File

@ -170,7 +170,7 @@ the device type (`hd' for ST-506 compatible hard disk, with Y in
`ad' for Atari ACSI disk, with Y in `a'-`e',
`ez' for a Syquest EZ135 parallel port removable drive, with Y=`a',
`xd' for XT compatible disk, with Y either `a' or `b'; `fd' for
floppy disk, with Y the floppy drive number - fd0 would be
floppy disk, with Y the floppy drive number \(em fd0 would be
the DOS `A:' drive, and fd1 would be `B:'), Y the driver letter or
number, and N the number (in decimal) of the partition on this device
(absent in the case of floppies). Recent kernels allow many other
@ -192,7 +192,7 @@ The `ro' option tells the kernel to mount the root filesystem
as `readonly' so that filesystem consistency check programs (fsck)
can do their work on a quiescent file system. No processes can
write to files on the filesystem in question until it is `remounted'
as read/write capable, e.g., by `mount -w -n -o remount /'.
as read/write capable, e.g., by `mount \-w \-n \-o remount /'.
(See also
.BR mount (8).)
@ -385,7 +385,7 @@ The `noinitrd' option tells the kernel that although it was compiled for
operation with initrd, it should not go through the above steps, but
leave the initrd data under
.IR /dev/initrd .
(This device can be used only once - the data is freed as soon as
(This device can be used only once: the data is freed as soon as
the last process that used it has closed
.IR /dev/initrd .)
@ -757,7 +757,7 @@ is identified automatically, but if it isn't then this may help.
The standard disk driver can accept geometry arguments for the disks
similar to the IDE driver. Note however that it only expects three
values (C/H/S) -- any more or any less and it will silently ignore
values (C/H/S); any more or any less and it will silently ignore
you. Also, it only accepts `hd=' as an argument, i.e. `hda='
and so on are not valid here. The format is as follows:
.IP
@ -1061,14 +1061,14 @@ sound=device1[,device2[,device3...[,device10]]]
where each deviceN value is of the following format 0xTaaaId and the
bytes are used as follows:
T - device type: 1=FM, 2=SB, 3=PAS, 4=GUS, 5=MPU401, 6=SB16,
T \- device type: 1=FM, 2=SB, 3=PAS, 4=GUS, 5=MPU401, 6=SB16,
7=SB16-MPU401
aaa - I/O address in hex.
aaa \- I/O address in hex.
I - interrupt line in hex (i.e 10=a, 11=b, ...)
I \- interrupt line in hex (i.e 10=a, 11=b, ...)
d - DMA channel.
d \- DMA channel.
As you can see it gets pretty messy, and you are better off to compile
in your own personal values as recommended. Using a boot arg of

View File

@ -294,9 +294,9 @@ for African languages, ESC ( ! A selects the Cuban character
set, etc. etc.
.LP
A 96-character set is designated as G\fIn\fP character set
by an escape sequence ESC - xx (for G1), ESC . xx (for G2)
by an escape sequence ESC \- xx (for G1), ESC . xx (for G2)
or ESC / xx (for G3).
For example, ESC - G selects the Hebrew alphabet as G1.
For example, ESC \- G selects the Hebrew alphabet as G1.
.LP
A multibyte character set is designated as G\fIn\fP character set
by an escape sequence ESC $ xx or ESC $ ( xx (for G0),
@ -310,7 +310,7 @@ is fixed (always ASCII), so that G1, G2 and G3
can only be invoked for codes with the high order bit set.
In particular, ^N and ^O are not used anymore, ESC ( xx
can be used only with xx=B, and ESC ) xx, ESC * xx, ESC + xx
are equivalent to ESC - xx, ESC . xx, ESC / xx, respectively.
are equivalent to ESC \- xx, ESC . xx, ESC / xx, respectively.
.SH "SEE ALSO"
.BR console (4),

View File

@ -58,19 +58,19 @@ three characters `[', `]' and `!'.)
.SS Ranges
There is one special convention:
two characters separated by `-' denote a range.
(Thus, `[A-Fa-f0-9]' is equivalent to `[ABCDEFabcdef0123456789]'.)
One may include `-' in its literal meaning by making it the
two characters separated by `\-' denote a range.
(Thus, `[A\-Fa\-f0\-9]' is equivalent to `[ABCDEFabcdef0123456789]'.)
One may include `\-' in its literal meaning by making it the
first or last character between the brackets.
(Thus, `[]-]' matches just the two characters `]' and `-',
and `[--0]' matches the three characters `-', `.', `0', since `/'
(Thus, `[]\-]' matches just the two characters `]' and `\-',
and `[\-\-0]' matches the three characters `\-', `.', `0', since `/'
cannot be matched.)
.SS Complementation
An expression `[!...]' matches a single character, namely
any character that is not matched by the expression obtained
by removing the first `!' from it.
(Thus, `[!]a-]' matches any single character except `]', `a' and `-'.)
(Thus, `[!]a\-]' matches any single character except `]', `a' and `\-'.)
One can remove the special meaning of `?', `*' and `[' by
preceding them by a backslash, or, in case this is part of
@ -81,7 +81,7 @@ Thus, `[[?*\e]' matches the four characters `[', `?', `*' and `\e'.
.SH PATHNAMES
Globbing is applied on each of the components of a pathname
separately. A `/' in a pathname cannot be matched by a `?' or `*'
wildcard, or by a range like `[.-0]'. A range cannot contain an
wildcard, or by a range like `[.\-0]'. A range cannot contain an
explicit `/' character; this would lead to a syntax error.
If a filename starts with a `.', this character must be matched explicitly.
@ -135,9 +135,9 @@ effect of a wildcard pattern `[^...]' to be undefined.
.SS Character classes and Internationalization
Of course ranges were originally meant to be ASCII ranges,
so that `[ -%]' stands for `[ !"#$%]' and `[a-z]' stands
so that `[\ \-%]' stands for `[\ !"#$%]' and `[a\-z]' stands
for "any lowercase letter".
Some Unix implementations generalized this so that a range X-Y
Some Unix implementations generalized this so that a range X\-Y
stands for the set of characters with code between the codes for
X and for Y. However, this requires the user to know the
character coding in use on the local system, and moreover, is
@ -150,7 +150,7 @@ expression: namely (i) the negation, (ii) explicit single characters,
and (iii) ranges. POSIX specifies ranges in an internationally
more useful way and adds three more types:
(iii) Ranges X-Y comprise all characters that fall between X
(iii) Ranges X\-Y comprise all characters that fall between X
and Y (inclusive) in the current collating sequence as defined
by the LC_COLLATE category in the current locale.
@ -161,7 +161,7 @@ by the LC_COLLATE category in the current locale.
[:digit:] [:graph:] [:lower:] [:print:]
[:punct:] [:space:] [:upper:] [:xdigit:]
.fi
so that one can say `[[:lower:]]' instead of `[a-z]', and have
so that one can say `[[:lower:]]' instead of `[a\-z]', and have
things work in Denmark, too, where there are three letters past `z'
in the alphabet.
These character classes are defined by the LC_CTYPE category

View File

@ -730,7 +730,7 @@ to the network.
.TP
.BR ip_nonlocal_bind " (Boolean; default: disabled)"
If set, allows processes to bind() to non-local IP addresses,
which can be quite useful - but may break some applications.
which can be quite useful, but may break some applications.
.\"
.\" The following is from 2.6.12: Doumentation/networking/ip-sysctl.txt
.TP

View File

@ -410,7 +410,7 @@ Begin a new paragraph and reset prevailing indent.
.SS "Relative Margin Indent"
.TP 9m
.BI \&.RS " i"
Start relative margin indent - moves the left margin
Start relative margin indent: moves the left margin
.I i
to the right (if
.I i

View File

@ -197,8 +197,8 @@ The
.B mr_type
parameter specifies which action to perform.
.B PACKET_MR_PROMISC
enables receiving all packets on a shared medium - often known as
``promiscuous mode'',
enables receiving all packets on a shared medium (often known as
``promiscuous mode''),
.B PACKET_MR_MULTICAST
binds the socket to the physical layer multicast group specified in
.B mr_address

View File

@ -105,7 +105,7 @@ CPU affinity
.RB ( sched_setaffinity (2))
.SS "Compiling on Linux"
On Linux, programs that use the Pthreads API should be compiled using
.IR "cc -pthread" .
.IR "cc \-pthread" .
.SS "Linux Implementations of POSIX Threads"
Over time, two threading implementations have been provided by
the GNU C library on Linux:

View File

@ -227,7 +227,7 @@ are new in Linux 2.2. They are Linux extensions
and should not be used in portable programs.
Linux 2.0 enabled some bug-to-bug compatibility with BSD in the raw socket code
when the SO_BSDCOMPAT flag was set - that has been removed in 2.2.
when the SO_BSDCOMPAT flag was set \- that has been removed in 2.2.
.SH BUGS
Transparent proxy extensions are not described.

View File

@ -19,7 +19,7 @@
.\"
.TH SOCKET 7 2004-05-27 "Linux 2.6.6" "Linux Programmer's Manual"
.SH NAME
socket - Linux socket interface
socket \- Linux socket interface
.SH SYNOPSIS
.B #include <sys/socket.h>
.br

View File

@ -136,7 +136,7 @@ Here are some of the most common schemes in use on Unix-like systems
that are understood by many tools.
Note that many tools using URIs also have internal schemes or specialized
schemes; see those tools' documentation for information on those schemes.
.SS "http - Web (HTTP) server"
.SS "http \- Web (HTTP) server"
.RI http:// ip_server / path
.br
.RI http:// ip_server / path ? query
@ -168,7 +168,7 @@ may be too long to store as a URI, so they use a different
interaction mechanism (called POST) which does not include the data in the URI.
See the Common Gateway Interface specification at
<http://www.w3.org/CGI> for more information.
.SS "ftp - File Transfer Protocol (FTP)"
.SS "ftp \- File Transfer Protocol (FTP)"
.RI ftp:// ip_server / path
.PP
This is a URL accessing a file through the file transfer protocol (FTP).
@ -178,7 +178,7 @@ in that case many clients provide as the password the requestor's
Internet email address.
An example is
<ftp://ftp.is.co.za/rfc/rfc1808.txt>.
.SS "gopher - Gopher server"
.SS "gopher \- Gopher server"
.RI gopher:// ip_server / "gophertype selector"
.br
.RI gopher:// ip_server / "gophertype selector" %09 search
@ -200,7 +200,7 @@ is the Gopher selector string. In the Gopher protocol,
Gopher selector strings are a sequence of octets which may contain
any octets except 09 hexadecimal (US-ASCII HT or tab), 0A hexadecimal
(US-ASCII character LF), and 0D (US-ASCII character CR).
.SS "mailto - Email address"
.SS "mailto \- Email address"
.RI mailto: email-address
.PP
This is an email address, usually of the form
@ -210,7 +210,7 @@ See
for more information on the correct format of an email address.
Note that any % character must be rewritten as %25.
An example is <mailto:dwheeler@dwheeler.com>.
.SS "news - Newsgroup or News message"
.SS "news \- Newsgroup or News message"
.RI news: newsgroup-name
.br
.RI news: message-id
@ -234,14 +234,14 @@ and ">"; it takes the form
.IR unique @ full_domain_name .
A message identifier may be distinguished from a news group name by the
presence of the "@" character.
.SS "telnet - Telnet login"
.SS "telnet \- Telnet login"
.RI telnet:// ip_server /
.PP
The Telnet URL scheme is used to designate interactive text services that
may be accessed by the Telnet protocol. The final "/" character may be omitted.
The default port is 23.
An example is <telnet://melvyl.ucop.edu/>.
.SS "file - Normal file"
.SS "file \- Normal file"
.RI file:// ip_server / path_segments
.br
.RI file: path_segments
@ -274,7 +274,7 @@ Note that if you really mean to say "start from the current location," don't
specify the scheme at all; use a relative address like <../test.txt>,
which has the side-effect of being scheme-independent.
An example of this scheme is <file:///etc/passwd>.
.SS "man - Man page documentation"
.SS "man \- Man page documentation"
.RI man: command-name
.br
.RI man: command-name ( section )
@ -287,7 +287,7 @@ for more information on the meaning of the section numbers.
This URI scheme is unique to Unix-like systems (such as Linux)
and is not currently registered by the IETF.
An example is <man:ls(1)>.
.SS "info - Info page documentation"
.SS "info \- Info page documentation"
.RI info: virtual-filename
.br
.RI info: virtual-filename # nodename
@ -313,7 +313,7 @@ In both GNOME and KDE, if the form without the nodename is used the
nodename is assumed to be "Top".
Examples of the GNOME format are <info:gcc> and <info:gcc#G++_and_GCC>.
Examples of the KDE format are <info:(gcc)> and <info:(gcc)G++ and GCC>.
.SS "whatis - Documentation search"
.SS "whatis \- Documentation search"
.RI whatis: string
.PP
This scheme searches the database of short (one-line) descriptions of commands
@ -323,12 +323,12 @@ See
.BR whatis (1).
This URI scheme is unique to Unix-like systems (such as Linux)
and is not currently registered by the IETF.
.SS "ghelp - GNOME help documentation"
.SS "ghelp \- GNOME help documentation"
.RI ghelp: name-of-application
.PP
This loads GNOME help for the given application.
Note that not much documentation currently exists in this format.
.SS "ldap - Lightweight Directory Access Protocol"
.SS "ldap \- Lightweight Directory Access Protocol"
.RI ldap:// hostport
.br
.RI ldap:// hostport /
@ -402,7 +402,7 @@ with common name (cn) "Babs Jensen" at University of Michigan, request:
.RS
ldap://host.com:6666/o=University%20of%20Michigan,c=US??sub?(cn=Babs%20Jensen)
.RE
.SS "wais - Wide Area Information Servers"
.SS "wais \- Wide Area Information Servers"
.RI wais:// hostport / database
.br
.RI wais:// hostport / database ? search
@ -458,7 +458,7 @@ include include upper and lower case English letters,
decimal digits, and the following
limited set of punctuation marks and symbols:
.IP
- _ . ! ~ * ' ( )
\- _ . ! ~ * ' ( )
.PP
All other characters must be escaped.
An escaped octet is encoded as a character triplet, consisting of the
@ -484,9 +484,9 @@ For URIs which must handle characters outside the US ASCII character set,
the HTML 4.01 specification (section B.2) and
IETF RFC 2718 (section 2.2.5) recommend the following approach:
.IP 1. 4
translate the character sequences into UTF-8 (IETF RFC 2279) - see
translate the character sequences into UTF-8 (IETF RFC 2279) \(em see
.BR utf-8 (7)
- and then
\(em and then
.IP 2.
use the URI escaping mechanism, that is,
use the %HH encoding for unsafe octets.

View File

@ -119,32 +119,32 @@ can only be up to four bytes long in
The following byte sequences are used to represent a character. The
sequence to be used depends on the UCS code number of the character:
.TP 0.4i
0x00000000 - 0x0000007F:
0x00000000 \- 0x0000007F:
.RI 0 xxxxxxx
.TP
0x00000080 - 0x000007FF:
0x00000080 \- 0x000007FF:
.RI 110 xxxxx
.RI 10 xxxxxx
.TP
0x00000800 - 0x0000FFFF:
0x00000800 \- 0x0000FFFF:
.RI 1110 xxxx
.RI 10 xxxxxx
.RI 10 xxxxxx
.TP
0x00010000 - 0x001FFFFF:
0x00010000 \- 0x001FFFFF:
.RI 11110 xxx
.RI 10 xxxxxx
.RI 10 xxxxxx
.RI 10 xxxxxx
.TP
0x00200000 - 0x03FFFFFF:
0x00200000 \- 0x03FFFFFF:
.RI 111110 xx
.RI 10 xxxxxx
.RI 10 xxxxxx
.RI 10 xxxxxx
.RI 10 xxxxxx
.TP
0x04000000 - 0x7FFFFFFF:
0x04000000 \- 0x7FFFFFFF:
.RI 1111110 x
.RI 10 xxxxxx
.RI 10 xxxxxx

View File

@ -49,7 +49,7 @@ From the cache file
.BR /etc/ld.so.cache
which contains a compiled list of candidate libraries previously found
in the augmented library path. If, however, the binary was linked with
.B -z nodeflib
.B \-z nodeflib
linker option, libraries in the default library paths are skipped.
.IP o
In the default path
@ -57,7 +57,7 @@ In the default path
and then
.BR /usr/lib .
If the binary was linked with
.B -z nodeflib
.B \-z nodeflib
linker option, this step is skipped.
.SH SYNOPSIS
The dynamic linker can be run either indirectly through running some
@ -71,24 +71,24 @@ section of the program is executed) or directly by running:
[OPTIONS] [PROGRAM [ARGUMENTS]]
.SH COMMAND LINE OPTIONS
.TP
.B --list
.B \-\-list
List all dependencies and how they are resolved.
.TP
.B --verify
.B \-\-verify
Verify that program is dynamically linked and this dynamic linker can handle
it.
.TP
.B --library-path PATH
.B \-\-library\-path PATH
Override
.B LD_LIBRARY_PATH
environment variable setting (see below).
.TP
.B --ignore-rpath LIST
.B \-\-ignore\-rpath LIST
Ignore RPATH and RUNPATH information in object names in LIST.
This option has been supported by glibc2 for about one hour.
Then it was renamed into:
.TP
.B --inhibit-rpath LIST
.B \-\-inhibit\-rpath LIST
.SH ENVIRONMENT
There are four important environment variables.
.TP
@ -160,9 +160,9 @@ If set to non-empty string, output symbol versioning information about the
program if querying information about the program (ie. either
.B LD_TRACE_LOADED_OBJECTS
has been set, or
.B --list
.B \-\-list
or
.B --verify
.B \-\-verify
options have been given to the dynamic linker).
.TP
.B LD_PROFILE
@ -179,12 +179,12 @@ LD_DEBUG_OUTPUT is ignored for setuid/setgid binaries.
.B LD_AOUT_LIBRARY_PATH
(libc5)
Version of LD_LIBRARY_PATH for a.out binaries only.
Old versions of ld-linux.so.1 also supported LD_ELF_LIBRARY_PATH.
Old versions of ld\-linux.so.1 also supported LD_ELF_LIBRARY_PATH.
.TP
.B LD_AOUT_PRELOAD
(libc5)
Version of LD_PRELOAD for a.out binaries only.
Old versions of ld-linux.so.1 also supported LD_ELF_PRELOAD.
Old versions of ld\-linux.so.1 also supported LD_ELF_PRELOAD.
.TP
.B LD_SHOW_AUXV
(glibc since 2.1)
@ -219,7 +219,7 @@ when none is present.
.B /lib/ld.so
a.out dynamic linker/loader
.TP
.BR /lib/ld-linux.so. { 1 , 2 }
.BR /lib/ld\-linux.so. { 1 , 2 }
ELF dynamic linker/loader
.TP
.B /etc/ld.so.cache

View File

@ -71,8 +71,11 @@ determining which versions should have their links updated.
.PP
.B ldconfig
will attempt to deduce the type of ELF libs (ie. libc5 or libc6/glibc)
based on what C libs, if any, the library was linked against. Therefore, when
making dynamic libraries, it is wise to explicitly link against libc (use -lc).
based on what C libs, if any, the library was linked against.
.\" FIXME: I think the following sentence is suspect (perhaps historical
.\" cruft) -- MTK, Jul 2005
Therefore, when making dynamic libraries,
it is wise to explicitly link against libc (use \-lc).
.PP
Some existing libs do not contain enough information to allow the deduction of
their type. Therefore, the
@ -84,7 +87,7 @@ is "dirname=TYPE", where TYPE can be libc4, libc5, or libc6.
(This syntax also works on the command line.) Spaces are
.B not
allowed. Also see the
.B -p
.B \-p
option.
.B ldconfig
should normally be run by the superuser as it may require write

View File

@ -19,7 +19,7 @@
.\"
.TH NSCD 8 1999-10 "GNU C Library" "Linux Programmer's Manual"
.SH NAME
/usr/sbin/nscd - name service cache daemon
/usr/sbin/nscd \- name service cache daemon
.SH DESCRIPTION
Nscd is a daemon that provides a cache for the most common name service
requests. The default configuration file,