Automated unformatting of parentheses using unformat_parens.sh

This commit is contained in:
Michael Kerrisk 2005-10-19 07:07:02 +00:00
parent e511ffb6bc
commit 63aa9df02f
260 changed files with 1564 additions and 1564 deletions

View File

@ -39,7 +39,7 @@ _exit, _Exit \- terminate the current process
.BI "void _Exit(int " status );
.SH DESCRIPTION
The function
.BR _exit()
.BR _exit ()
terminates the calling process "immediately". Any open file descriptors
belonging to the process are closed; any children of the process are
inherited by process 1,
@ -56,38 +56,38 @@ can be collected using one of the
family of calls.
.LP
The function
.B _Exit()
.BR _Exit ()
is equivalent to
.BR _exit() .
.BR _exit ().
.SH "RETURN VALUE"
These functions do not return.
.SH "CONFORMING TO"
SVr4, SVID, POSIX, X/OPEN, 4.3BSD.
The function \fB_Exit()\fP was introduced by C99.
The function \fB_Exit\fP() was introduced by C99.
.SH NOTES
For a discussion on the effects of an exit, the transmission of
exit status, zombie processes, signals sent, etc., see
.BR exit (3).
.LP
The function
.B _exit()
is like \fBexit()\fP, but does not call any
.BR _exit ()
is like \fBexit\fP(), but does not call any
functions registered with
.BR atexit()
.BR atexit ()
or
.BR on_exit() .
.BR on_exit ().
Whether it flushes
standard I/O buffers and removes temporary files created with
.BR tmpfile (3)
is implementation dependent.
On the other hand,
.B _exit()
.BR _exit ()
does close open file descriptors, and this may cause an unknown delay,
waiting for pending output to finish. If the delay is undesired,
it may be useful to call functions like \fItcflush()\fP before
calling \fB_exit()\fP.
it may be useful to call functions like \fItcflush\fP() before
calling \fB_exit\fP().
Whether any pending I/O is cancelled, and which pending I/O may be
cancelled upon \fB_exit()\fP, is implementation-dependent.
cancelled upon \fB_exit\fP(), is implementation-dependent.
.SH "SEE ALSO"
.BR execve (2),
.BR fork (2),

View File

@ -61,13 +61,13 @@ scheduled alarm.
share the same timer; calls to one will interfere with use of the
other.
.PP
.B sleep()
.BR sleep ()
may be implemented using
.BR SIGALRM ;
mixing calls to
.B alarm()
.BR alarm ()
and
.B sleep()
.BR sleep ()
is a bad idea.
Scheduling delays can, as ever, cause the execution of the process to

View File

@ -58,15 +58,15 @@ and inherited by child processes.
The
.I addr
parameter of
.B free_hugepages()
.BR free_hugepages ()
tells which page is being freed: it was the return value of a
call to
.BR alloc_hugepages() .
.BR alloc_hugepages ().
(The memory is first actually freed when all users have released it.)
The
.I addr
parameter of
.B alloc_hugepages()
.BR alloc_hugepages ()
is a hint, that the kernel may or may not follow.
Addresses must be properly aligned.
.LP

View File

@ -110,7 +110,7 @@ X/OPEN does not document EIO, ENOMEM or EFAULT error conditions.
This interface is marked as legacy by X/OPEN.
.SH NOTES
FreeBSD has a stronger
.I jail()
.IR jail ()
system call.
.SH "SEE ALSO"
.BR chdir (2),

View File

@ -38,7 +38,7 @@ execve \- execute program
.BI "int execve(const char *" filename ", char *const " argv
.BI "[], char *const " envp []);
.SH DESCRIPTION
\fBexecve()\fP executes the program pointed to by \fIfilename\fP.
\fBexecve\fP() executes the program pointed to by \fIfilename\fP.
\fIfilename\fP must be either a binary executable, or a script
starting with a line of the form "\fB#! \fIinterpreter \fR[arg]".
In the latter case, the interpreter must be a valid pathname for an
@ -53,7 +53,7 @@ pointer. The argument vector and environment can be accessed by the
called program's main function, when it is defined as \fBint main(int
argc, char *argv[], char *envp[])\fR.
\fBexecve()\fP does not return on success, and the text, data, bss, and
\fBexecve\fP() does not return on success, and the text, data, bss, and
stack of the calling process are overwritten by that of the program
loaded. The program invoked inherits the calling process's PID, and any
open file descriptors that are not set to close on exec. Signals pending
@ -62,7 +62,7 @@ the calling process are reset to their default behaviour.
The SIGCHLD signal (when set to SIG_IGN) may or may not be reset to SIG_DFL.
If the current program is being ptraced, a \fBSIGTRAP\fP is sent to it
after a successful \fBexecve()\fP.
after a successful \fBexecve\fP().
If the set-user-ID bit is set on the program file pointed to by
\fIfilename\fP, and the calling process is not being ptraced,
@ -84,7 +84,7 @@ shared libraries. This interpreter is typically
version 5, or \fI/lib/ld-linux.so.2\fR for binaries linked with the
GNU libc version 2.
.SH "RETURN VALUE"
On success, \fBexecve()\fP does not return, on error \-1 is returned, and
On success, \fBexecve\fP() does not return, on error \-1 is returned, and
.I errno
is set appropriately.
.SH ERRORS
@ -178,7 +178,7 @@ conditions EAGAIN, EINTR, ELIBACC, ENOLINK, EMULTIHOP; POSIX does not
document ETXTBSY, EPERM, EFAULT, ELOOP, EIO, ENFILE, EMFILE, EINVAL,
EISDIR or ELIBBAD error conditions.
.SH NOTES
SUID and SGID processes can not be \fBptrace()\fPd.
SUID and SGID processes can not be \fBptrace\fP()d.
Linux ignores the SUID and SGID bits on scripts.
@ -195,7 +195,7 @@ a #! executable shell script.
.\" Some Linux versions have failed to check permissions on ELF
.\" interpreters. This is a security hole, because it allows users to
.\" open any file, such as a rewinding tape device, for reading. Some
.\" Linux versions have also had other security holes in \fBexecve()\fP,
.\" Linux versions have also had other security holes in \fBexecve\fP(),
.\" that could be exploited for denial of service by a suitably crafted
.\" ELF binary. There are no known problems with 2.0.34 or 2.2.15.

View File

@ -34,8 +34,8 @@ In a SysV-like environment, one has the two types
\fBmcontext_t\fP and \fBucontext_t\fP defined in
.I <ucontext.h>
and the four functions
\fBgetcontext()\fP, \fBsetcontext()\fP, \fBmakecontext()\fP
and \fBswapcontext()\fP
\fBgetcontext\fP(), \fBsetcontext\fP(), \fBmakecontext\fP()
and \fBswapcontext\fP()
that allow user-level context switching between multiple
threads of control within a process.
.LP
@ -57,7 +57,7 @@ with \fBsigset_t\fP and \fBstack_t\fP defined in
.IR <signal.h> .
Here \fIuc_link\fP points to the context that will be resumed
when the current context terminates (in case the current context
was created using \fBmakecontext()\fP), \fIuc_sigmask\fP is the
was created using \fBmakecontext\fP()), \fIuc_sigmask\fP is the
set of signals blocked in this context (see
.BR sigprocmask (2)),
\fIuc_stack\fP is the stack used by this context (see
@ -66,24 +66,24 @@ and \fIuc_mcontext\fP is the
machine-specific representation of the saved context,
that includes the calling thread's machine registers.
.LP
The function \fBgetcontext()\fP initializes the structure
The function \fBgetcontext\fP() initializes the structure
pointed at by \fIucp\fP to the currently active context.
.LP
The function \fBsetcontext()\fP restores the user context
The function \fBsetcontext\fP() restores the user context
pointed at by \fIucp\fP. A successful call does not return.
The context should have been obtained by a call of \fBgetcontext()\fP,
or \fBmakecontext()\fP, or passed as third argument to a signal
The context should have been obtained by a call of \fBgetcontext\fP(),
or \fBmakecontext\fP(), or passed as third argument to a signal
handler.
.LP
If the context was obtained by a call of \fBgetcontext()\fP,
If the context was obtained by a call of \fBgetcontext\fP(),
program execution continues as if this call just returned.
.LP
If the context was obtained by a call of \fBmakecontext()\fP,
If the context was obtained by a call of \fBmakecontext\fP(),
program execution continues by a call to the function \fIfunc\fP
specified as the second argument of that call to \fBmakecontext()\fP.
specified as the second argument of that call to \fBmakecontext\fP().
When the function \fIfunc\fP returns, we continue with the
\fIuc_link\fP member of the structure \fIucp\fP specified as the
first argument of that call to \fBmakecontext()\fP.
first argument of that call to \fBmakecontext\fP().
When this member is NULL, the thread exits.
.LP
If the context was obtained by a call to a signal handler,
@ -92,27 +92,27 @@ program instruction following the instruction interrupted
by the signal". However, this sentence was removed in SUSv2,
and the present verdict is "the result is unspecified".
.SH "RETURN VALUE"
When successful, \fBgetcontext()\fP returns 0 and \fBsetcontext()\fP
When successful, \fBgetcontext\fP() returns 0 and \fBsetcontext\fP()
does not return. On error, both return \-1 and set \fIerrno\fP
appropriately.
.SH ERRORS
None defined.
.SH NOTES
The earliest incarnation of this mechanism was the
\fIsetjmp()\fP/\fIlongjmp()\fP mechanism. Since that does not define
\fIsetjmp\fP()/\fIlongjmp\fP() mechanism. Since that does not define
the handling of the signal context, the next stage was the
\fIsigsetjmp()\fP/\fIsiglongjmp()\fP pair.
\fIsigsetjmp\fP()/\fIsiglongjmp\fP() pair.
The present mechanism gives much more control. On the other hand,
there is no easy way to detect whether a return from \fBgetcontext()\fP
is from the first call, or via a \fBsetcontext()\fP call.
there is no easy way to detect whether a return from \fBgetcontext\fP()
is from the first call, or via a \fBsetcontext\fP() call.
The user has to invent her own bookkeeping device, and a register
variable won't do since registers are restored.
.LP
When a signal occurs, the current user context is saved and
a new context is created by the kernel for the signal handler.
Do not leave the handler using \fIlongjmp()\fP: it is undefined
what would happen with contexts. Use \fIsiglongjmp()\fP or
\fIsetcontext()\fP instead.
Do not leave the handler using \fIlongjmp\fP(): it is undefined
what would happen with contexts. Use \fIsiglongjmp\fP() or
\fIsetcontext\fP() instead.
.SH "CONFORMING TO"
SUSv2
.SH "SEE ALSO"

View File

@ -41,9 +41,9 @@ gethostname, sethostname \- get/set host name
These functions are used to access or to change the host name of the
current processor.
The
.B gethostname()
.BR gethostname ()
function returns a NUL-terminated hostname (set earlier by
.BR sethostname() )
.BR sethostname ())
in the array \fIname\fP that has a length of \fIlen\fP bytes.
In case the NUL-terminated hostname does not fit, no error is
returned, but the hostname is truncated. It is unspecified

View File

@ -29,7 +29,7 @@ getpagesize \- get memory page size
.B int getpagesize(void);
.SH DESCRIPTION
The function
.B getpagesize()
.BR getpagesize ()
returns the number of bytes in a page, where a "page" is the thing
used where it says in the description of
.BR mmap (2)
@ -60,13 +60,13 @@ This call first appeared in 4.2BSD.
.SH CONFORMING TO
SVr4, 4.4BSD, SUSv2.
In SUSv2 the
.B getpagesize()
.BR getpagesize ()
call is labeled "legacy", and in POSIX 1003.1-2001
it has been dropped.
HPUX does not have this call.
.SH NOTES
Whether
.B getpagesize()
.BR getpagesize ()
is present as a Linux system call depends on the architecture.
If it is, it returns the kernel symbol PAGE_SIZE,
which is architecture and machine model dependent.
@ -77,7 +77,7 @@ should not find PAGE_SIZE at compile time from a header file,
but use an actual system call, at least for those architectures
(like sun4) where this dependency exists.
Here libc4, libc5, glibc 2.0 fail because their
.B getpagesize()
.BR getpagesize ()
returns a statically derived value, and does not use a system call.
Things are OK in glibc 2.1.
.SH "SEE ALSO"

View File

@ -180,7 +180,7 @@ fails with the error
A limit on the combined number of
.BR flock ()
locks and
.BR fcntl()
.BR fcntl ()
leases that this process may establish.
.TP
.B RLIMIT_MEMLOCK
@ -331,11 +331,11 @@ points outside the accessible address space.
is not valid.
.TP
.B EPERM
An unprivileged process tried to use \fBsetrlimit()\fP to
An unprivileged process tried to use \fBsetrlimit\fP() to
increase a soft or hard limit above the current hard limit; the
.B CAP_SYS_RESOURCE
capability is required to do this.
Or, the process tried to use \fBsetrlimit()\fP to increase
Or, the process tried to use \fBsetrlimit\fP() to increase
the soft or hard RLIMIT_NOFILE limit above the current kernel
maximum (NR_OPEN).
.SH BUGS

View File

@ -45,8 +45,8 @@ These functions are always successful.
.SH "CONFORMING TO"
POSIX, 4.3BSD.
.SH HISTORY
In Unix V6 the \fBgetuid()\fP call returned (euid << 8) + uid.
Unix V7 introduced separate calls \fBgetuid()\fP and \fBgeteuid()\fP.
In Unix V6 the \fBgetuid\fP() call returned (euid << 8) + uid.
Unix V7 introduced separate calls \fBgetuid\fP() and \fBgeteuid\fP().
.SH "SEE ALSO"
.BR setreuid (2),
.BR setuid (2)

View File

@ -30,7 +30,7 @@ ipc \- System V IPC system calls
.BI "int ipc(unsigned int " call ", int " first ", int " second ,
.BI "int " third ", void *" ptr ", long " fifth );
.SH DESCRIPTION
.B ipc()
.BR ipc ()
is a common kernel entry point for the System V IPC calls
for messages, semaphores, and shared memory.
.I call
@ -39,9 +39,9 @@ the other arguments are passed through to the appropriate call.
.PP
User programs should call the appropriate functions by their usual names.
Only standard library implementors and kernel hackers need to know about
.BR ipc() .
.BR ipc ().
.SH "CONFORMING TO"
\fBipc()\fP is Linux specific, and should not be used in programs
\fBipc\fP() is Linux specific, and should not be used in programs
intended to be portable.
.SH "SEE ALSO"
.BR msgctl (2),

View File

@ -99,7 +99,7 @@ to any of the target processes.
The pid or process group does not exist.
Note that an existing process might be a zombie,
a process which already committed termination, but
has not yet been \fBwait()\fPed for.
has not yet been \fBwait\fP()ed for.
.SH NOTES
The only signals that can be sent task number one, the
.I init
@ -117,9 +117,9 @@ Linux allows a process to signal itself, but on Linux the call
.LP
POSIX 1003.1-2003 requires that if a process sends a signal to itself,
and that process does not have the signal blocked, and no other thread
has it unblocked or is waiting for it in \fIsigwait()\fP, at least one
has it unblocked or is waiting for it in \fIsigwait\fP(), at least one
unblocked signal must be delivered to the sending thread before the
call of \fIkill()\fP returns.
call of \fIkill\fP() returns.
.SH "LINUX HISTORY"
Across different kernel versions, Linux has enforced different rules
for the permissions required for an unprivileged process

View File

@ -70,7 +70,7 @@ The function
is available since Linux 2.3.31.
It is Linux specific, and should be avoided in portable applications.
See also the
.I mmap64()
.IR mmap64 ()
function that is part of the LFS (Large File Summit).
.SH "SEE ALSO"
.BR getpagesize (2),

View File

@ -421,7 +421,7 @@ SVr4, SVID.
.SH NOTE
The pointer argument is declared as \fIstruct msgbuf *\fP with
libc4, libc5, glibc 2.0, glibc 2.1. It is declared as \fIvoid *\fP
(\fIconst void *\fP for \fImsgsnd()\fP) with glibc 2.2, following the SUSv2.
(\fIconst void *\fP for \fImsgsnd\fP()) with glibc 2.2, following the SUSv2.
.SH "SEE ALSO"
.BR msgctl (2),
.BR msgget (2),

View File

@ -182,7 +182,7 @@ locking tasks will contain a race condition. The solution for performing
atomic file locking using a lockfile is to create a unique file on
the same file system (e.g., incorporating hostname and pid), use
.BR link (2)
to make a link to the lockfile. If \fBlink()\fP returns 0, the lock is
to make a link to the lockfile. If \fBlink\fP() returns 0, the lock is
successful. Otherwise, use
.BR stat (2)
on the unique file to check if its link count has increased to 2,

View File

@ -33,7 +33,7 @@ pread, pwrite \- read from or write to a file descriptor at a given offset
.BI "ssize_t pwrite(int " fd ", const void *" buf ", size_t " count ", off_t " offset );
.fi
.SH DESCRIPTION
.B pread()
.BR pread ()
reads up to
.I count
bytes from file descriptor
@ -44,7 +44,7 @@ at offset
.IR buf .
The file offset is not changed.
.PP
.B pwrite()
.BR pwrite ()
writes up to
.I count
bytes from the buffer starting at

View File

@ -42,7 +42,7 @@ read \- read from a file descriptor
.BI "ssize_t read(int " fd ", void *" buf ", size_t " count );
.fi
.SH DESCRIPTION
.B read()
.BR read ()
attempts to read up to
.I count
bytes from file descriptor
@ -52,7 +52,7 @@ into the buffer starting at
.PP
If
.I count
is zero, \fBread()\fP returns zero and has no other results.
is zero, \fBread\fP() returns zero and has no other results.
If
.I count
is greater than SSIZE_MAX, the result is unspecified.
@ -64,7 +64,7 @@ It is not an error if this number is smaller than the number of bytes
requested; this may happen for example because fewer bytes are actually
available right now (maybe because we were close to end-of-file, or
because we are reading from a pipe, or from a terminal), or because
\fBread()\fP was interrupted by a signal.
\fBread\fP() was interrupted by a signal.
On error, \-1 is returned, and
.I errno
is set appropriately. In this case it is left unspecified whether

View File

@ -32,7 +32,7 @@ readahead \- perform file readahead into page cache
.BI "ssize_t readahead(int " fd ", off64_t *" offset ", size_t " count );
.fi
.SH DESCRIPTION
.B readahead()
.BR readahead ()
populates the page cache with data from a file so that subsequent
reads from that file will not block on disk I/O.
The
@ -51,16 +51,16 @@ is effectively rounded down to a page boundary
and bytes are read up to the next page boundary greater than or
equal to
.IR "(offset+count)" .
.B readahead()
.BR readahead ()
does not read beyond the end of the file.
.B readahead()
.BR readahead ()
blocks until the specified data has been read.
The current file offset of the open file referred to by
.I fd
is left unchanged.
.SH "RETURN VALUE"
On success,
.B readahead()
.BR readahead ()
returns 0; on failure, \-1 is returned, with
.I errno
set to indicate the cause of the error.
@ -77,12 +77,12 @@ does not refer to a file type to which
can be applied.
.SH "CONFORMING TO"
The
.B readahead()
.BR readahead ()
system call is Linux specific, and its use should be avoided
in portable applications.
.SH NOTES
The
.B readahead()
.BR readahead ()
system call appeared in Linux 2.4.13.
.SH "SEE ALSO"
.BR fadvise (2),

View File

@ -31,12 +31,12 @@ remap_file_pages \- create a non-linear file mapping
.BI "ssize_t " pgoff ", int " flags );
.SH DESCRIPTION
The
.B remap_file_pages()
.BR remap_file_pages ()
system call is used to create a non-linear mapping, that is, a mapping
in which the pages of the file are mapped into a non-sequential order
in memory.
The advantage of using
.B remap_file_pages()
.BR remap_file_pages ()
over using repeated calls to
.BR mmap (2)
is that the former approach does not require the kernel to create
@ -46,14 +46,14 @@ To create a non-linear mapping we perform the following steps:
.TP
\fB1.\fp
Use
.B mmap()
.BR mmap ()
to create a mapping (which is initially linear).
This mapping must be created with the
MAP_SHARED flag.
.TP
\fB2.\fp
Use one or more calls to
.B remap_file_pages()
.BR remap_file_pages ()
to rearrange the correspondence between the pages of the mapping
and the pages of the file.
It is possible to map the same page of a file
@ -78,7 +78,7 @@ Thus,
.I start
must be an address that falls within
a region previously mapped by a call to
.BR mmap() .
.BR mmap ().
Second,
.I start
specifies the address at which the file pages
@ -109,18 +109,18 @@ argument must be specified as 0.
The
.I flags
argument has the same meaning as for
.BR mmap() ,
.BR mmap (),
but all flags other than MAP_NONBLOCK are ignored.
.SH "RETURN VALUE"
On success,
.B remap_file_pages()
.BR remap_file_pages ()
returns 0.
On error, \-1 is returned, and
.I errno
is set appropriately.
.SH NOTES
The
.B remap_file_pages()
.BR remap_file_pages ()
system call appeared in Linux 2.5.46.
.SH ERRORS
.TP
@ -139,7 +139,7 @@ is invalid.
.\" And possibly others from vma->vm_ops->populate()
.SH "CONFORMING TO"
The
.B remap_file_pages()
.BR remap_file_pages ()
system call is Linux specific.
.SH "SEE ALSO"
.BR getpagesize (2),

View File

@ -86,15 +86,15 @@ I can't see the use for it in a clean program.
This set is watched to see if data is available for reading from any of
its file descriptors. After \fBselect\fP() has returned, \fIreadfds\fP will be
cleared of all file descriptors except for those file descriptors that
are immediately available for reading with a \fBrecv()\fP (for sockets) or
\fBread()\fP (for pipes, files, and sockets) call.
are immediately available for reading with a \fBrecv\fP() (for sockets) or
\fBread\fP() (for pipes, files, and sockets) call.
.TP
\fIwritefds\fP
This set is watched to see if there is space to write data to any of
its file descriptor. After \fBselect\fP() has returned, \fIwritefds\fP will be
cleared of all file descriptors except for those file descriptors that
are immediately available for writing with a \fBsend()\fP (for sockets) or
\fBwrite()\fP (for pipes, files, and sockets) call.
are immediately available for writing with a \fBsend\fP() (for sockets) or
\fBwrite\fP() (for pipes, files, and sockets) call.
.TP
\fIexceptfds\fP
This set is watched for exceptions or errors on any of the file
@ -105,7 +105,7 @@ is data sent on a socket using the \fBMSG_OOB\fP flag, and hence
\fBsend\fP(2) about this. After \fBselect\fP() has returned,
\fIexceptfds\fP will be cleared of all file descriptors except for those
descriptors that are available for reading OOB data. You can only ever
read one byte of OOB data though (which is done with \fBrecv()\fP), and
read one byte of OOB data though (which is done with \fBrecv\fP()), and
writing OOB data (done with \fBsend\fP) can be done at any time and will
not block. Hence there is no need for a fourth set to check if a socket
is available for writing OOB data.
@ -559,10 +559,10 @@ int main (int argc, char **argv) {
The above program properly forwards most kinds of TCP connections
including OOB signal data transmitted by \fBtelnet\fP servers. It
handles the tricky problem of having data flow in both directions
simultaneously. You might think it more efficient to use a \fBfork()\fP
simultaneously. You might think it more efficient to use a \fBfork\fP()
call and devote a thread to each stream. This becomes more tricky than
you might suspect. Another idea is to set non-blocking IO using an
\fBioctl()\fP call. This also has its problems because you end up having
\fBioctl\fP() call. This also has its problems because you end up having
to have inefficient timeouts.
The program does not handle more than one simultaneous connection at a
@ -603,8 +603,8 @@ for writing \fImust\fP be written to, and any file descriptor
available for reading \fImust\fP be read, etc.
.TP
\fB5.\fP
The functions \fBread()\fP, \fBrecv()\fP, \fBwrite()\fP, and
\fBsend()\fP do \fInot\fP necessarily read/write the full amount of data
The functions \fBread\fP(), \fBrecv\fP(), \fBwrite\fP(), and
\fBsend\fP() do \fInot\fP necessarily read/write the full amount of data
that you have requested. If they do read/write the full amount, its
because you have a low traffic load and a fast stream. This is not
always going to be the case. You should cope with the case of your
@ -619,8 +619,8 @@ easily be made as large as the maximum possible packet size on your
local network.
.TP
\fB7.\fP
The functions \fBread()\fP, \fBrecv()\fP, \fBwrite()\fP, and
\fBsend()\fP as well as the \fBselect()\fP call can return \-1 with an
The functions \fBread\fP(), \fBrecv\fP(), \fBwrite\fP(), and
\fBsend\fP() as well as the \fBselect\fP() call can return \-1 with an
errno of \fBEINTR\fP or \fBEAGAIN\fP (\fBEWOULDBLOCK\fP) which are not
errors. These results must be properly managed (not done properly
above). If your program is not going to receive any signals then
@ -629,14 +629,14 @@ set non-blocking IO, you will not get \fBEAGAIN\fP. Nonetheless
you should still cope with these errors for completeness.
.TP
\fB8.\fP
Never call \fBread()\fP, \fBrecv()\fP, \fBwrite()\fP, or \fBsend()\fP
Never call \fBread\fP(), \fBrecv\fP(), \fBwrite\fP(), or \fBsend\fP()
with a buffer length of zero.
.TP
\fB9.\fP
Except as indicated in \fB7.\fP, the functions \fBread()\fP,
\fBrecv()\fP, \fBwrite()\fP, and \fBsend()\fP never have a return value
Except as indicated in \fB7.\fP, the functions \fBread\fP(),
\fBrecv\fP(), \fBwrite\fP(), and \fBsend\fP() never have a return value
less than 1 except if an error has occurred. For instance, a
\fBread()\fP on a pipe where the other end has died returns zero (so
\fBread\fP() on a pipe where the other end has died returns zero (so
does an end-of-file error), \fIbut\fP only returns zero
once (a followup read or write will return \-1). Should
any of these functions return 0 or \-1, you should \fInot\fP

View File

@ -79,12 +79,12 @@ If
is zero, the process ID of the current process is used.
The call
.B setpgrp()
.BR setpgrp ()
is equivalent to
.BR setpgid(0,0) .
Similarly,
.B getpgrp()
.BR getpgrp ()
is equivalent to
.BR getpgid(0) .
Each process group is a member of a session and each process is a

View File

@ -78,7 +78,7 @@ When the critical code has completed, the caller then waits for the
signals by calling
.BR sigsuspend ()
with the signal mask that was returned by
.BR sigprocmask()
.BR sigprocmask ()
(in the
.IR oldset
argument).

View File

@ -222,7 +222,7 @@ when NFS-exported, and giving it out is a security concern.
Under some OSes the
.I fsid
can be used as second parameter to the
.I sysfs()
.IR sysfs ()
system call.
.SH NOTES
The kernel has system calls statfs, fstatfs, statfs64, fstatfs64

View File

@ -39,7 +39,7 @@ stime \- set time
.SH DESCRIPTION
\fBstime\fP() sets the system's idea of the time and date. Time, pointed
to by \fIt\fP, is measured in seconds from 00:00:00 GMT January 1, 1970.
\fBstime()\fP may only be executed by the superuser.
\fBstime\fP() may only be executed by the superuser.
.SH "RETURN VALUE"
On success, zero is returned. On error, \-1 is returned, and
.I errno

View File

@ -47,7 +47,7 @@ This function is always successful.
SVr4, SVID, X/OPEN, 4.3BSD
.SH BUGS
According to the standard specification (e.g., SVID),
\fBsync()\fP schedules the writes, but may return before the actual
\fBsync\fP() schedules the writes, but may return before the actual
writing is done.
However, since version 1.3.20 Linux does actually wait.
(This still does not guarantee data integrity: modern disks have

View File

@ -267,7 +267,7 @@ Roughly speaking, the code belonging to the system call
with number __NR_xxx defined in
.I /usr/include/asm/unistd.h
can be found in the kernel source in the routine
.IR sys_xxx() .
.IR sys_xxx ().
(The dispatch table for i386 can be found in
.IR /usr/src/linux/arch/i386/kernel/entry.S .)
There are many exceptions, however, mostly because

View File

@ -46,15 +46,15 @@ syslog, klogctl \- read and/or clear kernel message ring buffer; set console_log
.fi
.SH DESCRIPTION
If you need the libc function
.BR syslog() ,
.BR syslog (),
(that talks to
.BR syslogd (8)),
then look at
.BR syslog (3).
The system call of this name is about controlling the kernel
.I printk()
.IR printk ()
buffer, and the glibc version is called
.BR klogctl() .
.BR klogctl ().
The \fItype\fP argument determines the action taken by this function.

View File

@ -70,10 +70,10 @@ The file specified by
is not an executable of known type,
e.g., does not have the correct magic numbers.
.SH "CONFORMING TO"
\fBuselib()\fP is Linux specific, and should not be used in programs
\fBuselib\fP() is Linux specific, and should not be used in programs
intended to be portable.
.SH NOTES
\fBuselib()\fP was used by early libc startup code to load
\fBuselib\fP() was used by early libc startup code to load
the shared libraries with names found in an array of names
in the binary.
.LP

View File

@ -45,8 +45,8 @@ bytes to the file referenced by the file descriptor
.I fd
from the buffer starting at
.IR buf .
POSIX requires that a \fBread()\fP which can be proved to occur after a
\fBwrite()\fP has returned returns the new data. Note that not all file
POSIX requires that a \fBread\fP() which can be proved to occur after a
\fBwrite\fP() has returned returns the new data. Note that not all file
systems are POSIX conforming.
.SH "RETURN VALUE"
On success, the number of bytes written are returned (zero indicates

View File

@ -37,15 +37,15 @@ abort \- cause abnormal program termination
.B void abort(void);
.fi
.SH DESCRIPTION
The \fBabort()\fP function causes abnormal program termination unless
The \fBabort\fP() function causes abnormal program termination unless
the signal SIGABRT is caught and the signal handler does not return.
If the \fBabort()\fP function causes program termination, all open
If the \fBabort\fP() function causes program termination, all open
streams are closed and flushed.
.PP
If the SIGABRT signal is blocked or ignored, the \fBabort()\fP
If the SIGABRT signal is blocked or ignored, the \fBabort\fP()
function will still override it.
.SH "RETURN VALUE"
The \fBabort()\fP function never returns.
The \fBabort\fP() function never returns.
.SH "CONFORMING TO"
SVID 3, POSIX, 4.3BSD, ISO 9899 (C99)
.SH "SEE ALSO"

View File

@ -47,8 +47,8 @@ abs, labs, llabs, imaxabs \- compute the absolute value of an integer
.BI "intmax_t imaxabs(intmax_t " j );
.fi
.SH DESCRIPTION
The \fBabs()\fP function computes the absolute value of the integer
argument \fIj\fP. The \fBlabs()\fP, \fBllabs()\fP and \fBimaxabs()\fP
The \fBabs\fP() function computes the absolute value of the integer
argument \fIj\fP. The \fBlabs\fP(), \fBllabs\fP() and \fBimaxabs\fP()
functions compute the absolute value of the argument \fIj\fP of the
appropriate integer type for the function.
.SH "RETURN VALUE"
@ -56,23 +56,23 @@ Returns the absolute value of the integer argument, of the appropriate
integer type for the function.
.SH "CONFORMING TO"
SVID 3, POSIX.1, 4.3BSD, ISO/IEC 9899 (C99). POSIX.1 (1996 edition) only
requires the \fBabs()\fP function. ISO/IEC 9899:1990 (C89) only
includes the \fBabs()\fP and \fBlabs()\fP functions; the functions
\fBllabs()\fP and \fBimaxabs()\fP were added in C99.
requires the \fBabs\fP() function. ISO/IEC 9899:1990 (C89) only
includes the \fBabs\fP() and \fBlabs\fP() functions; the functions
\fBllabs\fP() and \fBimaxabs\fP() were added in C99.
.SH NOTES
Trying to take the absolute value of the most negative integer
is not defined.
.PP
The \fBllabs()\fP function is included in glibc since version 2.0, but
is not in libc5 or libc4. The \fBimaxabs()\fP function is included in
The \fBllabs\fP() function is included in glibc since version 2.0, but
is not in libc5 or libc4. The \fBimaxabs\fP() function is included in
glibc since version 2.1.1.
.PP
For \fBllabs()\fP to be declared, it may be necessary to define
For \fBllabs\fP() to be declared, it may be necessary to define
\fB_ISOC99_SOURCE\fP or \fB_ISOC9X_SOURCE\fP (depending on the
version of glibc) before including any standard headers.
.PP
GCC handles \fBabs()\fP and \fBlabs()\fP as builtin functions. GCC
3.0 also handles \fBllabs()\fP and \fBimaxabs()\fP as builtins.
GCC handles \fBabs\fP() and \fBlabs\fP() as builtin functions. GCC
3.0 also handles \fBllabs\fP() and \fBimaxabs\fP() as builtins.
.SH "SEE ALSO"
.BR cabs (3),
.BR ceil (3),

View File

@ -42,11 +42,11 @@ acos, acosf, acosl \- arc cosine function
.sp
Link with \-lm.
.SH DESCRIPTION
The \fBacos()\fP function calculates the arc cosine of \fIx\fP; that is
The \fBacos\fP() function calculates the arc cosine of \fIx\fP; that is
the value whose cosine is \fIx\fP. If \fIx\fP falls outside the range
\-1 to 1, \fBacos()\fP fails and \fIerrno\fP is set.
\-1 to 1, \fBacos\fP() fails and \fIerrno\fP is set.
.SH "RETURN VALUE"
The \fBacos()\fP function returns the arc cosine in radians and the
The \fBacos\fP() function returns the arc cosine in radians and the
value is mathematically defined to be between 0 and PI (inclusive).
.SH ERRORS
.TP

View File

@ -44,9 +44,9 @@ acosh, acoshf, acoshl \- inverse hyperbolic cosine function
.fi
Link with \-lm.
.SH DESCRIPTION
The \fBacosh()\fP function calculates the inverse hyperbolic cosine of
The \fBacosh\fP() function calculates the inverse hyperbolic cosine of
\fIx\fP; that is the value whose hyperbolic cosine is \fIx\fP. If \fIx\fP
is less than 1.0, \fBacosh()\fP returns not-a-number (NaN) and \fIerrno\fP
is less than 1.0, \fBacosh\fP() returns not-a-number (NaN) and \fIerrno\fP
is set.
.SH ERRORS
.TP

View File

@ -78,7 +78,7 @@ so that
.BR free (3)
can be used to dispose of them again.
.LP
.B argz_add()
.BR argz_add ()
adds the string
.I str
at the end of the array
@ -88,7 +88,7 @@ and updates
and
.RI * argz_len .
.LP
.B argz_add_sep()
.BR argz_add_sep ()
is similar, but splits the string
.I str
into substrings separated by the delimiter
@ -96,7 +96,7 @@ into substrings separated by the delimiter
For example, one might use this on a Unix search path with
delimiter ':'.
.LP
.B argz_append()
.BR argz_append ()
appends the argz vector
.RI ( buf , buf_len )
after
@ -110,17 +110,17 @@ and
will be increased by
.IR buf_len .)
.LP
.B argz_count()
.BR argz_count ()
counts the number of strings, that is, the number of NUL bytes, in
.RI ( argz , argz_len ).
.LP
.B argz_create()
.BR argz_create ()
converts a Unix-style argument vector
.IR argv ,
terminated by (char *) 0, into an argz vector
.RI (* argz ,* argz_len ).
.LP
.B argz_create_sep()
.BR argz_create_sep ()
converts the NUL-terminated string
.I str
into an argz vector
@ -128,7 +128,7 @@ into an argz vector
by breaking it up at every occurrence of the separator
.IR sep .
.LP
.B argz_delete()
.BR argz_delete ()
removes the substring pointed to by
.I entry
from the argz vector
@ -138,9 +138,9 @@ and updates
and
.RI * argz_len .
.LP
.B argz_extract()
.BR argz_extract ()
is the opposite of
.BR argz_create() .
.BR argz_create ().
It takes the argz vector
.RI ( argz , argz_len )
and fills the array starting at
@ -153,9 +153,9 @@ must have room for
.IR argz_count ( argz , argz_len ") + 1"
pointers.
.LP
.B argz_insert()
.BR argz_insert ()
is the opposite of
.BR argz_delete() .
.BR argz_delete ().
It inserts the argument
.I entry
at position
@ -172,13 +172,13 @@ is NULL, then
.I entry
will inserted at the end.
.LP
.B argz_next()
.BR argz_next ()
is a function to step trough the argz vector. If
.I entry
is NULL, the first entry is returned. Otherwise, the entry
following is returned. It returns NULL if there is no following entry.
.LP
.B argz_replace()
.BR argz_replace ()
replaces each occurrence of
.I str
with
@ -189,9 +189,9 @@ is non-NULL,
.RI * replace_count
will be incremented by the number of replacements.
.LP
.B argz_stringify()
.BR argz_stringify ()
is the opposite of
.BR argz_create_sep() .
.BR argz_create_sep ().
It transforms the argz vector into a normal string by replacing
all NULs except the last by
.IR sep .

View File

@ -44,11 +44,11 @@ asin, asinf, asinl \- arc sine function
.sp
Link with \-lm.
.SH DESCRIPTION
The \fBasin()\fP function calculates the arc sine of \fIx\fP; that is
The \fBasin\fP() function calculates the arc sine of \fIx\fP; that is
the value whose sine is \fIx\fP. If \fIx\fP falls outside the range
\-1 to 1, \fBasin()\fP fails and \fIerrno\fP is set.
\-1 to 1, \fBasin\fP() fails and \fIerrno\fP is set.
.SH "RETURN VALUE"
The \fBasin()\fP function returns the arc sine in radians and the
The \fBasin\fP() function returns the arc sine in radians and the
value is mathematically defined to be between \-PI/2 and PI/2
(inclusive).
.SH ERRORS

View File

@ -44,7 +44,7 @@ asinh, asinhf, asinhl \- inverse hyperbolic sine function
.sp
Link with \-lm.
.SH DESCRIPTION
The \fBasinh()\fP function calculates the inverse hyperbolic sine of
The \fBasinh\fP() function calculates the inverse hyperbolic sine of
\fIx\fP; that is the value whose hyperbolic sine is \fIx\fP.
.SH "CONFORMING TO"
SVID 3, POSIX, 4.3BSD, ISO 9899.

View File

@ -37,13 +37,13 @@ If the macro
was defined at the moment
.B <assert.h>
was last included, the macro
.B assert()
.BR assert ()
generates no code, and hence does nothing at all.
Otherwise, the macro
.B assert()
.BR assert ()
prints an error message to standard error and terminates the program
by calling
.B abort()
.BR abort ()
if
.I expression
is false (i.e., compares equal to zero).
@ -62,7 +62,7 @@ and undefined behavior results if it is not, but in the 1999 standard
it may have any scalar type.
.\" See Defect Report 107 for more details.
.SH BUGS
.B assert()
.BR assert ()
is implemented as a macro; if the expression tested has side-effects,
program behaviour will be different depending on whether
.B NDEBUG

View File

@ -38,13 +38,13 @@ If the macro
was defined at the moment
.B <assert.h>
was last included, the macro
.B assert_perror()
.BR assert_perror ()
generates no code, and hence does nothing at all.
Otherwise, the macro
.B assert_perror()
.BR assert_perror ()
prints an error message to standard output and terminates the program
by calling
.B abort()
.BR abort ()
if
.I errnum
is non-zero. The message contains the filename, function name and

View File

@ -44,10 +44,10 @@ atan, atanf, atanl \- arc tangent function
.fi
Link with \-lm.
.SH DESCRIPTION
The \fBatan()\fP function calculates the arc tangent of \fIx\fP; that is
The \fBatan\fP() function calculates the arc tangent of \fIx\fP; that is
the value whose tangent is \fIx\fP.
.SH "RETURN VALUE"
The \fBatan()\fP function returns the arc tangent in radians and the
The \fBatan\fP() function returns the arc tangent in radians and the
value is mathematically defined to be between \-PI/2 and PI/2
(inclusive).
.SH "CONFORMING TO"

View File

@ -44,12 +44,12 @@ atan2, atan2f, atan2l \- arc tangent function of two variables
.fi
Link with \-lm.
.SH DESCRIPTION
The \fBatan2()\fP function calculates the arc tangent of the two
The \fBatan2\fP() function calculates the arc tangent of the two
variables \fIx\fP and \fIy\fP. It is similar to calculating the
arc tangent of \fIy\fP / \fIx\fP, except that the signs of both
arguments are used to determine the quadrant of the result.
.SH "RETURN VALUE"
The \fBatan2()\fP function returns the result in radians, which
The \fBatan2\fP() function returns the result in radians, which
is between \-PI and PI (inclusive).
.SH "CONFORMING TO"
SVID 3, POSIX, 4.3BSD, ISO 9899.

View File

@ -44,9 +44,9 @@ atanh, atanhf, atanhl \- inverse hyperbolic tangent function
.fi
Link with \-lm.
.SH DESCRIPTION
The \fBatanh()\fP function calculates the inverse hyperbolic tangent of
The \fBatanh\fP() function calculates the inverse hyperbolic tangent of
\fIx\fP; that is the value whose hyperbolic tangent is \fIx\fP. If the
absolute value of \fIx\fP is greater than 1.0, \fBatanh()\fP returns
absolute value of \fIx\fP is greater than 1.0, \fBatanh\fP() returns
not-a-number (NaN) and \fIerrno\fP is set.
.SH ERRORS
.TP

View File

@ -36,14 +36,14 @@ atof \- convert a string to a double
.BI "double atof(const char *" nptr );
.fi
.SH DESCRIPTION
The \fBatof()\fP function converts the initial portion of the string
The \fBatof\fP() function converts the initial portion of the string
pointed to by \fInptr\fP to double. The behaviour is the same as
.sp
.RS
.B strtod(nptr, (char **)NULL);
.RE
.sp
except that \fBatof()\fP does not detect errors.
except that \fBatof\fP() does not detect errors.
.SH "RETURN VALUE"
The converted value.
.SH "CONFORMING TO"

View File

@ -44,7 +44,7 @@ atoi, atol, atoll, atoq \- convert a string to an integer
.BI "long long atoq(const char *" nptr );
.fi
.SH DESCRIPTION
The \fBatoi()\fP function converts the initial portion of the string
The \fBatoi\fP() function converts the initial portion of the string
pointed to by \fInptr\fP to
.IR int .
The behaviour is the same as
@ -53,23 +53,23 @@ The behaviour is the same as
.B strtol(nptr, (char **)NULL, 10);
.RE
.sp
except that \fBatoi()\fP does not detect errors.
except that \fBatoi\fP() does not detect errors.
.PP
The \fBatol()\fP and \fBatoll()\fP functions behave the same as
\fBatoi()\fR, except that they convert the initial portion of the
The \fBatol\fP() and \fBatoll\fP() functions behave the same as
\fBatoi\fR(), except that they convert the initial portion of the
string to their return type of \fIlong\fP or \fIlong long\fP.
\fBatoq()\fP is an obsolete name for \fBatoll()\fP.
\fBatoq\fP() is an obsolete name for \fBatoll\fP().
.SH "RETURN VALUE"
The converted value.
.SH "CONFORMING TO"
SVID 3, POSIX.1, 4.3BSD, ISO/IEC 9899. ISO/IEC 9899:1990 (C89) and
POSIX.1 (1996 edition) include the functions \fBatoi()\fP and
\fBatol()\fP only; C99 adds the function \fBatoll()\fP.
POSIX.1 (1996 edition) include the functions \fBatoi\fP() and
\fBatol\fP() only; C99 adds the function \fBatoll\fP().
.SH NOTES
The non-standard \fBatoq()\fP function is not present in libc 4.6.27
The non-standard \fBatoq\fP() function is not present in libc 4.6.27
or glibc 2, but is present in libc5 and libc 4.7 (though only as an
inline function in \fB<stdlib.h>\fP until libc 5.4.44). The
\fBatoll()\fP function is present in glibc 2 since version 2.0.2, but
\fBatoll\fP() function is present in glibc 2 since version 2.0.2, but
not in libc4 or libc5.
.SH "SEE ALSO"
.BR atof (3),

View File

@ -37,7 +37,7 @@ bcmp \- compare byte sequences
.fi
.SH DESCRIPTION
The
.B bcmp()
.BR bcmp ()
function compares the two byte sequences
.I s1
and
@ -47,11 +47,11 @@ of length
each. If they are equal, and in particular if
.I n
is zero,
.B bcmp()
.BR bcmp ()
returns 0. Otherwise it returns a non-zero result.
.SH "RETURN VALUE"
The
.B bcmp()
.BR bcmp ()
function returns 0 if the byte sequences are equal,
otherwise a non-zero result is returned.
.SH "CONFORMING TO"

View File

@ -39,7 +39,7 @@ bcopy \- copy byte sequence
.fi
.SH DESCRIPTION
The
.B bcopy()
.BR bcopy ()
function copies
.I n
bytes from

View File

@ -13,7 +13,7 @@ bindresvport \- bind a socket to a privileged IP port
.fi
.SH DESCRIPTION
.LP
.B bindresvport()
.BR bindresvport ()
is used to bind a socket descriptor to a privileged
.SM IP
port, that is, a

View File

@ -39,7 +39,7 @@ bsearch \- binary search of a sorted array
.RE
.fi
.SH DESCRIPTION
The \fBbsearch()\fP function searches an array of \fInmemb\fP objects,
The \fBbsearch\fP() function searches an array of \fInmemb\fP objects,
the initial member of which is pointed to by \fIbase\fP, for a member
that matches the object pointed to by \fIkey\fP. The size of each member
of the array is specified by \fIsize\fP.
@ -52,14 +52,14 @@ less than, equal to, or greater than zero if the \fIkey\fP object is found,
respectively, to be less than, to match, or be greater than the array
member.
.SH "RETURN VALUE"
The \fBbsearch()\fP function returns a pointer to a matching member of the
The \fBbsearch\fP() function returns a pointer to a matching member of the
array, or NULL if no match is found. If there are multiple elements that
match the key, the element returned is unspecified.
.SH EXAMPLE
The example below first sorts an array of structures using
.BR qsort (3),
then retrieves desired elements using
.BR bsearch() .
.BR bsearch ().
.sp
.nf
#include <stdio.h>

View File

@ -44,16 +44,16 @@ byte order
.BI "uint16_t ntohs(uint16_t " netshort );
.fi
.SH DESCRIPTION
The \fBhtonl()\fP function converts the unsigned integer \fIhostlong\fP
The \fBhtonl\fP() function converts the unsigned integer \fIhostlong\fP
from host byte order to network byte order.
.PP
The \fBhtons()\fP function converts the unsigned short integer \fIhostshort\fP
The \fBhtons\fP() function converts the unsigned short integer \fIhostshort\fP
from host byte order to network byte order.
.PP
The \fBntohl()\fP function converts the unsigned integer \fInetlong\fP
The \fBntohl\fP() function converts the unsigned integer \fInetlong\fP
from network byte order to host byte order.
.PP
The \fBntohs()\fP function converts the unsigned short integer \fInetshort\fP
The \fBntohs\fP() function converts the unsigned short integer \fInetshort\fP
from network byte order to host byte order.
.PP
On the i80x86 the host byte order is Least Significant Byte first,

View File

@ -37,7 +37,7 @@ bzero \- write zero bytes
.fi
.SH DESCRIPTION
The
.B bzero()
.BR bzero ()
function sets the first
.I n
bytes of the byte area starting at

View File

@ -35,7 +35,7 @@ catgets \- get message from a message catalog
.BI "char *catgets(nl_catd " catalog ", int " set_number ,
.BI "int " message_number ", const char *" message );
.SH DESCRIPTION
.B catgets()
.BR catgets ()
reads the message
.IR message_number ,
in set
@ -49,7 +49,7 @@ is a catalog descriptor returned from an earlier call to
The fourth argument
.I message
points to a default message string which will be returned by
.B catgets()
.BR catgets ()
if the identified message catalog is not currently available. The
message-text is contained in an internal buffer area and should be copied by
the application if it is to be saved or modified. The return string is
@ -57,11 +57,11 @@ always terminated with a null byte.
.SH "RETURN VALUE"
.LP
On success,
.B catgets()
.BR catgets ()
returns a pointer to an internal buffer area
containing the null-terminated message string.
On failure,
.B catgets()
.BR catgets ()
returns the value
.IR message .
.SH NOTES

View File

@ -34,7 +34,7 @@ catopen, catclose \- open/close a message catalog
.BI "int catclose(nl_catd " catalog );
.SH DESCRIPTION
The function
.B catopen()
.BR catopen ()
opens a message catalog and returns a catalog descriptor.
The descriptor remains valid until catclose() or exec().
If a file descriptor is used to implement catalog descriptors
@ -83,7 +83,7 @@ open catalog descriptors.
The
.I flag
argument to
.B catopen()
.BR catopen ()
is used to indicate the source for the language to use.
If it is set to
.B NL_CAT_LOCALE
@ -94,7 +94,7 @@ Otherwise it will use the
environment variable.
.LP
The function
.B catclose()
.BR catclose ()
closes the message catalog identified by
.IR catalog .
It invalidates any subsequent references to the message catalog
@ -103,7 +103,7 @@ defined by
.LP
.SH "RETURN VALUE"
The function
.B catopen()
.BR catopen ()
returns a message catalog descriptor of type
.I nl_catd
on success.
@ -112,11 +112,11 @@ and sets
.I errno
to indicate the error. The possible error values include all
possible values for the
.I open()
.IR open ()
call.
.LP
The function
.B catclose()
.BR catclose ()
returns 0 on success, or \-1 on failure.
.SH ENVIRONMENT
.TP
@ -145,7 +145,7 @@ is a mmap()'ed area of memory and not a file descriptor.
The
.I flag
argument to
.B catopen()
.BR catopen ()
should be either
.B MCLoadBySet
(=0) or

View File

@ -41,11 +41,11 @@ cbrt, cbrtf, cbrtl \- cube root function
.sp
Link with \-lm.
.SH DESCRIPTION
The \fBcbrt()\fP function returns the (real) cube root of \fIx\fP.
The \fBcbrt\fP() function returns the (real) cube root of \fIx\fP.
This function cannot fail; every representable real value has a
representable real cube root.
.SH "CONFORMING TO"
.B cbrt()
.BR cbrt ()
was a GNU extension. It is now a C99 requirement.
.SH "SEE ALSO"
.BR pow (3),

View File

@ -58,7 +58,7 @@ the maximum value of the exponent is 128 (resp. 1024), and the number
of mantissa bits is 24 (resp. 53).)
.SH "CONFORMING TO"
The
.B ceil()
.BR ceil ()
function conforms to SVID 3, POSIX, 4.3BSD, ISO 9899.
The other functions are from C99.
.SH "SEE ALSO"

View File

@ -46,7 +46,7 @@ This function should never be used. Use
instead.
.SS "1-arg cfree"
In glibc, the function
.B cfree()
.BR cfree ()
is a synonym for
.BR free (3),
"added for compatibility with SunOS".
@ -59,7 +59,7 @@ and sometimes in
.LP
.SS "3-arg cfree"
Some SCO and Solaris versions have malloc libraries with a 3-argument
.BR cfree() ,
.BR cfree (),
apparently as an analog to
.BR calloc (3).
.LP
@ -72,22 +72,22 @@ If you need it while porting something, add
to your file.
.LP
A frequently asked question is "Can I use
.B free()
.BR free ()
to free memory allocated with
.BR calloc() ,
.BR calloc (),
or do I need
.BR cfree() ?"
Answer: use
.BR free() .
.BR free ().
.LP
An SCO manual writes: "The cfree routine is provided for compliance
to the iBCSe2 standard and simply calls free. The num and size
arguments to cfree are not used."
.SH "RETURN VALUE"
The SunOS version of
.B cfree()
.BR cfree ()
(which is a synonym for
.BR free() )
.BR free ())
returns 1 on success and 0 on failure.
In case of error,
.I errno
@ -97,6 +97,6 @@ was not a pointer to a block previously allocated by
one of the routines in the malloc() family.
.SH "CONFORMING TO"
The 3-argument version of
.B cfree()
.BR cfree ()
as used by SCO conforms to the iBCSe2 standard:
Intel386 Binary Compatibility Specification, Edition 2.

View File

@ -31,13 +31,13 @@ clearenv \- clear the environment
.BI "int clearenv(void);"
.fi
.SH DESCRIPTION
The \fBclearenv()\fP function clears the environment of all name-value
The \fBclearenv\fP() function clears the environment of all name-value
pairs and sets the value of the external variable
.I environ
to NULL.
.SH "RETURN VALUE"
The \fBclearenv()\fP function returns zero on success, and a non-zero
The \fBclearenv\fP() function returns zero on success, and a non-zero
value on failure.
.\" Most versions of Unix return -1 on error, or do not even have errors.
.\" Glibc info and the Watcom C library document "a non-zero value".
@ -48,10 +48,10 @@ Not in libc4, libc5. In glibc since glibc 2.0.
.SH "CONFORMING TO"
Various Unix variants (DGUX, HPUX, QNX, ...).
POSIX.9 (bindings for FORTRAN77).
POSIX.1-1996 did not accept \fBclearenv()\fP and \fIputenv()\fP,
POSIX.1-1996 did not accept \fBclearenv\fP() and \fIputenv\fP(),
but changed its mind and scheduled these functions for some
later issue of this standard (cf. B.4.6.1). However, SUSv3
only adds \fIputenv()\fP, and rejected \fBclearenv()\fP.
only adds \fIputenv\fP(), and rejected \fBclearenv\fP().
.SH NOTES
Used in security-conscious applications. If it is unavailable
@ -66,12 +66,12 @@ will probably do.
The DGUX and Tru64 manpages write: If
.I environ
has been modified by anything other than the
.IR putenv() ,
.IR getenv() ,
.IR putenv (),
.IR getenv (),
or
.IR clearenv()
.IR clearenv ()
functions, then
.BR clearenv()
.BR clearenv ()
will return an error and the process environment will remain unchanged.
.\" .LP
.\" HPUX has a ENOMEM error return.

View File

@ -35,7 +35,7 @@ clock \- Determine processor time
.fi
.SH DESCRIPTION
The
.B clock()
.BR clock ()
function returns an approximation of processor time used by the program.
.SH "RETURN VALUE"
The value returned is the CPU time used so far as a
@ -51,7 +51,7 @@ of the actual resolution.
.SH NOTES
The C standard allows for arbitrary values at the start of the program;
subtract the value returned from a call to
.B clock()
.BR clock ()
at the start of the program to get maximum portability.
.PP
Note that the time can wrap around. On a 32bit system where
@ -73,7 +73,7 @@ value returned by
.\" POSIX 1003.1-2001 doesn't explicitly allow this, nor is there an
.\" explicit prohibition. -- MTK
The
.B times()
.BR times ()
function, which explicitly returns (separate) information about the
caller and its children, may be preferable.
.SH "SEE ALSO"

View File

@ -38,11 +38,11 @@ closedir \- close a directory
.BI "int closedir(DIR *" dir );
.fi
.SH DESCRIPTION
The \fBclosedir()\fP function closes the directory stream associated with
The \fBclosedir\fP() function closes the directory stream associated with
\fIdir\fP. The directory stream descriptor \fIdir\fP is not available
after this call.
.SH "RETURN VALUE"
The \fBclosedir()\fP function returns 0 on success.
The \fBclosedir\fP() function returns 0 on success.
On error, \-1 is returned, and
.I errno
is set appropriately.

View File

@ -40,7 +40,7 @@ or
.BI "size_t confstr(int " "name" ", char *" buf ", size_t " len );
.fi
.SH DESCRIPTION
.B confstr()
.BR confstr ()
gets the value of configuration-dependent string variables.
.PP
The
@ -69,14 +69,14 @@ is not
and
.I len
is not zero,
.B confstr()
.BR confstr ()
copies the value of the string to
.I buf
truncated to
.I len \- 1
characters if necessary, with a null character as termination.
This can be detected by comparing the return value of
.B confstr()
.BR confstr ()
against
.IR len .
.PP
@ -86,13 +86,13 @@ is zero and
.I buf
is
.BR NULL ,
.B confstr()
.BR confstr ()
just returns the value as defined below.
.SH "RETURN VALUE"
If
.I name
does not correspond to a valid configuration variable,
.B confstr()
.BR confstr ()
returns 0.
.SH EXAMPLES
The following code fragment determines the path where to find

View File

@ -42,11 +42,11 @@ copysign, copysignf, copysignl \- copy sign of a number
.sp
Link with \-lm.
.SH DESCRIPTION
The \fBcopysign()\fP functions return a value whose absolute value matches
The \fBcopysign\fP() functions return a value whose absolute value matches
that of \fIx\fP, but whose sign matches that of \fIy\fP.
If \fIx\fP is a NaN, then a NaN with the sign of \fIy\fP is returned.
.SH NOTES
The \fBcopysign()\fP functions may treat a negative zero as positive.
The \fBcopysign\fP() functions may treat a negative zero as positive.
.SH "CONFORMING TO"
C99, 4.3BSD.
This function is defined in IEC 559 (and the appendix with

View File

@ -43,10 +43,10 @@ cos, cosf, cosl \- cosine function
.sp
Link with \-lm.
.SH DESCRIPTION
The \fBcos()\fP function returns the cosine of \fIx\fP, where \fIx\fP is
The \fBcos\fP() function returns the cosine of \fIx\fP, where \fIx\fP is
given in radians.
.SH "RETURN VALUE"
The \fBcos()\fP function returns a value between \-1 and 1.
The \fBcos\fP() function returns a value between \-1 and 1.
.SH "CONFORMING TO"
SVID 3, POSIX, 4.3BSD, ISO 9899.
The float and the long double variants are C99 requirements.

View File

@ -45,7 +45,7 @@ cosh, coshf, coshl \- hyperbolic cosine function
.sp
Link with \-lm.
.SH DESCRIPTION
The \fBcosh()\fP function returns the hyperbolic cosine of \fIx\fP, which
The \fBcosh\fP() function returns the hyperbolic cosine of \fIx\fP, which
is defined mathematically as (exp(x) + exp(\-x)) / 2.
.SH "CONFORMING TO"
SVID 3, POSIX, 4.3BSD, ISO 9899 (C99).

View File

@ -31,7 +31,7 @@ ctermid \- get controlling terminal name
.BI "char *ctermid(char *" "s" );
.fi
.SH DESCRIPTION
.B ctermid()
.BR ctermid ()
returns a string which is the pathname for the current controlling terminal for this
process.
If

View File

@ -57,13 +57,13 @@ localtime_r \- transform date and time to broken-down time or ASCII
.BI "time_t mktime(struct tm *" tm );
.fi
.SH DESCRIPTION
The \fBctime()\fP, \fBgmtime()\fP and \fBlocaltime()\fP functions all take
The \fBctime\fP(), \fBgmtime\fP() and \fBlocaltime\fP() functions all take
an argument of data type \fItime_t\fP which represents calendar time.
When interpreted as an absolute time value, it represents the number of
seconds elapsed since 00:00:00 on January 1, 1970, Coordinated Universal
Time (UTC).
.PP
The \fBasctime()\fP and \fBmktime()\fP functions both take an argument
The \fBasctime\fP() and \fBmktime\fP() functions both take an argument
representing broken-down time which is a representation
separated into year, month, day, etc.
.PP
@ -140,19 +140,19 @@ might be overwritten by subsequent calls to any of the date and time
functions. The function also sets the external variable \fItzname\fP (see
.BR tzset (3))
with information about the current time zone.
The re-entrant version \fBctime_r()\fP does the same, but stores the
The re-entrant version \fBctime_r\fP() does the same, but stores the
string in a user-supplied buffer of length at least 26. It need not
set \fItzname\fP.
.PP
The \fBgmtime()\fP function converts the calendar time \fItimep\fP to
The \fBgmtime\fP() function converts the calendar time \fItimep\fP to
broken-down time representation, expressed in Coordinated Universal Time
(UTC). It may return NULL when the year does not fit into an integer.
The return value points to a statically allocated struct which might be
overwritten by subsequent calls to any of the date and time functions.
The \fBgmtime_r()\fP function does the same, but stores the data in a
The \fBgmtime_r\fP() function does the same, but stores the data in a
user-supplied struct.
.PP
The \fBlocaltime()\fP function converts the calendar time \fItimep\fP to
The \fBlocaltime\fP() function converts the calendar time \fItimep\fP to
broken-time representation, expressed relative to the user's specified
time zone. The function acts as if it called
.BR tzset (3)
@ -163,45 +163,45 @@ seconds, and \fIdaylight\fP to a non-zero value if daylight savings
time rules apply during some part of the year.
The return value points to a statically allocated struct which might be
overwritten by subsequent calls to any of the date and time functions.
The \fBlocaltime_r()\fP function does the same, but stores the data in a
The \fBlocaltime_r\fP() function does the same, but stores the data in a
user-supplied struct. It need not set \fItzname\fP.
.PP
The \fBasctime()\fP function converts the broken-down time value
\fItm\fP into a string with the same format as \fBctime()\fP.
The \fBasctime\fP() function converts the broken-down time value
\fItm\fP into a string with the same format as \fBctime\fP().
The return value points to a statically allocated string which might be
overwritten by subsequent calls to any of the date and time functions.
The \fBasctime_r()\fP function does the same, but stores the string in
The \fBasctime_r\fP() function does the same, but stores the string in
a user-supplied buffer of length at least 26.
.PP
The \fBmktime()\fP function converts a broken-down time structure, expressed
The \fBmktime\fP() function converts a broken-down time structure, expressed
as local time, to calendar time representation. The function ignores
the specified contents of the structure members \fItm_wday\fP and \fItm_yday\fP
and recomputes them from the other information in the broken-down time
structure.
If structure members are outside their legal interval, they will be
normalized (so that, e.g., 40 October is changed into 9 November).
Calling \fBmktime()\fP also sets the external variable \fItzname\fP with
Calling \fBmktime\fP() also sets the external variable \fItzname\fP with
information about the current time zone. If the specified broken-down
time cannot be represented as calendar time (seconds since the epoch),
\fBmktime()\fP returns a value of (time_t)(\-1) and does not alter the
\fBmktime\fP() returns a value of (time_t)(\-1) and does not alter the
\fItm_wday\fP and \fItm_yday\fP members of the broken-down time structure.
.SH "RETURN VALUE"
Each of these functions returns the value described, or NULL
(\-1 in case of \fBmktime()\fP) in case an error was detected.
(\-1 in case of \fBmktime\fP()) in case an error was detected.
.SH NOTES
The four functions
.BR asctime() ,
.BR ctime() ,
.B gmtime()
.BR asctime (),
.BR ctime (),
.BR gmtime ()
and
.B localtime()
.BR localtime ()
return a pointer to static data and hence are not thread-safe.
Thread-safe versions
.BR asctime_r() ,
.BR ctime_r() ,
.B gmtime_r()
.BR asctime_r (),
.BR ctime_r (),
.BR gmtime_r ()
and
.BR localtime_r()
.BR localtime_r ()
are specified by SUSv2, and available since libc 5.2.5.
.LP
In many implementations, including

View File

@ -58,7 +58,7 @@ will redirect standard input, standard output and standard error
to \fI/dev/null\fP.
.SH "RETURN VALUE"
(This function forks, and if the
.B fork()
.BR fork ()
succeeds, the parent does
.\" not .IR in order not to underline _
.BR _exit (0),

View File

@ -35,7 +35,7 @@ difftime \- calculate time difference
.BI "double difftime(time_t " time1 ", time_t " time0 );
.fi
.SH DESCRIPTION
The \fBdifftime()\fP function returns the number of seconds elapsed
The \fBdifftime\fP() function returns the number of seconds elapsed
between time \fItime1\fP and time \fItime0\fP, represented as a double.
The two times are specified in calendar time, which represents the time
elapsed since the Epoch

View File

@ -31,7 +31,7 @@ dirfd \- get directory stream file descriptor
.BI "int dirfd(DIR *" dir );
.SH DESCRIPTION
The function
.B dirfd()
.BR dirfd ()
returns the file descriptor associated with the directory stream
.IR dir .
.LP

View File

@ -47,13 +47,13 @@ div, ldiv, lldiv, imaxdiv \- compute quotient and remainder of an integer divisi
.BI "imaxdiv_t imaxdiv(intmax_t " numerator ", intmax_t " denominator );
.fi
.SH DESCRIPTION
The \fBdiv()\fP function computes the value \fInumerator\fP/\fIdenominator\fP and
The \fBdiv\fP() function computes the value \fInumerator\fP/\fIdenominator\fP and
returns the quotient and remainder in a structure named \fIdiv_t\fP that contains
two integer members (in unspecified order) named \fIquot\fP and \fIrem\fP.
The quotient is rounded towards zero.
The result satisfies \fIquot\fP*\fIdenominator\fP+\fIrem\fP = \fInumerator\fP.
.LP
The \fBldiv()\fP and \fBlldiv()\fP and \fBimaxdiv()\fP functions do the same,
The \fBldiv\fP() and \fBlldiv\fP() and \fBimaxdiv\fP() functions do the same,
dividing numbers of the indicated type and returning the result in a structure
of the indicated name, in all cases with fields \fIquot\fP and \fIrem\fP
of the same type as the function arguments.

View File

@ -82,7 +82,7 @@ argument is a structure of the following type:
.fi
(The
.I ElfW()
.IR ElfW ()
macro definition turns its argument into the name of an ELF data
type suitable for the hardware architecture.
For example, on a 32-bit platform,

View File

@ -55,20 +55,20 @@ lcong48 \- generate uniformly distributed pseudo-random numbers
These functions generate pseudo-random numbers using the linear congruential
algorithm and 48-bit integer arithmetic.
.PP
The \fBdrand48()\fP and \fBerand48()\fP functions return non-negative
The \fBdrand48\fP() and \fBerand48\fP() functions return non-negative
double-precision floating-point values uniformly distributed between
[0.0, 1.0).
.PP
The \fBlrand48()\fP and \fBnrand48()\fP functions return non-negative
The \fBlrand48\fP() and \fBnrand48\fP() functions return non-negative
long integers uniformly distributed between 0 and 2^31.
.PP
The \fBmrand48()\fP and \fBjrand48()\fP functions return signed long
The \fBmrand48\fP() and \fBjrand48\fP() functions return signed long
integers uniformly distributed between \-2^31 and 2^31.
.PP
The \fBsrand48()\fP, \fBseed48()\fP and \fBlcong48()\fP functions are
The \fBsrand48\fP(), \fBseed48\fP() and \fBlcong48\fP() functions are
initialization functions, one of which should be called before using
\fBdrand48()\fP, \fBlrand48()\fP or \fBmrand48()\fP. The functions
\fBerand48()\fP, \fBnrand48()\fP and \fBjrand48()\fP do not require
\fBdrand48\fP(), \fBlrand48\fP() or \fBmrand48\fP(). The functions
\fBerand48\fP(), \fBnrand48\fP() and \fBjrand48\fP() do not require
an initialization function to be called first.
.PP
All the functions work by generating a sequence of 48-bit integers,
@ -81,7 +81,7 @@ All the functions work by generating a sequence of 48-bit integers,
.fi
.sp
The parameter \fIm\fP = 2^48, hence 48-bit integer arithmetic is performed.
Unless \fBlcong48()\fP is called, \fIa\fP and \fIc\fP are given by:
Unless \fBlcong48\fP() is called, \fIa\fP and \fIc\fP are given by:
.sp
.nf
.RS
@ -90,36 +90,36 @@ Unless \fBlcong48()\fP is called, \fIa\fP and \fIc\fP are given by:
.RE
.fi
.sp
The value returned by any of the functions \fBdrand48()\fP, \fBerand48()\fP,
\fBlrand48()\fP, \fBnrand48()\fP, \fBmrand48()\fP or \fBjrand48()\fP is
The value returned by any of the functions \fBdrand48\fP(), \fBerand48\fP(),
\fBlrand48\fP(), \fBnrand48\fP(), \fBmrand48\fP() or \fBjrand48\fP() is
computed by first generating the next 48-bit \fIXi\fP in the sequence.
Then the appropriate number of bits, according to the type of data item to
be returned, is copied from the high-order bits of \fIXi\fP and transformed
into the returned value.
.PP
The functions \fBdrand48()\fP, \fBlrand48()\fP and \fBmrand48()\fP store
The functions \fBdrand48\fP(), \fBlrand48\fP() and \fBmrand48\fP() store
the last 48-bit \fIXi\fP generated in an internal buffer. The functions
\fBerand48()\fP, \fBnrand48()\fP and \fBjrand48()\fP require the calling
\fBerand48\fP(), \fBnrand48\fP() and \fBjrand48\fP() require the calling
program to provide storage for the successive \fIXi\fP values in the array
argument \fIxsubi\fP. The functions are initialized by placing the initial
value of \fIXi\fP into the array before calling the function for the first
time.
.PP
The initializer function \fBsrand48()\fP sets the high order 32-bits of
The initializer function \fBsrand48\fP() sets the high order 32-bits of
\fIXi\fP to the argument \fIseedval\fP. The low order 16-bits are set
to the arbitrary value 0x330E.
.PP
The initializer function \fBseed48()\fP sets the value of \fIXi\fP to
The initializer function \fBseed48\fP() sets the value of \fIXi\fP to
the 48-bit value specified in the array argument \fIseed16v\fP. The
previous value of \fIXi\fP is copied into an internal buffer and a
pointer to this buffer is returned by \fBseed48()\fP.
pointer to this buffer is returned by \fBseed48\fP().
.PP
The initialization function \fBlcong48()\fP allows the user to specify
The initialization function \fBlcong48\fP() allows the user to specify
initial values for \fIXi\fP, \fIa\fP and \fIc\fP. Array argument
elements \fIparam[0-2]\fP specify \fIXi\fP, \fIparam[3-5]\fP specify
\fIa\fP, and \fIparam[6]\fP specifies \fIc\fP. After \fBlcong48()\fP
has been called, a subsequent call to either \fBsrand48()\fP or
\fBseed48()\fP will restore the standard values of \fIa\fP and \fIc\fP.
\fIa\fP, and \fIparam[6]\fP specifies \fIc\fP. After \fBlcong48\fP()
has been called, a subsequent call to either \fBsrand48\fP() or
\fBseed48\fP() will restore the standard values of \fIa\fP and \fIc\fP.
.SH "CONFORMING TO"
SVID 3
.SH NOTES

View File

@ -68,10 +68,10 @@ the supplied data
Before the first use, this struct must be initialized, e.g.
by filling it with zeroes, or by calling one of the functions
.BR srand48_r() ,
.BR seed48_r() ,
.BR srand48_r (),
.BR seed48_r (),
or
.BR lcong48_r() .
.BR lcong48_r ().
.SH "RETURN VALUE"
The return value is 0.
.SH "CONFORMING TO"

View File

@ -39,7 +39,7 @@ ecvt, fcvt \- convert a floating-point number to a string
.BI "char *fcvt(double " number ", int " ndigits ", int *" decpt ,
.BI "int *" sign );
.SH DESCRIPTION
The \fBecvt()\fP function converts \fInumber\fP to a null-terminated
The \fBecvt\fP() function converts \fInumber\fP to a null-terminated
string of \fIndigits\fP digits (where \fIndigits\fP is reduced to an
system-specific limit determined by the precision of a double),
and returns a pointer to the string. The high-order digit is non-zero,
@ -55,13 +55,13 @@ it's set to 0. If
.I number
is zero, it is unspecified whether *\fIdecpt\fP is 0 or 1.
.PP
The \fBfcvt()\fP function is identical to \fBecvt()\fP, except that
The \fBfcvt\fP() function is identical to \fBecvt\fP(), except that
\fIndigits\fP specifies the number of digits after the decimal point.
.SH "RETURN VALUE"
Both the \fBecvt()\fP and \fBfcvt()\fP functions return a pointer to a
Both the \fBecvt\fP() and \fBfcvt\fP() functions return a pointer to a
static string containing the ASCII representation of \fInumber\fP.
The static string is overwritten by each call to \fBecvt()\fP or
\fBfcvt()\fP.
The static string is overwritten by each call to \fBecvt\fP() or
\fBfcvt\fP().
.SH NOTES
These functions are obsolete. Instead,
.IR sprintf ()

View File

@ -49,9 +49,9 @@ Each of these requires linking with
.BR \-lcrypt .
.SH DESCRIPTION
These functions encrypt and decrypt 64-bit messages. The
.B setkey()
.BR setkey ()
function sets the key used by
.BR encrypt() .
.BR encrypt ().
The
.I key
parameter used here is an array of 64 bytes, each of which has
@ -67,9 +67,9 @@ The result is returned in that same vector.
.PP
These two functions are not reentrant, that is, the key data is
kept in static storage. The functions
.B setkey_r()
.BR setkey_r ()
and
.B encrypt_r()
.BR encrypt_r ()
are the reentrant versions. They use the following
structure to hold the key data:
.RS
@ -88,7 +88,7 @@ struct crypt_data {
.fi
.RE
Before calling
.B setkey_r()
.BR setkey_r ()
set
.I data->initialized
to zero.
@ -124,14 +124,14 @@ main() {
In glibc2.2 these functions use the DES algorithm.
.SH "CONFORMING TO"
The functions
.B encrypt()
.BR encrypt ()
and
.B setkey()
.BR setkey ()
conform to SVID, SUSv2, and POSIX 1003.1-2001.
The functions
.B encrypt_r()
.BR encrypt_r ()
and
.B setkey_r()
.BR setkey_r ()
are GNU extensions.
.SH "SEE ALSO"
.BR cbc_crypt (3),

View File

@ -47,7 +47,7 @@ to be the value. If there is no '=', the value is taken to be NULL.
.LP
These functions are for handling envz vectors.
.LP
.B envz_add()
.BR envz_add ()
adds the string
.RI \&" name = value \&"
(in case
@ -66,14 +66,14 @@ If an entry with the same
.I name
existed, it is removed.
.LP
.B envz_entry()
.BR envz_entry ()
looks for
.I name
in the envz vector
.RI ( envz , envz_len )
and returns the entry if found, or NULL if not.
.LP
.B envz_get()
.BR envz_get ()
looks for
.I name
in the envz vector
@ -84,13 +84,13 @@ an entry for
.I name
without '=' sign.)
.LP
.B envz_merge()
.BR envz_merge ()
adds each entry in
.I envz2
to
.RI * envz ,
as if with
.BR envz_add() .
.BR envz_add ().
If
.I override
is true, then values in
@ -99,7 +99,7 @@ will supersede those with the same name in
.RI * envz ,
otherwise not.
.LP
.B envz_remove()
.BR envz_remove ()
removes the entry for
.I name
from

View File

@ -50,12 +50,12 @@ erf, erff, erfl, erfc, erfcf, erfcl \- error function and complementary error fu
.fi
Link with \-lm.
.SH DESCRIPTION
The \fBerf()\fP function returns the error function of \fIx\fP; defined
The \fBerf\fP() function returns the error function of \fIx\fP; defined
as
.TP
erf(x) = 2/sqrt(pi)* integral from 0 to x of exp(\-t*t) dt
.PP
The \fBerfc()\fP function returns the complementary error function of
The \fBerfc\fP() function returns the complementary error function of
\fIx\fP, that is 1.0 \- erf(x).
.SH "CONFORMING TO"
SVID 3, 4.3BSD, C99.

View File

@ -326,9 +326,9 @@ if (somecall() == \-1) {
where
.I errno
no longer needs to have the value it had upon return from
.IR somecall()
.IR somecall ()
(i.e., it may have been changed by the
.IR printf() ).
.IR printf ()).
If the value of
.I errno
should be preserved across a library call, it must be saved:

View File

@ -61,29 +61,29 @@ ether_ntoa_r, ether_aton_r \- Ethernet address manipulation routines
.BI "ether_aton_r(const char *" asc ", struct ether_addr *" addr );
.fi
.SH DESCRIPTION
\fBether_aton()\fP converts the 48-bit Ethernet host address \fIasc\fP
\fBether_aton\fP() converts the 48-bit Ethernet host address \fIasc\fP
from the standard hex-digits-and-colons notation into binary data in
network byte order and returns a pointer to it in a statically
allocated buffer, which subsequent calls will
overwrite. \fBether_aton\fP() returns NULL if the address is invalid.
.PP
The \fBether_ntoa()\fP function converts the Ethernet host address
The \fBether_ntoa\fP() function converts the Ethernet host address
\fIaddr\fP given in network byte order to a string in standard
hex-digits-and-colons notation, omitting leading zeroes.
The string is returned in a statically allocated buffer,
which subsequent calls will overwrite.
.PP
The \fBether_ntohost()\fP function maps an Ethernet address to the
The \fBether_ntohost\fP() function maps an Ethernet address to the
corresponding hostname in
.B /etc/ethers
and returns non-zero if it cannot be found.
.PP
The \fBether_hostton()\fP function maps a hostname to the
The \fBether_hostton\fP() function maps a hostname to the
corresponding Ethernet address in
.B /etc/ethers
and returns non-zero if it cannot be found.
.PP
The \fBether_line()\fP function parses a line in
The \fBether_line\fP() function parses a line in
.B /etc/ethers
format (ethernet address followed by whitespace followed by
hostname; '#' introduces a comment) and returns an address

View File

@ -45,7 +45,7 @@ exp, expf, expl \- base-e exponential function
.sp
Link with \-lm.
.SH DESCRIPTION
The \fBexp()\fP function returns the value of e (the base of natural
The \fBexp\fP() function returns the value of e (the base of natural
logarithms) raised to the power of \fIx\fP.
.SH "CONFORMING TO"
SVID 3, POSIX, 4.3BSD, ISO 9899.

View File

@ -46,7 +46,7 @@ exp10, exp10f, exp10l \- base-10 exponential function
.sp
Link with \-lm.
.SH DESCRIPTION
The \fBexp10()\fP function returns the value of 10
The \fBexp10\fP() function returns the value of 10
raised to the power of \fIx\fP.
.SH "CONFORMING TO"
The function is a GNU extension.

View File

@ -45,7 +45,7 @@ exp2, exp2f, exp2l \- base-2 exponential function
.sp
Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
The \fBexp2()\fP function returns the value of 2
The \fBexp2\fP() function returns the value of 2
raised to the power of \fIx\fP.
.SH "CONFORMING TO"
SVID 3, POSIX, 4.3BSD, ISO 9899.

View File

@ -49,7 +49,7 @@ number \fIx\fP.
No errors can occur.
.SH "CONFORMING TO"
The
.B fabs()
.BR fabs ()
function conforms to SVID 3, POSIX, 4.3BSD, ISO 9899.
The other functions are from C99.
.SH "SEE ALSO"

View File

@ -86,7 +86,7 @@ for any of the errors specified for the routine
.BR write (2).
.SH NOTES
Note that
.B fflush()
.BR fflush ()
only flushes the user space buffers provided by the C library.
To ensure that the data is physically stored on disk
the kernel buffers must be flushed too, e.g. with
@ -95,7 +95,7 @@ or
.BR fsync (2).
.SH "CONFORMING TO"
The function
.BR fflush()
.BR fflush ()
conforms to ANSI X3.159-1989 (``ANSI C'').
.SH "SEE ALSO"
.BR fsync (2),

View File

@ -46,12 +46,12 @@ ffs \- find first bit set in a word
.BI "int ffsll(long long int " i );
.fi
.SH DESCRIPTION
The \fBffs()\fP function returns the position of the first
The \fBffs\fP() function returns the position of the first
(least significant) bit set in the word \fIi\fP.
The least significant bit is position 1 and the
most significant position e.g. 32 or 64.
.BR
The functions \fBffsll()\fP and \fBffsl()\fP do the same but take
The functions \fBffsll\fP() and \fBffsl\fP() do the same but take
arguments of possibly different size.
.SH "RETURN VALUE"
These functions return the position of the first bit set,

View File

@ -37,7 +37,7 @@ fgetgrent \- get group file entry
.BI "struct group *fgetgrent(FILE *" stream );
.fi
.SH DESCRIPTION
The \fBfgetgrent()\fP function returns a pointer to a structure containing
The \fBfgetgrent\fP() function returns a pointer to a structure containing
the group information from the file \fIstream\fP. The first time it is called
it returns the first entry; thereafter, it returns successive entries. The
file \fIstream\fP must have the same format as \fI/etc/group\fP.
@ -57,7 +57,7 @@ struct group {
.fi
.RE
.SH "RETURN VALUE"
The \fBfgetgrent()\fP function returns the group information structure,
The \fBfgetgrent\fP() function returns the group information structure,
or NULL if there are no more entries or an error occurs.
.SH ERRORS
.TP

View File

@ -40,7 +40,7 @@ fgetpwent \- get password file entry
.BI "struct passwd *fgetpwent(FILE *" stream );
.fi
.SH DESCRIPTION
The \fBfgetpwent()\fP function returns a pointer to a structure containing
The \fBfgetpwent\fP() function returns a pointer to a structure containing
the broken out fields of a line in the file \fIstream\fP. The first time
it is called it returns the first entry; thereafter, it returns successive
entries. The file \fIstream\fP must have the same format as
@ -64,7 +64,7 @@ struct passwd {
.fi
.RE
.SH "RETURN VALUE"
The \fBfgetpwent()\fP function returns the passwd structure, or NULL if
The \fBfgetpwent\fP() function returns the passwd structure, or NULL if
there are no more entries or an error occurs.
.SH ERRORS
.TP

View File

@ -62,19 +62,19 @@ the non-locking versions of the stdio functions: with
\fIgetc_unlocked\fP() and \fIputc_unlocked\fP() instead of
\fIgetc\fP() and \fIputc\fP().
.LP
The \fBflockfile()\fP function waits for *\fIfilehandle\fP to be
The \fBflockfile\fP() function waits for *\fIfilehandle\fP to be
no longer locked by a different thread, then makes the
current thread owner of *\fIfilehandle\fP, and increments
the lockcount.
.LP
The \fBfunlockfile()\fP function decrements the lock count.
The \fBfunlockfile\fP() function decrements the lock count.
.LP
The \fBftrylockfile()\fP function is a non-blocking version
of \fBflockfile()\fP. It does nothing in case some other thread
The \fBftrylockfile\fP() function is a non-blocking version
of \fBflockfile\fP(). It does nothing in case some other thread
owns *\fIfilehandle\fP, and it obtains ownership and increments
the lockcount otherwise.
.SH "RETURN VALUE"
The \fBftrylockfile()\fP function returns zero for success
The \fBftrylockfile\fP() function returns zero for success
(the lock was obtained), and non-zero for failure.
.SH ERRORS
None.

View File

@ -58,7 +58,7 @@ the maximum value of the exponent is 128 (resp. 1024), and the number
of mantissa bits is 24 (resp. 53).)
.SH "CONFORMING TO"
The
.B floor()
.BR floor ()
function conforms to SVID 3, POSIX, 4.3BSD, ISO 9899.
The other functions are from C99.
.SH "SEE ALSO"

View File

@ -20,7 +20,7 @@ fma, fmaf, fmal \- floating-point multiply and add
Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
The
.B fma()
.BR fma ()
function computes
.IR x " * " y " + " z .
The result is rounded according to the

View File

@ -44,11 +44,11 @@ fmod, fmodf, fmodl \- floating-point remainder function
.sp
Link with \-lm.
.SH DESCRIPTION
The \fBfmod()\fP function computes the remainder of dividing \fIx\fP by
The \fBfmod\fP() function computes the remainder of dividing \fIx\fP by
\fIy\fP. The return value is \fIx\fP \- \fIn\fP * \fIy\fP, where \fIn\fP
is the quotient of \fIx\fP / \fIy\fP, rounded towards zero to an integer.
.SH "RETURN VALUE"
The \fBfmod()\fP function returns the remainder, unless \fIy\fP is zero,
The \fBfmod\fP() function returns the remainder, unless \fIy\fP is zero,
when the function fails and \fIerrno\fP is set.
.SH ERRORS
.TP

View File

@ -136,7 +136,7 @@ This value is printed as WARNING.
This value is printed as INFO.
.PP
The numeric values are between 0 and 4. Using
.B addseverity()
.BR addseverity ()
or the environment variable
.B SEV_LEVEL
you can add more levels and strings to print.
@ -174,22 +174,22 @@ severity-keyword,level,printstring
.RE
.sp
then
.I fmtmsg()
.IR fmtmsg ()
will also accept the indicated values for the level (in addition to
the standard levels 0-4), and use the indicated printstring when
such a level occurs.
.LP
The severity-keyword part is not used by
.I fmtmsg()
.IR fmtmsg ()
but it has to be present.
The level part is a string representation of a number.
The numeric value must be a number greater than 4.
This value must be used in the severity parameter of
.I fmtmsg()
.IR fmtmsg ()
to select this class. It is not possible to overwrite
any of the predefined classes. The printstring
is the string printed when a message of this class is processed by
.IR fmtmsg() .
.IR fmtmsg ().
.SH "RETURN VALUES"
The function can return 4 values:
.TP 12n
@ -207,16 +207,16 @@ Error writing to
Error writing to the console.
.SH "CONFORMING TO"
The functions
.I fmtmsg()
.IR fmtmsg ()
and
.IR addseverity() ,
.IR addseverity (),
and environment variables
.B MSGVERB
and
.B SEV_LEVEL
come from System V (XPG4-UNIX).
The function
.I fmtmsg()
.IR fmtmsg ()
and the environment variable
.B MSGVERB
are described in POSIX 1003.1-2001.

View File

@ -34,7 +34,7 @@ fnmatch \- match filename or pathname
.fi
.SH DESCRIPTION
The
.B fnmatch()
.BR fnmatch ()
function checks whether the
.I string
argument matches the

View File

@ -33,13 +33,13 @@ fpathconf, pathconf \- get configuration values for files
.BI "long pathconf(char *" path ", int " name );
.fi
.SH DESCRIPTION
.B fpathconf()
.BR fpathconf ()
gets a value for the configuration option
.I name
for the open file descriptor
.IR filedes .
.PP
.B pathconf()
.BR pathconf ()
gets a value for configuration option
.I name
for the file name
@ -49,9 +49,9 @@ The corresponding macros defined in
.B <unistd.h>
are minimum values; if an application wants to take advantage of values
which may change, a call to
.B fpathconf()
.BR fpathconf ()
or
.B pathconf()
.BR pathconf ()
can be made, which may yield more liberal results.
.PP
Setting

View File

@ -74,7 +74,7 @@ is positive infinity, and \-1 if
is negative infinity.
.SH NOTE
In glibc 2.01 and earlier,
.B isinf()
.BR isinf ()
returns a non-zero value (actually: 1) if
.I x
is an infinity (positive or negative).

View File

@ -39,7 +39,7 @@ fpurge, __fpurge \- purge a stream
.fi
.SH DESCRIPTION
The function
.B fpurge()
.BR fpurge ()
clears the buffers of the given stream.
For output streams this discards any unwritten output.
For input streams this discards any input read from the underlying object
@ -49,11 +49,11 @@ this includes any text pushed back via \fIungetc\fP(). See also
.BR fflush (3).
.LP
The function
.B __fpurge()
.BR __fpurge ()
does precisely the same, but without returning a value.
.SH "RETURN VALUE"
Upon successful completion
.B fpurge()
.BR fpurge ()
returns 0.
On error, it returns \-1 and sets
.I errno

View File

@ -45,10 +45,10 @@ and integral components
.sp
Link with \-lm.
.SH DESCRIPTION
The \fBfrexp()\fP function is used to split the number \fIx\fP into a
The \fBfrexp\fP() function is used to split the number \fIx\fP into a
normalized fraction and an exponent which is stored in \fIexp\fP.
.SH "RETURN VALUE"
The \fBfrexp()\fP function returns the normalized fraction. If the
The \fBfrexp\fP() function returns the normalized fraction. If the
argument \fIx\fP is not zero, the normalized fraction is \fIx\fP
times a power of two, and is always in the range 1/2 (inclusive) to
1 (exclusive). If \fIx\fP is zero, then the normalized fraction is

View File

@ -33,11 +33,11 @@ fseeko, ftello \- seek to or report file position
.BI
.fi
.SH DESCRIPTION
The \fBfseeko()\fP and \fBftello()\fP functions are identical to
\fBfseek()\fP and \fBftell()\fP (see
The \fBfseeko\fP() and \fBftello\fP() functions are identical to
\fBfseek\fP() and \fBftell\fP() (see
.BR fseek (3)),
respectively, except that the \fIoffset\fP argument of \fBfseeko()\fP
and the return value of \fBftello()\fP is of type \fBoff_t\fP
respectively, except that the \fIoffset\fP argument of \fBfseeko\fP()
and the return value of \fBftello\fP() is of type \fBoff_t\fP
instead of \fBlong\fP.
.LP
On many architectures both \fBoff_t\fP and \fBlong\fP are 32-bit types,

View File

@ -76,7 +76,7 @@ But early glibc2 is buggy and returns 0 there;
glibc 2.1.1 is correct again.
.SH HISTORY
The
.B ftime()
.BR ftime ()
function appeared in 4.2BSD.
.SH "CONFORMING TO"
4.2BSD, POSIX 1003.1-2001.

View File

@ -79,7 +79,7 @@ which case it will return zero, or until it hits an error other than EACCES
.BR malloc (3)
failure), in which case it will return \-1.
.PP
Because \fBftw()\fP uses dynamic data structures, the only safe way to
Because \fBftw\fP() uses dynamic data structures, the only safe way to
exit out of a tree walk is to return a non-zero value. To handle
interrupts, for example, mark that the interrupt occurred and return a
non-zero value\(emdon't use

View File

@ -22,18 +22,18 @@ For the definition of the Gamma function, see
.PP
.SS "*BSD version"
4.4BSD and FreeBSD libm have a
.B gamma()
.BR gamma ()
function that computes the Gamma function, as one would expect.
.SS "glibc version"
Glibc has a
.B gamma()
.BR gamma ()
function that is equivalent to
.B lgamma()
.BR lgamma ()
and computes the natural logarithm of the Gamma function.
(This is for compatibility reasons only. Don't use this function.)
.SH HISTORY
4.2BSD had a
.B gamma()
.BR gamma ()
that computed
.RI ln(|Gamma(| x |)|),
leaving the sign of
@ -41,7 +41,7 @@ leaving the sign of
in the external integer
.IR signgam .
In 4.3BSD the name was changed to
.BR lgamma() ,
.BR lgamma (),
and the man page promises
.sp
.in +3
@ -50,11 +50,11 @@ and used for the Gamma function"
.in
.sp
This did indeed happen in 4.4BSD, where
.B gamma()
.BR gamma ()
computes the Gamma function (with no effect on
.IR signgam ).
However, this came too late, and we now have
.BR tgamma() ,
.BR tgamma (),
the "true gamma" function.
.\" The FreeBSD man page says about gamma() that it is like lgamma()
.\" except that is does not set signgam.

View File

@ -35,7 +35,7 @@ gcvt \- convert a floating-point number to a string
.BI "char *gcvt(double " number ", size_t " ndigit ", char *" buf );
.fi
.SH DESCRIPTION
The \fBgcvt()\fP function converts \fInumber\fP to a minimal length NULL
The \fBgcvt\fP() function converts \fInumber\fP to a minimal length NULL
terminated ASCII string and stores the result in \fIbuf\fP. It produces
\fIndigit\fP significant digits in either
.BR printf (3)
@ -45,7 +45,7 @@ This function is obsolete. Instead,
.IR sprintf ()
is recommended.
.SH "RETURN VALUE"
The \fBgcvt()\fP function returns the address of the string pointed to
The \fBgcvt\fP() function returns the address of the string pointed to
by \fIbuf\fP.
.SH "SEE ALSO"
.BR ecvt (3),

View File

@ -354,7 +354,7 @@ suitable for error reporting.
.SH "CONFORMING TO"
POSIX 1003.1-2003.
The
.B getaddrinfo()
.BR getaddrinfo ()
function is documented in RFC\ 2553.
.SH "NOTES"
.BR AI_ADDRCONFIG ,

Some files were not shown because too many files have changed in this diff Show More