Automated unformatting of parentheses using unformat_parens.sh

This commit is contained in:
Michael Kerrisk 2005-10-19 07:07:02 +00:00
parent e511ffb6bc
commit 63aa9df02f
260 changed files with 1564 additions and 1564 deletions

View File

@ -39,7 +39,7 @@ _exit, _Exit \- terminate the current process
.BI "void _Exit(int " status ); .BI "void _Exit(int " status );
.SH DESCRIPTION .SH DESCRIPTION
The function The function
.BR _exit() .BR _exit ()
terminates the calling process "immediately". Any open file descriptors terminates the calling process "immediately". Any open file descriptors
belonging to the process are closed; any children of the process are belonging to the process are closed; any children of the process are
inherited by process 1, inherited by process 1,
@ -56,38 +56,38 @@ can be collected using one of the
family of calls. family of calls.
.LP .LP
The function The function
.B _Exit() .BR _Exit ()
is equivalent to is equivalent to
.BR _exit() . .BR _exit ().
.SH "RETURN VALUE" .SH "RETURN VALUE"
These functions do not return. These functions do not return.
.SH "CONFORMING TO" .SH "CONFORMING TO"
SVr4, SVID, POSIX, X/OPEN, 4.3BSD. SVr4, SVID, POSIX, X/OPEN, 4.3BSD.
The function \fB_Exit()\fP was introduced by C99. The function \fB_Exit\fP() was introduced by C99.
.SH NOTES .SH NOTES
For a discussion on the effects of an exit, the transmission of For a discussion on the effects of an exit, the transmission of
exit status, zombie processes, signals sent, etc., see exit status, zombie processes, signals sent, etc., see
.BR exit (3). .BR exit (3).
.LP .LP
The function The function
.B _exit() .BR _exit ()
is like \fBexit()\fP, but does not call any is like \fBexit\fP(), but does not call any
functions registered with functions registered with
.BR atexit() .BR atexit ()
or or
.BR on_exit() . .BR on_exit ().
Whether it flushes Whether it flushes
standard I/O buffers and removes temporary files created with standard I/O buffers and removes temporary files created with
.BR tmpfile (3) .BR tmpfile (3)
is implementation dependent. is implementation dependent.
On the other hand, On the other hand,
.B _exit() .BR _exit ()
does close open file descriptors, and this may cause an unknown delay, does close open file descriptors, and this may cause an unknown delay,
waiting for pending output to finish. If the delay is undesired, waiting for pending output to finish. If the delay is undesired,
it may be useful to call functions like \fItcflush()\fP before it may be useful to call functions like \fItcflush\fP() before
calling \fB_exit()\fP. calling \fB_exit\fP().
Whether any pending I/O is cancelled, and which pending I/O may be Whether any pending I/O is cancelled, and which pending I/O may be
cancelled upon \fB_exit()\fP, is implementation-dependent. cancelled upon \fB_exit\fP(), is implementation-dependent.
.SH "SEE ALSO" .SH "SEE ALSO"
.BR execve (2), .BR execve (2),
.BR fork (2), .BR fork (2),

View File

@ -61,13 +61,13 @@ scheduled alarm.
share the same timer; calls to one will interfere with use of the share the same timer; calls to one will interfere with use of the
other. other.
.PP .PP
.B sleep() .BR sleep ()
may be implemented using may be implemented using
.BR SIGALRM ; .BR SIGALRM ;
mixing calls to mixing calls to
.B alarm() .BR alarm ()
and and
.B sleep() .BR sleep ()
is a bad idea. is a bad idea.
Scheduling delays can, as ever, cause the execution of the process to Scheduling delays can, as ever, cause the execution of the process to

View File

@ -58,15 +58,15 @@ and inherited by child processes.
The The
.I addr .I addr
parameter of parameter of
.B free_hugepages() .BR free_hugepages ()
tells which page is being freed: it was the return value of a tells which page is being freed: it was the return value of a
call to call to
.BR alloc_hugepages() . .BR alloc_hugepages ().
(The memory is first actually freed when all users have released it.) (The memory is first actually freed when all users have released it.)
The The
.I addr .I addr
parameter of parameter of
.B alloc_hugepages() .BR alloc_hugepages ()
is a hint, that the kernel may or may not follow. is a hint, that the kernel may or may not follow.
Addresses must be properly aligned. Addresses must be properly aligned.
.LP .LP

View File

@ -110,7 +110,7 @@ X/OPEN does not document EIO, ENOMEM or EFAULT error conditions.
This interface is marked as legacy by X/OPEN. This interface is marked as legacy by X/OPEN.
.SH NOTES .SH NOTES
FreeBSD has a stronger FreeBSD has a stronger
.I jail() .IR jail ()
system call. system call.
.SH "SEE ALSO" .SH "SEE ALSO"
.BR chdir (2), .BR chdir (2),

View File

@ -38,7 +38,7 @@ execve \- execute program
.BI "int execve(const char *" filename ", char *const " argv .BI "int execve(const char *" filename ", char *const " argv
.BI "[], char *const " envp []); .BI "[], char *const " envp []);
.SH DESCRIPTION .SH DESCRIPTION
\fBexecve()\fP executes the program pointed to by \fIfilename\fP. \fBexecve\fP() executes the program pointed to by \fIfilename\fP.
\fIfilename\fP must be either a binary executable, or a script \fIfilename\fP must be either a binary executable, or a script
starting with a line of the form "\fB#! \fIinterpreter \fR[arg]". starting with a line of the form "\fB#! \fIinterpreter \fR[arg]".
In the latter case, the interpreter must be a valid pathname for an In the latter case, the interpreter must be a valid pathname for an
@ -53,7 +53,7 @@ pointer. The argument vector and environment can be accessed by the
called program's main function, when it is defined as \fBint main(int called program's main function, when it is defined as \fBint main(int
argc, char *argv[], char *envp[])\fR. argc, char *argv[], char *envp[])\fR.
\fBexecve()\fP does not return on success, and the text, data, bss, and \fBexecve\fP() does not return on success, and the text, data, bss, and
stack of the calling process are overwritten by that of the program stack of the calling process are overwritten by that of the program
loaded. The program invoked inherits the calling process's PID, and any loaded. The program invoked inherits the calling process's PID, and any
open file descriptors that are not set to close on exec. Signals pending open file descriptors that are not set to close on exec. Signals pending
@ -62,7 +62,7 @@ the calling process are reset to their default behaviour.
The SIGCHLD signal (when set to SIG_IGN) may or may not be reset to SIG_DFL. The SIGCHLD signal (when set to SIG_IGN) may or may not be reset to SIG_DFL.
If the current program is being ptraced, a \fBSIGTRAP\fP is sent to it If the current program is being ptraced, a \fBSIGTRAP\fP is sent to it
after a successful \fBexecve()\fP. after a successful \fBexecve\fP().
If the set-user-ID bit is set on the program file pointed to by If the set-user-ID bit is set on the program file pointed to by
\fIfilename\fP, and the calling process is not being ptraced, \fIfilename\fP, and the calling process is not being ptraced,
@ -84,7 +84,7 @@ shared libraries. This interpreter is typically
version 5, or \fI/lib/ld-linux.so.2\fR for binaries linked with the version 5, or \fI/lib/ld-linux.so.2\fR for binaries linked with the
GNU libc version 2. GNU libc version 2.
.SH "RETURN VALUE" .SH "RETURN VALUE"
On success, \fBexecve()\fP does not return, on error \-1 is returned, and On success, \fBexecve\fP() does not return, on error \-1 is returned, and
.I errno .I errno
is set appropriately. is set appropriately.
.SH ERRORS .SH ERRORS
@ -178,7 +178,7 @@ conditions EAGAIN, EINTR, ELIBACC, ENOLINK, EMULTIHOP; POSIX does not
document ETXTBSY, EPERM, EFAULT, ELOOP, EIO, ENFILE, EMFILE, EINVAL, document ETXTBSY, EPERM, EFAULT, ELOOP, EIO, ENFILE, EMFILE, EINVAL,
EISDIR or ELIBBAD error conditions. EISDIR or ELIBBAD error conditions.
.SH NOTES .SH NOTES
SUID and SGID processes can not be \fBptrace()\fPd. SUID and SGID processes can not be \fBptrace\fP()d.
Linux ignores the SUID and SGID bits on scripts. Linux ignores the SUID and SGID bits on scripts.
@ -195,7 +195,7 @@ a #! executable shell script.
.\" Some Linux versions have failed to check permissions on ELF .\" Some Linux versions have failed to check permissions on ELF
.\" interpreters. This is a security hole, because it allows users to .\" interpreters. This is a security hole, because it allows users to
.\" open any file, such as a rewinding tape device, for reading. Some .\" open any file, such as a rewinding tape device, for reading. Some
.\" Linux versions have also had other security holes in \fBexecve()\fP, .\" Linux versions have also had other security holes in \fBexecve\fP(),
.\" that could be exploited for denial of service by a suitably crafted .\" that could be exploited for denial of service by a suitably crafted
.\" ELF binary. There are no known problems with 2.0.34 or 2.2.15. .\" ELF binary. There are no known problems with 2.0.34 or 2.2.15.

View File

@ -34,8 +34,8 @@ In a SysV-like environment, one has the two types
\fBmcontext_t\fP and \fBucontext_t\fP defined in \fBmcontext_t\fP and \fBucontext_t\fP defined in
.I <ucontext.h> .I <ucontext.h>
and the four functions and the four functions
\fBgetcontext()\fP, \fBsetcontext()\fP, \fBmakecontext()\fP \fBgetcontext\fP(), \fBsetcontext\fP(), \fBmakecontext\fP()
and \fBswapcontext()\fP and \fBswapcontext\fP()
that allow user-level context switching between multiple that allow user-level context switching between multiple
threads of control within a process. threads of control within a process.
.LP .LP
@ -57,7 +57,7 @@ with \fBsigset_t\fP and \fBstack_t\fP defined in
.IR <signal.h> . .IR <signal.h> .
Here \fIuc_link\fP points to the context that will be resumed Here \fIuc_link\fP points to the context that will be resumed
when the current context terminates (in case the current context when the current context terminates (in case the current context
was created using \fBmakecontext()\fP), \fIuc_sigmask\fP is the was created using \fBmakecontext\fP()), \fIuc_sigmask\fP is the
set of signals blocked in this context (see set of signals blocked in this context (see
.BR sigprocmask (2)), .BR sigprocmask (2)),
\fIuc_stack\fP is the stack used by this context (see \fIuc_stack\fP is the stack used by this context (see
@ -66,24 +66,24 @@ and \fIuc_mcontext\fP is the
machine-specific representation of the saved context, machine-specific representation of the saved context,
that includes the calling thread's machine registers. that includes the calling thread's machine registers.
.LP .LP
The function \fBgetcontext()\fP initializes the structure The function \fBgetcontext\fP() initializes the structure
pointed at by \fIucp\fP to the currently active context. pointed at by \fIucp\fP to the currently active context.
.LP .LP
The function \fBsetcontext()\fP restores the user context The function \fBsetcontext\fP() restores the user context
pointed at by \fIucp\fP. A successful call does not return. pointed at by \fIucp\fP. A successful call does not return.
The context should have been obtained by a call of \fBgetcontext()\fP, The context should have been obtained by a call of \fBgetcontext\fP(),
or \fBmakecontext()\fP, or passed as third argument to a signal or \fBmakecontext\fP(), or passed as third argument to a signal
handler. handler.
.LP .LP
If the context was obtained by a call of \fBgetcontext()\fP, If the context was obtained by a call of \fBgetcontext\fP(),
program execution continues as if this call just returned. program execution continues as if this call just returned.
.LP .LP
If the context was obtained by a call of \fBmakecontext()\fP, If the context was obtained by a call of \fBmakecontext\fP(),
program execution continues by a call to the function \fIfunc\fP program execution continues by a call to the function \fIfunc\fP
specified as the second argument of that call to \fBmakecontext()\fP. specified as the second argument of that call to \fBmakecontext\fP().
When the function \fIfunc\fP returns, we continue with the When the function \fIfunc\fP returns, we continue with the
\fIuc_link\fP member of the structure \fIucp\fP specified as the \fIuc_link\fP member of the structure \fIucp\fP specified as the
first argument of that call to \fBmakecontext()\fP. first argument of that call to \fBmakecontext\fP().
When this member is NULL, the thread exits. When this member is NULL, the thread exits.
.LP .LP
If the context was obtained by a call to a signal handler, If the context was obtained by a call to a signal handler,
@ -92,27 +92,27 @@ program instruction following the instruction interrupted
by the signal". However, this sentence was removed in SUSv2, by the signal". However, this sentence was removed in SUSv2,
and the present verdict is "the result is unspecified". and the present verdict is "the result is unspecified".
.SH "RETURN VALUE" .SH "RETURN VALUE"
When successful, \fBgetcontext()\fP returns 0 and \fBsetcontext()\fP When successful, \fBgetcontext\fP() returns 0 and \fBsetcontext\fP()
does not return. On error, both return \-1 and set \fIerrno\fP does not return. On error, both return \-1 and set \fIerrno\fP
appropriately. appropriately.
.SH ERRORS .SH ERRORS
None defined. None defined.
.SH NOTES .SH NOTES
The earliest incarnation of this mechanism was the The earliest incarnation of this mechanism was the
\fIsetjmp()\fP/\fIlongjmp()\fP mechanism. Since that does not define \fIsetjmp\fP()/\fIlongjmp\fP() mechanism. Since that does not define
the handling of the signal context, the next stage was the the handling of the signal context, the next stage was the
\fIsigsetjmp()\fP/\fIsiglongjmp()\fP pair. \fIsigsetjmp\fP()/\fIsiglongjmp\fP() pair.
The present mechanism gives much more control. On the other hand, The present mechanism gives much more control. On the other hand,
there is no easy way to detect whether a return from \fBgetcontext()\fP there is no easy way to detect whether a return from \fBgetcontext\fP()
is from the first call, or via a \fBsetcontext()\fP call. is from the first call, or via a \fBsetcontext\fP() call.
The user has to invent her own bookkeeping device, and a register The user has to invent her own bookkeeping device, and a register
variable won't do since registers are restored. variable won't do since registers are restored.
.LP .LP
When a signal occurs, the current user context is saved and When a signal occurs, the current user context is saved and
a new context is created by the kernel for the signal handler. a new context is created by the kernel for the signal handler.
Do not leave the handler using \fIlongjmp()\fP: it is undefined Do not leave the handler using \fIlongjmp\fP(): it is undefined
what would happen with contexts. Use \fIsiglongjmp()\fP or what would happen with contexts. Use \fIsiglongjmp\fP() or
\fIsetcontext()\fP instead. \fIsetcontext\fP() instead.
.SH "CONFORMING TO" .SH "CONFORMING TO"
SUSv2 SUSv2
.SH "SEE ALSO" .SH "SEE ALSO"

View File

@ -41,9 +41,9 @@ gethostname, sethostname \- get/set host name
These functions are used to access or to change the host name of the These functions are used to access or to change the host name of the
current processor. current processor.
The The
.B gethostname() .BR gethostname ()
function returns a NUL-terminated hostname (set earlier by function returns a NUL-terminated hostname (set earlier by
.BR sethostname() ) .BR sethostname ())
in the array \fIname\fP that has a length of \fIlen\fP bytes. in the array \fIname\fP that has a length of \fIlen\fP bytes.
In case the NUL-terminated hostname does not fit, no error is In case the NUL-terminated hostname does not fit, no error is
returned, but the hostname is truncated. It is unspecified returned, but the hostname is truncated. It is unspecified

View File

@ -29,7 +29,7 @@ getpagesize \- get memory page size
.B int getpagesize(void); .B int getpagesize(void);
.SH DESCRIPTION .SH DESCRIPTION
The function The function
.B getpagesize() .BR getpagesize ()
returns the number of bytes in a page, where a "page" is the thing returns the number of bytes in a page, where a "page" is the thing
used where it says in the description of used where it says in the description of
.BR mmap (2) .BR mmap (2)
@ -60,13 +60,13 @@ This call first appeared in 4.2BSD.
.SH CONFORMING TO .SH CONFORMING TO
SVr4, 4.4BSD, SUSv2. SVr4, 4.4BSD, SUSv2.
In SUSv2 the In SUSv2 the
.B getpagesize() .BR getpagesize ()
call is labeled "legacy", and in POSIX 1003.1-2001 call is labeled "legacy", and in POSIX 1003.1-2001
it has been dropped. it has been dropped.
HPUX does not have this call. HPUX does not have this call.
.SH NOTES .SH NOTES
Whether Whether
.B getpagesize() .BR getpagesize ()
is present as a Linux system call depends on the architecture. is present as a Linux system call depends on the architecture.
If it is, it returns the kernel symbol PAGE_SIZE, If it is, it returns the kernel symbol PAGE_SIZE,
which is architecture and machine model dependent. which is architecture and machine model dependent.
@ -77,7 +77,7 @@ should not find PAGE_SIZE at compile time from a header file,
but use an actual system call, at least for those architectures but use an actual system call, at least for those architectures
(like sun4) where this dependency exists. (like sun4) where this dependency exists.
Here libc4, libc5, glibc 2.0 fail because their Here libc4, libc5, glibc 2.0 fail because their
.B getpagesize() .BR getpagesize ()
returns a statically derived value, and does not use a system call. returns a statically derived value, and does not use a system call.
Things are OK in glibc 2.1. Things are OK in glibc 2.1.
.SH "SEE ALSO" .SH "SEE ALSO"

View File

@ -180,7 +180,7 @@ fails with the error
A limit on the combined number of A limit on the combined number of
.BR flock () .BR flock ()
locks and locks and
.BR fcntl() .BR fcntl ()
leases that this process may establish. leases that this process may establish.
.TP .TP
.B RLIMIT_MEMLOCK .B RLIMIT_MEMLOCK
@ -331,11 +331,11 @@ points outside the accessible address space.
is not valid. is not valid.
.TP .TP
.B EPERM .B EPERM
An unprivileged process tried to use \fBsetrlimit()\fP to An unprivileged process tried to use \fBsetrlimit\fP() to
increase a soft or hard limit above the current hard limit; the increase a soft or hard limit above the current hard limit; the
.B CAP_SYS_RESOURCE .B CAP_SYS_RESOURCE
capability is required to do this. capability is required to do this.
Or, the process tried to use \fBsetrlimit()\fP to increase Or, the process tried to use \fBsetrlimit\fP() to increase
the soft or hard RLIMIT_NOFILE limit above the current kernel the soft or hard RLIMIT_NOFILE limit above the current kernel
maximum (NR_OPEN). maximum (NR_OPEN).
.SH BUGS .SH BUGS

View File

@ -45,8 +45,8 @@ These functions are always successful.
.SH "CONFORMING TO" .SH "CONFORMING TO"
POSIX, 4.3BSD. POSIX, 4.3BSD.
.SH HISTORY .SH HISTORY
In Unix V6 the \fBgetuid()\fP call returned (euid << 8) + uid. In Unix V6 the \fBgetuid\fP() call returned (euid << 8) + uid.
Unix V7 introduced separate calls \fBgetuid()\fP and \fBgeteuid()\fP. Unix V7 introduced separate calls \fBgetuid\fP() and \fBgeteuid\fP().
.SH "SEE ALSO" .SH "SEE ALSO"
.BR setreuid (2), .BR setreuid (2),
.BR setuid (2) .BR setuid (2)

View File

@ -30,7 +30,7 @@ ipc \- System V IPC system calls
.BI "int ipc(unsigned int " call ", int " first ", int " second , .BI "int ipc(unsigned int " call ", int " first ", int " second ,
.BI "int " third ", void *" ptr ", long " fifth ); .BI "int " third ", void *" ptr ", long " fifth );
.SH DESCRIPTION .SH DESCRIPTION
.B ipc() .BR ipc ()
is a common kernel entry point for the System V IPC calls is a common kernel entry point for the System V IPC calls
for messages, semaphores, and shared memory. for messages, semaphores, and shared memory.
.I call .I call
@ -39,9 +39,9 @@ the other arguments are passed through to the appropriate call.
.PP .PP
User programs should call the appropriate functions by their usual names. User programs should call the appropriate functions by their usual names.
Only standard library implementors and kernel hackers need to know about Only standard library implementors and kernel hackers need to know about
.BR ipc() . .BR ipc ().
.SH "CONFORMING TO" .SH "CONFORMING TO"
\fBipc()\fP is Linux specific, and should not be used in programs \fBipc\fP() is Linux specific, and should not be used in programs
intended to be portable. intended to be portable.
.SH "SEE ALSO" .SH "SEE ALSO"
.BR msgctl (2), .BR msgctl (2),

View File

@ -99,7 +99,7 @@ to any of the target processes.
The pid or process group does not exist. The pid or process group does not exist.
Note that an existing process might be a zombie, Note that an existing process might be a zombie,
a process which already committed termination, but a process which already committed termination, but
has not yet been \fBwait()\fPed for. has not yet been \fBwait\fP()ed for.
.SH NOTES .SH NOTES
The only signals that can be sent task number one, the The only signals that can be sent task number one, the
.I init .I init
@ -117,9 +117,9 @@ Linux allows a process to signal itself, but on Linux the call
.LP .LP
POSIX 1003.1-2003 requires that if a process sends a signal to itself, POSIX 1003.1-2003 requires that if a process sends a signal to itself,
and that process does not have the signal blocked, and no other thread and that process does not have the signal blocked, and no other thread
has it unblocked or is waiting for it in \fIsigwait()\fP, at least one has it unblocked or is waiting for it in \fIsigwait\fP(), at least one
unblocked signal must be delivered to the sending thread before the unblocked signal must be delivered to the sending thread before the
call of \fIkill()\fP returns. call of \fIkill\fP() returns.
.SH "LINUX HISTORY" .SH "LINUX HISTORY"
Across different kernel versions, Linux has enforced different rules Across different kernel versions, Linux has enforced different rules
for the permissions required for an unprivileged process for the permissions required for an unprivileged process

View File

@ -70,7 +70,7 @@ The function
is available since Linux 2.3.31. is available since Linux 2.3.31.
It is Linux specific, and should be avoided in portable applications. It is Linux specific, and should be avoided in portable applications.
See also the See also the
.I mmap64() .IR mmap64 ()
function that is part of the LFS (Large File Summit). function that is part of the LFS (Large File Summit).
.SH "SEE ALSO" .SH "SEE ALSO"
.BR getpagesize (2), .BR getpagesize (2),

View File

@ -421,7 +421,7 @@ SVr4, SVID.
.SH NOTE .SH NOTE
The pointer argument is declared as \fIstruct msgbuf *\fP with The pointer argument is declared as \fIstruct msgbuf *\fP with
libc4, libc5, glibc 2.0, glibc 2.1. It is declared as \fIvoid *\fP libc4, libc5, glibc 2.0, glibc 2.1. It is declared as \fIvoid *\fP
(\fIconst void *\fP for \fImsgsnd()\fP) with glibc 2.2, following the SUSv2. (\fIconst void *\fP for \fImsgsnd\fP()) with glibc 2.2, following the SUSv2.
.SH "SEE ALSO" .SH "SEE ALSO"
.BR msgctl (2), .BR msgctl (2),
.BR msgget (2), .BR msgget (2),

View File

@ -182,7 +182,7 @@ locking tasks will contain a race condition. The solution for performing
atomic file locking using a lockfile is to create a unique file on atomic file locking using a lockfile is to create a unique file on
the same file system (e.g., incorporating hostname and pid), use the same file system (e.g., incorporating hostname and pid), use
.BR link (2) .BR link (2)
to make a link to the lockfile. If \fBlink()\fP returns 0, the lock is to make a link to the lockfile. If \fBlink\fP() returns 0, the lock is
successful. Otherwise, use successful. Otherwise, use
.BR stat (2) .BR stat (2)
on the unique file to check if its link count has increased to 2, on the unique file to check if its link count has increased to 2,

View File

@ -33,7 +33,7 @@ pread, pwrite \- read from or write to a file descriptor at a given offset
.BI "ssize_t pwrite(int " fd ", const void *" buf ", size_t " count ", off_t " offset ); .BI "ssize_t pwrite(int " fd ", const void *" buf ", size_t " count ", off_t " offset );
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
.B pread() .BR pread ()
reads up to reads up to
.I count .I count
bytes from file descriptor bytes from file descriptor
@ -44,7 +44,7 @@ at offset
.IR buf . .IR buf .
The file offset is not changed. The file offset is not changed.
.PP .PP
.B pwrite() .BR pwrite ()
writes up to writes up to
.I count .I count
bytes from the buffer starting at bytes from the buffer starting at

View File

@ -42,7 +42,7 @@ read \- read from a file descriptor
.BI "ssize_t read(int " fd ", void *" buf ", size_t " count ); .BI "ssize_t read(int " fd ", void *" buf ", size_t " count );
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
.B read() .BR read ()
attempts to read up to attempts to read up to
.I count .I count
bytes from file descriptor bytes from file descriptor
@ -52,7 +52,7 @@ into the buffer starting at
.PP .PP
If If
.I count .I count
is zero, \fBread()\fP returns zero and has no other results. is zero, \fBread\fP() returns zero and has no other results.
If If
.I count .I count
is greater than SSIZE_MAX, the result is unspecified. is greater than SSIZE_MAX, the result is unspecified.
@ -64,7 +64,7 @@ It is not an error if this number is smaller than the number of bytes
requested; this may happen for example because fewer bytes are actually requested; this may happen for example because fewer bytes are actually
available right now (maybe because we were close to end-of-file, or available right now (maybe because we were close to end-of-file, or
because we are reading from a pipe, or from a terminal), or because because we are reading from a pipe, or from a terminal), or because
\fBread()\fP was interrupted by a signal. \fBread\fP() was interrupted by a signal.
On error, \-1 is returned, and On error, \-1 is returned, and
.I errno .I errno
is set appropriately. In this case it is left unspecified whether is set appropriately. In this case it is left unspecified whether

View File

@ -32,7 +32,7 @@ readahead \- perform file readahead into page cache
.BI "ssize_t readahead(int " fd ", off64_t *" offset ", size_t " count ); .BI "ssize_t readahead(int " fd ", off64_t *" offset ", size_t " count );
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
.B readahead() .BR readahead ()
populates the page cache with data from a file so that subsequent populates the page cache with data from a file so that subsequent
reads from that file will not block on disk I/O. reads from that file will not block on disk I/O.
The The
@ -51,16 +51,16 @@ is effectively rounded down to a page boundary
and bytes are read up to the next page boundary greater than or and bytes are read up to the next page boundary greater than or
equal to equal to
.IR "(offset+count)" . .IR "(offset+count)" .
.B readahead() .BR readahead ()
does not read beyond the end of the file. does not read beyond the end of the file.
.B readahead() .BR readahead ()
blocks until the specified data has been read. blocks until the specified data has been read.
The current file offset of the open file referred to by The current file offset of the open file referred to by
.I fd .I fd
is left unchanged. is left unchanged.
.SH "RETURN VALUE" .SH "RETURN VALUE"
On success, On success,
.B readahead() .BR readahead ()
returns 0; on failure, \-1 is returned, with returns 0; on failure, \-1 is returned, with
.I errno .I errno
set to indicate the cause of the error. set to indicate the cause of the error.
@ -77,12 +77,12 @@ does not refer to a file type to which
can be applied. can be applied.
.SH "CONFORMING TO" .SH "CONFORMING TO"
The The
.B readahead() .BR readahead ()
system call is Linux specific, and its use should be avoided system call is Linux specific, and its use should be avoided
in portable applications. in portable applications.
.SH NOTES .SH NOTES
The The
.B readahead() .BR readahead ()
system call appeared in Linux 2.4.13. system call appeared in Linux 2.4.13.
.SH "SEE ALSO" .SH "SEE ALSO"
.BR fadvise (2), .BR fadvise (2),

View File

@ -31,12 +31,12 @@ remap_file_pages \- create a non-linear file mapping
.BI "ssize_t " pgoff ", int " flags ); .BI "ssize_t " pgoff ", int " flags );
.SH DESCRIPTION .SH DESCRIPTION
The The
.B remap_file_pages() .BR remap_file_pages ()
system call is used to create a non-linear mapping, that is, a mapping system call is used to create a non-linear mapping, that is, a mapping
in which the pages of the file are mapped into a non-sequential order in which the pages of the file are mapped into a non-sequential order
in memory. in memory.
The advantage of using The advantage of using
.B remap_file_pages() .BR remap_file_pages ()
over using repeated calls to over using repeated calls to
.BR mmap (2) .BR mmap (2)
is that the former approach does not require the kernel to create is that the former approach does not require the kernel to create
@ -46,14 +46,14 @@ To create a non-linear mapping we perform the following steps:
.TP .TP
\fB1.\fp \fB1.\fp
Use Use
.B mmap() .BR mmap ()
to create a mapping (which is initially linear). to create a mapping (which is initially linear).
This mapping must be created with the This mapping must be created with the
MAP_SHARED flag. MAP_SHARED flag.
.TP .TP
\fB2.\fp \fB2.\fp
Use one or more calls to Use one or more calls to
.B remap_file_pages() .BR remap_file_pages ()
to rearrange the correspondence between the pages of the mapping to rearrange the correspondence between the pages of the mapping
and the pages of the file. and the pages of the file.
It is possible to map the same page of a file It is possible to map the same page of a file
@ -78,7 +78,7 @@ Thus,
.I start .I start
must be an address that falls within must be an address that falls within
a region previously mapped by a call to a region previously mapped by a call to
.BR mmap() . .BR mmap ().
Second, Second,
.I start .I start
specifies the address at which the file pages specifies the address at which the file pages
@ -109,18 +109,18 @@ argument must be specified as 0.
The The
.I flags .I flags
argument has the same meaning as for argument has the same meaning as for
.BR mmap() , .BR mmap (),
but all flags other than MAP_NONBLOCK are ignored. but all flags other than MAP_NONBLOCK are ignored.
.SH "RETURN VALUE" .SH "RETURN VALUE"
On success, On success,
.B remap_file_pages() .BR remap_file_pages ()
returns 0. returns 0.
On error, \-1 is returned, and On error, \-1 is returned, and
.I errno .I errno
is set appropriately. is set appropriately.
.SH NOTES .SH NOTES
The The
.B remap_file_pages() .BR remap_file_pages ()
system call appeared in Linux 2.5.46. system call appeared in Linux 2.5.46.
.SH ERRORS .SH ERRORS
.TP .TP
@ -139,7 +139,7 @@ is invalid.
.\" And possibly others from vma->vm_ops->populate() .\" And possibly others from vma->vm_ops->populate()
.SH "CONFORMING TO" .SH "CONFORMING TO"
The The
.B remap_file_pages() .BR remap_file_pages ()
system call is Linux specific. system call is Linux specific.
.SH "SEE ALSO" .SH "SEE ALSO"
.BR getpagesize (2), .BR getpagesize (2),

View File

@ -86,15 +86,15 @@ I can't see the use for it in a clean program.
This set is watched to see if data is available for reading from any of This set is watched to see if data is available for reading from any of
its file descriptors. After \fBselect\fP() has returned, \fIreadfds\fP will be its file descriptors. After \fBselect\fP() has returned, \fIreadfds\fP will be
cleared of all file descriptors except for those file descriptors that cleared of all file descriptors except for those file descriptors that
are immediately available for reading with a \fBrecv()\fP (for sockets) or are immediately available for reading with a \fBrecv\fP() (for sockets) or
\fBread()\fP (for pipes, files, and sockets) call. \fBread\fP() (for pipes, files, and sockets) call.
.TP .TP
\fIwritefds\fP \fIwritefds\fP
This set is watched to see if there is space to write data to any of This set is watched to see if there is space to write data to any of
its file descriptor. After \fBselect\fP() has returned, \fIwritefds\fP will be its file descriptor. After \fBselect\fP() has returned, \fIwritefds\fP will be
cleared of all file descriptors except for those file descriptors that cleared of all file descriptors except for those file descriptors that
are immediately available for writing with a \fBsend()\fP (for sockets) or are immediately available for writing with a \fBsend\fP() (for sockets) or
\fBwrite()\fP (for pipes, files, and sockets) call. \fBwrite\fP() (for pipes, files, and sockets) call.
.TP .TP
\fIexceptfds\fP \fIexceptfds\fP
This set is watched for exceptions or errors on any of the file This set is watched for exceptions or errors on any of the file
@ -105,7 +105,7 @@ is data sent on a socket using the \fBMSG_OOB\fP flag, and hence
\fBsend\fP(2) about this. After \fBselect\fP() has returned, \fBsend\fP(2) about this. After \fBselect\fP() has returned,
\fIexceptfds\fP will be cleared of all file descriptors except for those \fIexceptfds\fP will be cleared of all file descriptors except for those
descriptors that are available for reading OOB data. You can only ever descriptors that are available for reading OOB data. You can only ever
read one byte of OOB data though (which is done with \fBrecv()\fP), and read one byte of OOB data though (which is done with \fBrecv\fP()), and
writing OOB data (done with \fBsend\fP) can be done at any time and will writing OOB data (done with \fBsend\fP) can be done at any time and will
not block. Hence there is no need for a fourth set to check if a socket not block. Hence there is no need for a fourth set to check if a socket
is available for writing OOB data. is available for writing OOB data.
@ -559,10 +559,10 @@ int main (int argc, char **argv) {
The above program properly forwards most kinds of TCP connections The above program properly forwards most kinds of TCP connections
including OOB signal data transmitted by \fBtelnet\fP servers. It including OOB signal data transmitted by \fBtelnet\fP servers. It
handles the tricky problem of having data flow in both directions handles the tricky problem of having data flow in both directions
simultaneously. You might think it more efficient to use a \fBfork()\fP simultaneously. You might think it more efficient to use a \fBfork\fP()
call and devote a thread to each stream. This becomes more tricky than call and devote a thread to each stream. This becomes more tricky than
you might suspect. Another idea is to set non-blocking IO using an you might suspect. Another idea is to set non-blocking IO using an
\fBioctl()\fP call. This also has its problems because you end up having \fBioctl\fP() call. This also has its problems because you end up having
to have inefficient timeouts. to have inefficient timeouts.
The program does not handle more than one simultaneous connection at a The program does not handle more than one simultaneous connection at a
@ -603,8 +603,8 @@ for writing \fImust\fP be written to, and any file descriptor
available for reading \fImust\fP be read, etc. available for reading \fImust\fP be read, etc.
.TP .TP
\fB5.\fP \fB5.\fP
The functions \fBread()\fP, \fBrecv()\fP, \fBwrite()\fP, and The functions \fBread\fP(), \fBrecv\fP(), \fBwrite\fP(), and
\fBsend()\fP do \fInot\fP necessarily read/write the full amount of data \fBsend\fP() do \fInot\fP necessarily read/write the full amount of data
that you have requested. If they do read/write the full amount, its that you have requested. If they do read/write the full amount, its
because you have a low traffic load and a fast stream. This is not because you have a low traffic load and a fast stream. This is not
always going to be the case. You should cope with the case of your always going to be the case. You should cope with the case of your
@ -619,8 +619,8 @@ easily be made as large as the maximum possible packet size on your
local network. local network.
.TP .TP
\fB7.\fP \fB7.\fP
The functions \fBread()\fP, \fBrecv()\fP, \fBwrite()\fP, and The functions \fBread\fP(), \fBrecv\fP(), \fBwrite\fP(), and
\fBsend()\fP as well as the \fBselect()\fP call can return \-1 with an \fBsend\fP() as well as the \fBselect\fP() call can return \-1 with an
errno of \fBEINTR\fP or \fBEAGAIN\fP (\fBEWOULDBLOCK\fP) which are not errno of \fBEINTR\fP or \fBEAGAIN\fP (\fBEWOULDBLOCK\fP) which are not
errors. These results must be properly managed (not done properly errors. These results must be properly managed (not done properly
above). If your program is not going to receive any signals then above). If your program is not going to receive any signals then
@ -629,14 +629,14 @@ set non-blocking IO, you will not get \fBEAGAIN\fP. Nonetheless
you should still cope with these errors for completeness. you should still cope with these errors for completeness.
.TP .TP
\fB8.\fP \fB8.\fP
Never call \fBread()\fP, \fBrecv()\fP, \fBwrite()\fP, or \fBsend()\fP Never call \fBread\fP(), \fBrecv\fP(), \fBwrite\fP(), or \fBsend\fP()
with a buffer length of zero. with a buffer length of zero.
.TP .TP
\fB9.\fP \fB9.\fP
Except as indicated in \fB7.\fP, the functions \fBread()\fP, Except as indicated in \fB7.\fP, the functions \fBread\fP(),
\fBrecv()\fP, \fBwrite()\fP, and \fBsend()\fP never have a return value \fBrecv\fP(), \fBwrite\fP(), and \fBsend\fP() never have a return value
less than 1 except if an error has occurred. For instance, a less than 1 except if an error has occurred. For instance, a
\fBread()\fP on a pipe where the other end has died returns zero (so \fBread\fP() on a pipe where the other end has died returns zero (so
does an end-of-file error), \fIbut\fP only returns zero does an end-of-file error), \fIbut\fP only returns zero
once (a followup read or write will return \-1). Should once (a followup read or write will return \-1). Should
any of these functions return 0 or \-1, you should \fInot\fP any of these functions return 0 or \-1, you should \fInot\fP

View File

@ -79,12 +79,12 @@ If
is zero, the process ID of the current process is used. is zero, the process ID of the current process is used.
The call The call
.B setpgrp() .BR setpgrp ()
is equivalent to is equivalent to
.BR setpgid(0,0) . .BR setpgid(0,0) .
Similarly, Similarly,
.B getpgrp() .BR getpgrp ()
is equivalent to is equivalent to
.BR getpgid(0) . .BR getpgid(0) .
Each process group is a member of a session and each process is a Each process group is a member of a session and each process is a

View File

@ -78,7 +78,7 @@ When the critical code has completed, the caller then waits for the
signals by calling signals by calling
.BR sigsuspend () .BR sigsuspend ()
with the signal mask that was returned by with the signal mask that was returned by
.BR sigprocmask() .BR sigprocmask ()
(in the (in the
.IR oldset .IR oldset
argument). argument).

View File

@ -222,7 +222,7 @@ when NFS-exported, and giving it out is a security concern.
Under some OSes the Under some OSes the
.I fsid .I fsid
can be used as second parameter to the can be used as second parameter to the
.I sysfs() .IR sysfs ()
system call. system call.
.SH NOTES .SH NOTES
The kernel has system calls statfs, fstatfs, statfs64, fstatfs64 The kernel has system calls statfs, fstatfs, statfs64, fstatfs64

View File

@ -39,7 +39,7 @@ stime \- set time
.SH DESCRIPTION .SH DESCRIPTION
\fBstime\fP() sets the system's idea of the time and date. Time, pointed \fBstime\fP() sets the system's idea of the time and date. Time, pointed
to by \fIt\fP, is measured in seconds from 00:00:00 GMT January 1, 1970. to by \fIt\fP, is measured in seconds from 00:00:00 GMT January 1, 1970.
\fBstime()\fP may only be executed by the superuser. \fBstime\fP() may only be executed by the superuser.
.SH "RETURN VALUE" .SH "RETURN VALUE"
On success, zero is returned. On error, \-1 is returned, and On success, zero is returned. On error, \-1 is returned, and
.I errno .I errno

View File

@ -47,7 +47,7 @@ This function is always successful.
SVr4, SVID, X/OPEN, 4.3BSD SVr4, SVID, X/OPEN, 4.3BSD
.SH BUGS .SH BUGS
According to the standard specification (e.g., SVID), According to the standard specification (e.g., SVID),
\fBsync()\fP schedules the writes, but may return before the actual \fBsync\fP() schedules the writes, but may return before the actual
writing is done. writing is done.
However, since version 1.3.20 Linux does actually wait. However, since version 1.3.20 Linux does actually wait.
(This still does not guarantee data integrity: modern disks have (This still does not guarantee data integrity: modern disks have

View File

@ -267,7 +267,7 @@ Roughly speaking, the code belonging to the system call
with number __NR_xxx defined in with number __NR_xxx defined in
.I /usr/include/asm/unistd.h .I /usr/include/asm/unistd.h
can be found in the kernel source in the routine can be found in the kernel source in the routine
.IR sys_xxx() . .IR sys_xxx ().
(The dispatch table for i386 can be found in (The dispatch table for i386 can be found in
.IR /usr/src/linux/arch/i386/kernel/entry.S .) .IR /usr/src/linux/arch/i386/kernel/entry.S .)
There are many exceptions, however, mostly because There are many exceptions, however, mostly because

View File

@ -46,15 +46,15 @@ syslog, klogctl \- read and/or clear kernel message ring buffer; set console_log
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
If you need the libc function If you need the libc function
.BR syslog() , .BR syslog (),
(that talks to (that talks to
.BR syslogd (8)), .BR syslogd (8)),
then look at then look at
.BR syslog (3). .BR syslog (3).
The system call of this name is about controlling the kernel The system call of this name is about controlling the kernel
.I printk() .IR printk ()
buffer, and the glibc version is called buffer, and the glibc version is called
.BR klogctl() . .BR klogctl ().
The \fItype\fP argument determines the action taken by this function. The \fItype\fP argument determines the action taken by this function.

View File

@ -70,10 +70,10 @@ The file specified by
is not an executable of known type, is not an executable of known type,
e.g., does not have the correct magic numbers. e.g., does not have the correct magic numbers.
.SH "CONFORMING TO" .SH "CONFORMING TO"
\fBuselib()\fP is Linux specific, and should not be used in programs \fBuselib\fP() is Linux specific, and should not be used in programs
intended to be portable. intended to be portable.
.SH NOTES .SH NOTES
\fBuselib()\fP was used by early libc startup code to load \fBuselib\fP() was used by early libc startup code to load
the shared libraries with names found in an array of names the shared libraries with names found in an array of names
in the binary. in the binary.
.LP .LP

View File

@ -45,8 +45,8 @@ bytes to the file referenced by the file descriptor
.I fd .I fd
from the buffer starting at from the buffer starting at
.IR buf . .IR buf .
POSIX requires that a \fBread()\fP which can be proved to occur after a POSIX requires that a \fBread\fP() which can be proved to occur after a
\fBwrite()\fP has returned returns the new data. Note that not all file \fBwrite\fP() has returned returns the new data. Note that not all file
systems are POSIX conforming. systems are POSIX conforming.
.SH "RETURN VALUE" .SH "RETURN VALUE"
On success, the number of bytes written are returned (zero indicates On success, the number of bytes written are returned (zero indicates

View File

@ -37,15 +37,15 @@ abort \- cause abnormal program termination
.B void abort(void); .B void abort(void);
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
The \fBabort()\fP function causes abnormal program termination unless The \fBabort\fP() function causes abnormal program termination unless
the signal SIGABRT is caught and the signal handler does not return. the signal SIGABRT is caught and the signal handler does not return.
If the \fBabort()\fP function causes program termination, all open If the \fBabort\fP() function causes program termination, all open
streams are closed and flushed. streams are closed and flushed.
.PP .PP
If the SIGABRT signal is blocked or ignored, the \fBabort()\fP If the SIGABRT signal is blocked or ignored, the \fBabort\fP()
function will still override it. function will still override it.
.SH "RETURN VALUE" .SH "RETURN VALUE"
The \fBabort()\fP function never returns. The \fBabort\fP() function never returns.
.SH "CONFORMING TO" .SH "CONFORMING TO"
SVID 3, POSIX, 4.3BSD, ISO 9899 (C99) SVID 3, POSIX, 4.3BSD, ISO 9899 (C99)
.SH "SEE ALSO" .SH "SEE ALSO"

View File

@ -47,8 +47,8 @@ abs, labs, llabs, imaxabs \- compute the absolute value of an integer
.BI "intmax_t imaxabs(intmax_t " j ); .BI "intmax_t imaxabs(intmax_t " j );
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
The \fBabs()\fP function computes the absolute value of the integer The \fBabs\fP() function computes the absolute value of the integer
argument \fIj\fP. The \fBlabs()\fP, \fBllabs()\fP and \fBimaxabs()\fP argument \fIj\fP. The \fBlabs\fP(), \fBllabs\fP() and \fBimaxabs\fP()
functions compute the absolute value of the argument \fIj\fP of the functions compute the absolute value of the argument \fIj\fP of the
appropriate integer type for the function. appropriate integer type for the function.
.SH "RETURN VALUE" .SH "RETURN VALUE"
@ -56,23 +56,23 @@ Returns the absolute value of the integer argument, of the appropriate
integer type for the function. integer type for the function.
.SH "CONFORMING TO" .SH "CONFORMING TO"
SVID 3, POSIX.1, 4.3BSD, ISO/IEC 9899 (C99). POSIX.1 (1996 edition) only SVID 3, POSIX.1, 4.3BSD, ISO/IEC 9899 (C99). POSIX.1 (1996 edition) only
requires the \fBabs()\fP function. ISO/IEC 9899:1990 (C89) only requires the \fBabs\fP() function. ISO/IEC 9899:1990 (C89) only
includes the \fBabs()\fP and \fBlabs()\fP functions; the functions includes the \fBabs\fP() and \fBlabs\fP() functions; the functions
\fBllabs()\fP and \fBimaxabs()\fP were added in C99. \fBllabs\fP() and \fBimaxabs\fP() were added in C99.
.SH NOTES .SH NOTES
Trying to take the absolute value of the most negative integer Trying to take the absolute value of the most negative integer
is not defined. is not defined.
.PP .PP
The \fBllabs()\fP function is included in glibc since version 2.0, but The \fBllabs\fP() function is included in glibc since version 2.0, but
is not in libc5 or libc4. The \fBimaxabs()\fP function is included in is not in libc5 or libc4. The \fBimaxabs\fP() function is included in
glibc since version 2.1.1. glibc since version 2.1.1.
.PP .PP
For \fBllabs()\fP to be declared, it may be necessary to define For \fBllabs\fP() to be declared, it may be necessary to define
\fB_ISOC99_SOURCE\fP or \fB_ISOC9X_SOURCE\fP (depending on the \fB_ISOC99_SOURCE\fP or \fB_ISOC9X_SOURCE\fP (depending on the
version of glibc) before including any standard headers. version of glibc) before including any standard headers.
.PP .PP
GCC handles \fBabs()\fP and \fBlabs()\fP as builtin functions. GCC GCC handles \fBabs\fP() and \fBlabs\fP() as builtin functions. GCC
3.0 also handles \fBllabs()\fP and \fBimaxabs()\fP as builtins. 3.0 also handles \fBllabs\fP() and \fBimaxabs\fP() as builtins.
.SH "SEE ALSO" .SH "SEE ALSO"
.BR cabs (3), .BR cabs (3),
.BR ceil (3), .BR ceil (3),

View File

@ -42,11 +42,11 @@ acos, acosf, acosl \- arc cosine function
.sp .sp
Link with \-lm. Link with \-lm.
.SH DESCRIPTION .SH DESCRIPTION
The \fBacos()\fP function calculates the arc cosine of \fIx\fP; that is The \fBacos\fP() function calculates the arc cosine of \fIx\fP; that is
the value whose cosine is \fIx\fP. If \fIx\fP falls outside the range the value whose cosine is \fIx\fP. If \fIx\fP falls outside the range
\-1 to 1, \fBacos()\fP fails and \fIerrno\fP is set. \-1 to 1, \fBacos\fP() fails and \fIerrno\fP is set.
.SH "RETURN VALUE" .SH "RETURN VALUE"
The \fBacos()\fP function returns the arc cosine in radians and the The \fBacos\fP() function returns the arc cosine in radians and the
value is mathematically defined to be between 0 and PI (inclusive). value is mathematically defined to be between 0 and PI (inclusive).
.SH ERRORS .SH ERRORS
.TP .TP

View File

@ -44,9 +44,9 @@ acosh, acoshf, acoshl \- inverse hyperbolic cosine function
.fi .fi
Link with \-lm. Link with \-lm.
.SH DESCRIPTION .SH DESCRIPTION
The \fBacosh()\fP function calculates the inverse hyperbolic cosine of The \fBacosh\fP() function calculates the inverse hyperbolic cosine of
\fIx\fP; that is the value whose hyperbolic cosine is \fIx\fP. If \fIx\fP \fIx\fP; that is the value whose hyperbolic cosine is \fIx\fP. If \fIx\fP
is less than 1.0, \fBacosh()\fP returns not-a-number (NaN) and \fIerrno\fP is less than 1.0, \fBacosh\fP() returns not-a-number (NaN) and \fIerrno\fP
is set. is set.
.SH ERRORS .SH ERRORS
.TP .TP

View File

@ -78,7 +78,7 @@ so that
.BR free (3) .BR free (3)
can be used to dispose of them again. can be used to dispose of them again.
.LP .LP
.B argz_add() .BR argz_add ()
adds the string adds the string
.I str .I str
at the end of the array at the end of the array
@ -88,7 +88,7 @@ and updates
and and
.RI * argz_len . .RI * argz_len .
.LP .LP
.B argz_add_sep() .BR argz_add_sep ()
is similar, but splits the string is similar, but splits the string
.I str .I str
into substrings separated by the delimiter into substrings separated by the delimiter
@ -96,7 +96,7 @@ into substrings separated by the delimiter
For example, one might use this on a Unix search path with For example, one might use this on a Unix search path with
delimiter ':'. delimiter ':'.
.LP .LP
.B argz_append() .BR argz_append ()
appends the argz vector appends the argz vector
.RI ( buf , buf_len ) .RI ( buf , buf_len )
after after
@ -110,17 +110,17 @@ and
will be increased by will be increased by
.IR buf_len .) .IR buf_len .)
.LP .LP
.B argz_count() .BR argz_count ()
counts the number of strings, that is, the number of NUL bytes, in counts the number of strings, that is, the number of NUL bytes, in
.RI ( argz , argz_len ). .RI ( argz , argz_len ).
.LP .LP
.B argz_create() .BR argz_create ()
converts a Unix-style argument vector converts a Unix-style argument vector
.IR argv , .IR argv ,
terminated by (char *) 0, into an argz vector terminated by (char *) 0, into an argz vector
.RI (* argz ,* argz_len ). .RI (* argz ,* argz_len ).
.LP .LP
.B argz_create_sep() .BR argz_create_sep ()
converts the NUL-terminated string converts the NUL-terminated string
.I str .I str
into an argz vector into an argz vector
@ -128,7 +128,7 @@ into an argz vector
by breaking it up at every occurrence of the separator by breaking it up at every occurrence of the separator
.IR sep . .IR sep .
.LP .LP
.B argz_delete() .BR argz_delete ()
removes the substring pointed to by removes the substring pointed to by
.I entry .I entry
from the argz vector from the argz vector
@ -138,9 +138,9 @@ and updates
and and
.RI * argz_len . .RI * argz_len .
.LP .LP
.B argz_extract() .BR argz_extract ()
is the opposite of is the opposite of
.BR argz_create() . .BR argz_create ().
It takes the argz vector It takes the argz vector
.RI ( argz , argz_len ) .RI ( argz , argz_len )
and fills the array starting at and fills the array starting at
@ -153,9 +153,9 @@ must have room for
.IR argz_count ( argz , argz_len ") + 1" .IR argz_count ( argz , argz_len ") + 1"
pointers. pointers.
.LP .LP
.B argz_insert() .BR argz_insert ()
is the opposite of is the opposite of
.BR argz_delete() . .BR argz_delete ().
It inserts the argument It inserts the argument
.I entry .I entry
at position at position
@ -172,13 +172,13 @@ is NULL, then
.I entry .I entry
will inserted at the end. will inserted at the end.
.LP .LP
.B argz_next() .BR argz_next ()
is a function to step trough the argz vector. If is a function to step trough the argz vector. If
.I entry .I entry
is NULL, the first entry is returned. Otherwise, the entry is NULL, the first entry is returned. Otherwise, the entry
following is returned. It returns NULL if there is no following entry. following is returned. It returns NULL if there is no following entry.
.LP .LP
.B argz_replace() .BR argz_replace ()
replaces each occurrence of replaces each occurrence of
.I str .I str
with with
@ -189,9 +189,9 @@ is non-NULL,
.RI * replace_count .RI * replace_count
will be incremented by the number of replacements. will be incremented by the number of replacements.
.LP .LP
.B argz_stringify() .BR argz_stringify ()
is the opposite of is the opposite of
.BR argz_create_sep() . .BR argz_create_sep ().
It transforms the argz vector into a normal string by replacing It transforms the argz vector into a normal string by replacing
all NULs except the last by all NULs except the last by
.IR sep . .IR sep .

View File

@ -44,11 +44,11 @@ asin, asinf, asinl \- arc sine function
.sp .sp
Link with \-lm. Link with \-lm.
.SH DESCRIPTION .SH DESCRIPTION
The \fBasin()\fP function calculates the arc sine of \fIx\fP; that is The \fBasin\fP() function calculates the arc sine of \fIx\fP; that is
the value whose sine is \fIx\fP. If \fIx\fP falls outside the range the value whose sine is \fIx\fP. If \fIx\fP falls outside the range
\-1 to 1, \fBasin()\fP fails and \fIerrno\fP is set. \-1 to 1, \fBasin\fP() fails and \fIerrno\fP is set.
.SH "RETURN VALUE" .SH "RETURN VALUE"
The \fBasin()\fP function returns the arc sine in radians and the The \fBasin\fP() function returns the arc sine in radians and the
value is mathematically defined to be between \-PI/2 and PI/2 value is mathematically defined to be between \-PI/2 and PI/2
(inclusive). (inclusive).
.SH ERRORS .SH ERRORS

View File

@ -44,7 +44,7 @@ asinh, asinhf, asinhl \- inverse hyperbolic sine function
.sp .sp
Link with \-lm. Link with \-lm.
.SH DESCRIPTION .SH DESCRIPTION
The \fBasinh()\fP function calculates the inverse hyperbolic sine of The \fBasinh\fP() function calculates the inverse hyperbolic sine of
\fIx\fP; that is the value whose hyperbolic sine is \fIx\fP. \fIx\fP; that is the value whose hyperbolic sine is \fIx\fP.
.SH "CONFORMING TO" .SH "CONFORMING TO"
SVID 3, POSIX, 4.3BSD, ISO 9899. SVID 3, POSIX, 4.3BSD, ISO 9899.

View File

@ -37,13 +37,13 @@ If the macro
was defined at the moment was defined at the moment
.B <assert.h> .B <assert.h>
was last included, the macro was last included, the macro
.B assert() .BR assert ()
generates no code, and hence does nothing at all. generates no code, and hence does nothing at all.
Otherwise, the macro Otherwise, the macro
.B assert() .BR assert ()
prints an error message to standard error and terminates the program prints an error message to standard error and terminates the program
by calling by calling
.B abort() .BR abort ()
if if
.I expression .I expression
is false (i.e., compares equal to zero). is false (i.e., compares equal to zero).
@ -62,7 +62,7 @@ and undefined behavior results if it is not, but in the 1999 standard
it may have any scalar type. it may have any scalar type.
.\" See Defect Report 107 for more details. .\" See Defect Report 107 for more details.
.SH BUGS .SH BUGS
.B assert() .BR assert ()
is implemented as a macro; if the expression tested has side-effects, is implemented as a macro; if the expression tested has side-effects,
program behaviour will be different depending on whether program behaviour will be different depending on whether
.B NDEBUG .B NDEBUG

View File

@ -38,13 +38,13 @@ If the macro
was defined at the moment was defined at the moment
.B <assert.h> .B <assert.h>
was last included, the macro was last included, the macro
.B assert_perror() .BR assert_perror ()
generates no code, and hence does nothing at all. generates no code, and hence does nothing at all.
Otherwise, the macro Otherwise, the macro
.B assert_perror() .BR assert_perror ()
prints an error message to standard output and terminates the program prints an error message to standard output and terminates the program
by calling by calling
.B abort() .BR abort ()
if if
.I errnum .I errnum
is non-zero. The message contains the filename, function name and is non-zero. The message contains the filename, function name and

View File

@ -44,10 +44,10 @@ atan, atanf, atanl \- arc tangent function
.fi .fi
Link with \-lm. Link with \-lm.
.SH DESCRIPTION .SH DESCRIPTION
The \fBatan()\fP function calculates the arc tangent of \fIx\fP; that is The \fBatan\fP() function calculates the arc tangent of \fIx\fP; that is
the value whose tangent is \fIx\fP. the value whose tangent is \fIx\fP.
.SH "RETURN VALUE" .SH "RETURN VALUE"
The \fBatan()\fP function returns the arc tangent in radians and the The \fBatan\fP() function returns the arc tangent in radians and the
value is mathematically defined to be between \-PI/2 and PI/2 value is mathematically defined to be between \-PI/2 and PI/2
(inclusive). (inclusive).
.SH "CONFORMING TO" .SH "CONFORMING TO"

View File

@ -44,12 +44,12 @@ atan2, atan2f, atan2l \- arc tangent function of two variables
.fi .fi
Link with \-lm. Link with \-lm.
.SH DESCRIPTION .SH DESCRIPTION
The \fBatan2()\fP function calculates the arc tangent of the two The \fBatan2\fP() function calculates the arc tangent of the two
variables \fIx\fP and \fIy\fP. It is similar to calculating the variables \fIx\fP and \fIy\fP. It is similar to calculating the
arc tangent of \fIy\fP / \fIx\fP, except that the signs of both arc tangent of \fIy\fP / \fIx\fP, except that the signs of both
arguments are used to determine the quadrant of the result. arguments are used to determine the quadrant of the result.
.SH "RETURN VALUE" .SH "RETURN VALUE"
The \fBatan2()\fP function returns the result in radians, which The \fBatan2\fP() function returns the result in radians, which
is between \-PI and PI (inclusive). is between \-PI and PI (inclusive).
.SH "CONFORMING TO" .SH "CONFORMING TO"
SVID 3, POSIX, 4.3BSD, ISO 9899. SVID 3, POSIX, 4.3BSD, ISO 9899.

View File

@ -44,9 +44,9 @@ atanh, atanhf, atanhl \- inverse hyperbolic tangent function
.fi .fi
Link with \-lm. Link with \-lm.
.SH DESCRIPTION .SH DESCRIPTION
The \fBatanh()\fP function calculates the inverse hyperbolic tangent of The \fBatanh\fP() function calculates the inverse hyperbolic tangent of
\fIx\fP; that is the value whose hyperbolic tangent is \fIx\fP. If the \fIx\fP; that is the value whose hyperbolic tangent is \fIx\fP. If the
absolute value of \fIx\fP is greater than 1.0, \fBatanh()\fP returns absolute value of \fIx\fP is greater than 1.0, \fBatanh\fP() returns
not-a-number (NaN) and \fIerrno\fP is set. not-a-number (NaN) and \fIerrno\fP is set.
.SH ERRORS .SH ERRORS
.TP .TP

View File

@ -36,14 +36,14 @@ atof \- convert a string to a double
.BI "double atof(const char *" nptr ); .BI "double atof(const char *" nptr );
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
The \fBatof()\fP function converts the initial portion of the string The \fBatof\fP() function converts the initial portion of the string
pointed to by \fInptr\fP to double. The behaviour is the same as pointed to by \fInptr\fP to double. The behaviour is the same as
.sp .sp
.RS .RS
.B strtod(nptr, (char **)NULL); .B strtod(nptr, (char **)NULL);
.RE .RE
.sp .sp
except that \fBatof()\fP does not detect errors. except that \fBatof\fP() does not detect errors.
.SH "RETURN VALUE" .SH "RETURN VALUE"
The converted value. The converted value.
.SH "CONFORMING TO" .SH "CONFORMING TO"

View File

@ -44,7 +44,7 @@ atoi, atol, atoll, atoq \- convert a string to an integer
.BI "long long atoq(const char *" nptr ); .BI "long long atoq(const char *" nptr );
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
The \fBatoi()\fP function converts the initial portion of the string The \fBatoi\fP() function converts the initial portion of the string
pointed to by \fInptr\fP to pointed to by \fInptr\fP to
.IR int . .IR int .
The behaviour is the same as The behaviour is the same as
@ -53,23 +53,23 @@ The behaviour is the same as
.B strtol(nptr, (char **)NULL, 10); .B strtol(nptr, (char **)NULL, 10);
.RE .RE
.sp .sp
except that \fBatoi()\fP does not detect errors. except that \fBatoi\fP() does not detect errors.
.PP .PP
The \fBatol()\fP and \fBatoll()\fP functions behave the same as The \fBatol\fP() and \fBatoll\fP() functions behave the same as
\fBatoi()\fR, except that they convert the initial portion of the \fBatoi\fR(), except that they convert the initial portion of the
string to their return type of \fIlong\fP or \fIlong long\fP. string to their return type of \fIlong\fP or \fIlong long\fP.
\fBatoq()\fP is an obsolete name for \fBatoll()\fP. \fBatoq\fP() is an obsolete name for \fBatoll\fP().
.SH "RETURN VALUE" .SH "RETURN VALUE"
The converted value. The converted value.
.SH "CONFORMING TO" .SH "CONFORMING TO"
SVID 3, POSIX.1, 4.3BSD, ISO/IEC 9899. ISO/IEC 9899:1990 (C89) and SVID 3, POSIX.1, 4.3BSD, ISO/IEC 9899. ISO/IEC 9899:1990 (C89) and
POSIX.1 (1996 edition) include the functions \fBatoi()\fP and POSIX.1 (1996 edition) include the functions \fBatoi\fP() and
\fBatol()\fP only; C99 adds the function \fBatoll()\fP. \fBatol\fP() only; C99 adds the function \fBatoll\fP().
.SH NOTES .SH NOTES
The non-standard \fBatoq()\fP function is not present in libc 4.6.27 The non-standard \fBatoq\fP() function is not present in libc 4.6.27
or glibc 2, but is present in libc5 and libc 4.7 (though only as an or glibc 2, but is present in libc5 and libc 4.7 (though only as an
inline function in \fB<stdlib.h>\fP until libc 5.4.44). The inline function in \fB<stdlib.h>\fP until libc 5.4.44). The
\fBatoll()\fP function is present in glibc 2 since version 2.0.2, but \fBatoll\fP() function is present in glibc 2 since version 2.0.2, but
not in libc4 or libc5. not in libc4 or libc5.
.SH "SEE ALSO" .SH "SEE ALSO"
.BR atof (3), .BR atof (3),

View File

@ -37,7 +37,7 @@ bcmp \- compare byte sequences
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
The The
.B bcmp() .BR bcmp ()
function compares the two byte sequences function compares the two byte sequences
.I s1 .I s1
and and
@ -47,11 +47,11 @@ of length
each. If they are equal, and in particular if each. If they are equal, and in particular if
.I n .I n
is zero, is zero,
.B bcmp() .BR bcmp ()
returns 0. Otherwise it returns a non-zero result. returns 0. Otherwise it returns a non-zero result.
.SH "RETURN VALUE" .SH "RETURN VALUE"
The The
.B bcmp() .BR bcmp ()
function returns 0 if the byte sequences are equal, function returns 0 if the byte sequences are equal,
otherwise a non-zero result is returned. otherwise a non-zero result is returned.
.SH "CONFORMING TO" .SH "CONFORMING TO"

View File

@ -39,7 +39,7 @@ bcopy \- copy byte sequence
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
The The
.B bcopy() .BR bcopy ()
function copies function copies
.I n .I n
bytes from bytes from

View File

@ -13,7 +13,7 @@ bindresvport \- bind a socket to a privileged IP port
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
.LP .LP
.B bindresvport() .BR bindresvport ()
is used to bind a socket descriptor to a privileged is used to bind a socket descriptor to a privileged
.SM IP .SM IP
port, that is, a port, that is, a

View File

@ -39,7 +39,7 @@ bsearch \- binary search of a sorted array
.RE .RE
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
The \fBbsearch()\fP function searches an array of \fInmemb\fP objects, The \fBbsearch\fP() function searches an array of \fInmemb\fP objects,
the initial member of which is pointed to by \fIbase\fP, for a member the initial member of which is pointed to by \fIbase\fP, for a member
that matches the object pointed to by \fIkey\fP. The size of each member that matches the object pointed to by \fIkey\fP. The size of each member
of the array is specified by \fIsize\fP. of the array is specified by \fIsize\fP.
@ -52,14 +52,14 @@ less than, equal to, or greater than zero if the \fIkey\fP object is found,
respectively, to be less than, to match, or be greater than the array respectively, to be less than, to match, or be greater than the array
member. member.
.SH "RETURN VALUE" .SH "RETURN VALUE"
The \fBbsearch()\fP function returns a pointer to a matching member of the The \fBbsearch\fP() function returns a pointer to a matching member of the
array, or NULL if no match is found. If there are multiple elements that array, or NULL if no match is found. If there are multiple elements that
match the key, the element returned is unspecified. match the key, the element returned is unspecified.
.SH EXAMPLE .SH EXAMPLE
The example below first sorts an array of structures using The example below first sorts an array of structures using
.BR qsort (3), .BR qsort (3),
then retrieves desired elements using then retrieves desired elements using
.BR bsearch() . .BR bsearch ().
.sp .sp
.nf .nf
#include <stdio.h> #include <stdio.h>

View File

@ -44,16 +44,16 @@ byte order
.BI "uint16_t ntohs(uint16_t " netshort ); .BI "uint16_t ntohs(uint16_t " netshort );
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
The \fBhtonl()\fP function converts the unsigned integer \fIhostlong\fP The \fBhtonl\fP() function converts the unsigned integer \fIhostlong\fP
from host byte order to network byte order. from host byte order to network byte order.
.PP .PP
The \fBhtons()\fP function converts the unsigned short integer \fIhostshort\fP The \fBhtons\fP() function converts the unsigned short integer \fIhostshort\fP
from host byte order to network byte order. from host byte order to network byte order.
.PP .PP
The \fBntohl()\fP function converts the unsigned integer \fInetlong\fP The \fBntohl\fP() function converts the unsigned integer \fInetlong\fP
from network byte order to host byte order. from network byte order to host byte order.
.PP .PP
The \fBntohs()\fP function converts the unsigned short integer \fInetshort\fP The \fBntohs\fP() function converts the unsigned short integer \fInetshort\fP
from network byte order to host byte order. from network byte order to host byte order.
.PP .PP
On the i80x86 the host byte order is Least Significant Byte first, On the i80x86 the host byte order is Least Significant Byte first,

View File

@ -37,7 +37,7 @@ bzero \- write zero bytes
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
The The
.B bzero() .BR bzero ()
function sets the first function sets the first
.I n .I n
bytes of the byte area starting at bytes of the byte area starting at

View File

@ -35,7 +35,7 @@ catgets \- get message from a message catalog
.BI "char *catgets(nl_catd " catalog ", int " set_number , .BI "char *catgets(nl_catd " catalog ", int " set_number ,
.BI "int " message_number ", const char *" message ); .BI "int " message_number ", const char *" message );
.SH DESCRIPTION .SH DESCRIPTION
.B catgets() .BR catgets ()
reads the message reads the message
.IR message_number , .IR message_number ,
in set in set
@ -49,7 +49,7 @@ is a catalog descriptor returned from an earlier call to
The fourth argument The fourth argument
.I message .I message
points to a default message string which will be returned by points to a default message string which will be returned by
.B catgets() .BR catgets ()
if the identified message catalog is not currently available. The if the identified message catalog is not currently available. The
message-text is contained in an internal buffer area and should be copied by message-text is contained in an internal buffer area and should be copied by
the application if it is to be saved or modified. The return string is the application if it is to be saved or modified. The return string is
@ -57,11 +57,11 @@ always terminated with a null byte.
.SH "RETURN VALUE" .SH "RETURN VALUE"
.LP .LP
On success, On success,
.B catgets() .BR catgets ()
returns a pointer to an internal buffer area returns a pointer to an internal buffer area
containing the null-terminated message string. containing the null-terminated message string.
On failure, On failure,
.B catgets() .BR catgets ()
returns the value returns the value
.IR message . .IR message .
.SH NOTES .SH NOTES

View File

@ -34,7 +34,7 @@ catopen, catclose \- open/close a message catalog
.BI "int catclose(nl_catd " catalog ); .BI "int catclose(nl_catd " catalog );
.SH DESCRIPTION .SH DESCRIPTION
The function The function
.B catopen() .BR catopen ()
opens a message catalog and returns a catalog descriptor. opens a message catalog and returns a catalog descriptor.
The descriptor remains valid until catclose() or exec(). The descriptor remains valid until catclose() or exec().
If a file descriptor is used to implement catalog descriptors If a file descriptor is used to implement catalog descriptors
@ -83,7 +83,7 @@ open catalog descriptors.
The The
.I flag .I flag
argument to argument to
.B catopen() .BR catopen ()
is used to indicate the source for the language to use. is used to indicate the source for the language to use.
If it is set to If it is set to
.B NL_CAT_LOCALE .B NL_CAT_LOCALE
@ -94,7 +94,7 @@ Otherwise it will use the
environment variable. environment variable.
.LP .LP
The function The function
.B catclose() .BR catclose ()
closes the message catalog identified by closes the message catalog identified by
.IR catalog . .IR catalog .
It invalidates any subsequent references to the message catalog It invalidates any subsequent references to the message catalog
@ -103,7 +103,7 @@ defined by
.LP .LP
.SH "RETURN VALUE" .SH "RETURN VALUE"
The function The function
.B catopen() .BR catopen ()
returns a message catalog descriptor of type returns a message catalog descriptor of type
.I nl_catd .I nl_catd
on success. on success.
@ -112,11 +112,11 @@ and sets
.I errno .I errno
to indicate the error. The possible error values include all to indicate the error. The possible error values include all
possible values for the possible values for the
.I open() .IR open ()
call. call.
.LP .LP
The function The function
.B catclose() .BR catclose ()
returns 0 on success, or \-1 on failure. returns 0 on success, or \-1 on failure.
.SH ENVIRONMENT .SH ENVIRONMENT
.TP .TP
@ -145,7 +145,7 @@ is a mmap()'ed area of memory and not a file descriptor.
The The
.I flag .I flag
argument to argument to
.B catopen() .BR catopen ()
should be either should be either
.B MCLoadBySet .B MCLoadBySet
(=0) or (=0) or

View File

@ -41,11 +41,11 @@ cbrt, cbrtf, cbrtl \- cube root function
.sp .sp
Link with \-lm. Link with \-lm.
.SH DESCRIPTION .SH DESCRIPTION
The \fBcbrt()\fP function returns the (real) cube root of \fIx\fP. The \fBcbrt\fP() function returns the (real) cube root of \fIx\fP.
This function cannot fail; every representable real value has a This function cannot fail; every representable real value has a
representable real cube root. representable real cube root.
.SH "CONFORMING TO" .SH "CONFORMING TO"
.B cbrt() .BR cbrt ()
was a GNU extension. It is now a C99 requirement. was a GNU extension. It is now a C99 requirement.
.SH "SEE ALSO" .SH "SEE ALSO"
.BR pow (3), .BR pow (3),

View File

@ -58,7 +58,7 @@ the maximum value of the exponent is 128 (resp. 1024), and the number
of mantissa bits is 24 (resp. 53).) of mantissa bits is 24 (resp. 53).)
.SH "CONFORMING TO" .SH "CONFORMING TO"
The The
.B ceil() .BR ceil ()
function conforms to SVID 3, POSIX, 4.3BSD, ISO 9899. function conforms to SVID 3, POSIX, 4.3BSD, ISO 9899.
The other functions are from C99. The other functions are from C99.
.SH "SEE ALSO" .SH "SEE ALSO"

View File

@ -46,7 +46,7 @@ This function should never be used. Use
instead. instead.
.SS "1-arg cfree" .SS "1-arg cfree"
In glibc, the function In glibc, the function
.B cfree() .BR cfree ()
is a synonym for is a synonym for
.BR free (3), .BR free (3),
"added for compatibility with SunOS". "added for compatibility with SunOS".
@ -59,7 +59,7 @@ and sometimes in
.LP .LP
.SS "3-arg cfree" .SS "3-arg cfree"
Some SCO and Solaris versions have malloc libraries with a 3-argument Some SCO and Solaris versions have malloc libraries with a 3-argument
.BR cfree() , .BR cfree (),
apparently as an analog to apparently as an analog to
.BR calloc (3). .BR calloc (3).
.LP .LP
@ -72,22 +72,22 @@ If you need it while porting something, add
to your file. to your file.
.LP .LP
A frequently asked question is "Can I use A frequently asked question is "Can I use
.B free() .BR free ()
to free memory allocated with to free memory allocated with
.BR calloc() , .BR calloc (),
or do I need or do I need
.BR cfree() ?" .BR cfree() ?"
Answer: use Answer: use
.BR free() . .BR free ().
.LP .LP
An SCO manual writes: "The cfree routine is provided for compliance An SCO manual writes: "The cfree routine is provided for compliance
to the iBCSe2 standard and simply calls free. The num and size to the iBCSe2 standard and simply calls free. The num and size
arguments to cfree are not used." arguments to cfree are not used."
.SH "RETURN VALUE" .SH "RETURN VALUE"
The SunOS version of The SunOS version of
.B cfree() .BR cfree ()
(which is a synonym for (which is a synonym for
.BR free() ) .BR free ())
returns 1 on success and 0 on failure. returns 1 on success and 0 on failure.
In case of error, In case of error,
.I errno .I errno
@ -97,6 +97,6 @@ was not a pointer to a block previously allocated by
one of the routines in the malloc() family. one of the routines in the malloc() family.
.SH "CONFORMING TO" .SH "CONFORMING TO"
The 3-argument version of The 3-argument version of
.B cfree() .BR cfree ()
as used by SCO conforms to the iBCSe2 standard: as used by SCO conforms to the iBCSe2 standard:
Intel386 Binary Compatibility Specification, Edition 2. Intel386 Binary Compatibility Specification, Edition 2.

View File

@ -31,13 +31,13 @@ clearenv \- clear the environment
.BI "int clearenv(void);" .BI "int clearenv(void);"
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
The \fBclearenv()\fP function clears the environment of all name-value The \fBclearenv\fP() function clears the environment of all name-value
pairs and sets the value of the external variable pairs and sets the value of the external variable
.I environ .I environ
to NULL. to NULL.
.SH "RETURN VALUE" .SH "RETURN VALUE"
The \fBclearenv()\fP function returns zero on success, and a non-zero The \fBclearenv\fP() function returns zero on success, and a non-zero
value on failure. value on failure.
.\" Most versions of Unix return -1 on error, or do not even have errors. .\" Most versions of Unix return -1 on error, or do not even have errors.
.\" Glibc info and the Watcom C library document "a non-zero value". .\" Glibc info and the Watcom C library document "a non-zero value".
@ -48,10 +48,10 @@ Not in libc4, libc5. In glibc since glibc 2.0.
.SH "CONFORMING TO" .SH "CONFORMING TO"
Various Unix variants (DGUX, HPUX, QNX, ...). Various Unix variants (DGUX, HPUX, QNX, ...).
POSIX.9 (bindings for FORTRAN77). POSIX.9 (bindings for FORTRAN77).
POSIX.1-1996 did not accept \fBclearenv()\fP and \fIputenv()\fP, POSIX.1-1996 did not accept \fBclearenv\fP() and \fIputenv\fP(),
but changed its mind and scheduled these functions for some but changed its mind and scheduled these functions for some
later issue of this standard (cf. B.4.6.1). However, SUSv3 later issue of this standard (cf. B.4.6.1). However, SUSv3
only adds \fIputenv()\fP, and rejected \fBclearenv()\fP. only adds \fIputenv\fP(), and rejected \fBclearenv\fP().
.SH NOTES .SH NOTES
Used in security-conscious applications. If it is unavailable Used in security-conscious applications. If it is unavailable
@ -66,12 +66,12 @@ will probably do.
The DGUX and Tru64 manpages write: If The DGUX and Tru64 manpages write: If
.I environ .I environ
has been modified by anything other than the has been modified by anything other than the
.IR putenv() , .IR putenv (),
.IR getenv() , .IR getenv (),
or or
.IR clearenv() .IR clearenv ()
functions, then functions, then
.BR clearenv() .BR clearenv ()
will return an error and the process environment will remain unchanged. will return an error and the process environment will remain unchanged.
.\" .LP .\" .LP
.\" HPUX has a ENOMEM error return. .\" HPUX has a ENOMEM error return.

View File

@ -35,7 +35,7 @@ clock \- Determine processor time
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
The The
.B clock() .BR clock ()
function returns an approximation of processor time used by the program. function returns an approximation of processor time used by the program.
.SH "RETURN VALUE" .SH "RETURN VALUE"
The value returned is the CPU time used so far as a The value returned is the CPU time used so far as a
@ -51,7 +51,7 @@ of the actual resolution.
.SH NOTES .SH NOTES
The C standard allows for arbitrary values at the start of the program; The C standard allows for arbitrary values at the start of the program;
subtract the value returned from a call to subtract the value returned from a call to
.B clock() .BR clock ()
at the start of the program to get maximum portability. at the start of the program to get maximum portability.
.PP .PP
Note that the time can wrap around. On a 32bit system where Note that the time can wrap around. On a 32bit system where
@ -73,7 +73,7 @@ value returned by
.\" POSIX 1003.1-2001 doesn't explicitly allow this, nor is there an .\" POSIX 1003.1-2001 doesn't explicitly allow this, nor is there an
.\" explicit prohibition. -- MTK .\" explicit prohibition. -- MTK
The The
.B times() .BR times ()
function, which explicitly returns (separate) information about the function, which explicitly returns (separate) information about the
caller and its children, may be preferable. caller and its children, may be preferable.
.SH "SEE ALSO" .SH "SEE ALSO"

View File

@ -38,11 +38,11 @@ closedir \- close a directory
.BI "int closedir(DIR *" dir ); .BI "int closedir(DIR *" dir );
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
The \fBclosedir()\fP function closes the directory stream associated with The \fBclosedir\fP() function closes the directory stream associated with
\fIdir\fP. The directory stream descriptor \fIdir\fP is not available \fIdir\fP. The directory stream descriptor \fIdir\fP is not available
after this call. after this call.
.SH "RETURN VALUE" .SH "RETURN VALUE"
The \fBclosedir()\fP function returns 0 on success. The \fBclosedir\fP() function returns 0 on success.
On error, \-1 is returned, and On error, \-1 is returned, and
.I errno .I errno
is set appropriately. is set appropriately.

View File

@ -40,7 +40,7 @@ or
.BI "size_t confstr(int " "name" ", char *" buf ", size_t " len ); .BI "size_t confstr(int " "name" ", char *" buf ", size_t " len );
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
.B confstr() .BR confstr ()
gets the value of configuration-dependent string variables. gets the value of configuration-dependent string variables.
.PP .PP
The The
@ -69,14 +69,14 @@ is not
and and
.I len .I len
is not zero, is not zero,
.B confstr() .BR confstr ()
copies the value of the string to copies the value of the string to
.I buf .I buf
truncated to truncated to
.I len \- 1 .I len \- 1
characters if necessary, with a null character as termination. characters if necessary, with a null character as termination.
This can be detected by comparing the return value of This can be detected by comparing the return value of
.B confstr() .BR confstr ()
against against
.IR len . .IR len .
.PP .PP
@ -86,13 +86,13 @@ is zero and
.I buf .I buf
is is
.BR NULL , .BR NULL ,
.B confstr() .BR confstr ()
just returns the value as defined below. just returns the value as defined below.
.SH "RETURN VALUE" .SH "RETURN VALUE"
If If
.I name .I name
does not correspond to a valid configuration variable, does not correspond to a valid configuration variable,
.B confstr() .BR confstr ()
returns 0. returns 0.
.SH EXAMPLES .SH EXAMPLES
The following code fragment determines the path where to find The following code fragment determines the path where to find

View File

@ -42,11 +42,11 @@ copysign, copysignf, copysignl \- copy sign of a number
.sp .sp
Link with \-lm. Link with \-lm.
.SH DESCRIPTION .SH DESCRIPTION
The \fBcopysign()\fP functions return a value whose absolute value matches The \fBcopysign\fP() functions return a value whose absolute value matches
that of \fIx\fP, but whose sign matches that of \fIy\fP. that of \fIx\fP, but whose sign matches that of \fIy\fP.
If \fIx\fP is a NaN, then a NaN with the sign of \fIy\fP is returned. If \fIx\fP is a NaN, then a NaN with the sign of \fIy\fP is returned.
.SH NOTES .SH NOTES
The \fBcopysign()\fP functions may treat a negative zero as positive. The \fBcopysign\fP() functions may treat a negative zero as positive.
.SH "CONFORMING TO" .SH "CONFORMING TO"
C99, 4.3BSD. C99, 4.3BSD.
This function is defined in IEC 559 (and the appendix with This function is defined in IEC 559 (and the appendix with

View File

@ -43,10 +43,10 @@ cos, cosf, cosl \- cosine function
.sp .sp
Link with \-lm. Link with \-lm.
.SH DESCRIPTION .SH DESCRIPTION
The \fBcos()\fP function returns the cosine of \fIx\fP, where \fIx\fP is The \fBcos\fP() function returns the cosine of \fIx\fP, where \fIx\fP is
given in radians. given in radians.
.SH "RETURN VALUE" .SH "RETURN VALUE"
The \fBcos()\fP function returns a value between \-1 and 1. The \fBcos\fP() function returns a value between \-1 and 1.
.SH "CONFORMING TO" .SH "CONFORMING TO"
SVID 3, POSIX, 4.3BSD, ISO 9899. SVID 3, POSIX, 4.3BSD, ISO 9899.
The float and the long double variants are C99 requirements. The float and the long double variants are C99 requirements.

View File

@ -45,7 +45,7 @@ cosh, coshf, coshl \- hyperbolic cosine function
.sp .sp
Link with \-lm. Link with \-lm.
.SH DESCRIPTION .SH DESCRIPTION
The \fBcosh()\fP function returns the hyperbolic cosine of \fIx\fP, which The \fBcosh\fP() function returns the hyperbolic cosine of \fIx\fP, which
is defined mathematically as (exp(x) + exp(\-x)) / 2. is defined mathematically as (exp(x) + exp(\-x)) / 2.
.SH "CONFORMING TO" .SH "CONFORMING TO"
SVID 3, POSIX, 4.3BSD, ISO 9899 (C99). SVID 3, POSIX, 4.3BSD, ISO 9899 (C99).

View File

@ -31,7 +31,7 @@ ctermid \- get controlling terminal name
.BI "char *ctermid(char *" "s" ); .BI "char *ctermid(char *" "s" );
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
.B ctermid() .BR ctermid ()
returns a string which is the pathname for the current controlling terminal for this returns a string which is the pathname for the current controlling terminal for this
process. process.
If If

View File

@ -57,13 +57,13 @@ localtime_r \- transform date and time to broken-down time or ASCII
.BI "time_t mktime(struct tm *" tm ); .BI "time_t mktime(struct tm *" tm );
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
The \fBctime()\fP, \fBgmtime()\fP and \fBlocaltime()\fP functions all take The \fBctime\fP(), \fBgmtime\fP() and \fBlocaltime\fP() functions all take
an argument of data type \fItime_t\fP which represents calendar time. an argument of data type \fItime_t\fP which represents calendar time.
When interpreted as an absolute time value, it represents the number of When interpreted as an absolute time value, it represents the number of
seconds elapsed since 00:00:00 on January 1, 1970, Coordinated Universal seconds elapsed since 00:00:00 on January 1, 1970, Coordinated Universal
Time (UTC). Time (UTC).
.PP .PP
The \fBasctime()\fP and \fBmktime()\fP functions both take an argument The \fBasctime\fP() and \fBmktime\fP() functions both take an argument
representing broken-down time which is a representation representing broken-down time which is a representation
separated into year, month, day, etc. separated into year, month, day, etc.
.PP .PP
@ -140,19 +140,19 @@ might be overwritten by subsequent calls to any of the date and time
functions. The function also sets the external variable \fItzname\fP (see functions. The function also sets the external variable \fItzname\fP (see
.BR tzset (3)) .BR tzset (3))
with information about the current time zone. with information about the current time zone.
The re-entrant version \fBctime_r()\fP does the same, but stores the The re-entrant version \fBctime_r\fP() does the same, but stores the
string in a user-supplied buffer of length at least 26. It need not string in a user-supplied buffer of length at least 26. It need not
set \fItzname\fP. set \fItzname\fP.
.PP .PP
The \fBgmtime()\fP function converts the calendar time \fItimep\fP to The \fBgmtime\fP() function converts the calendar time \fItimep\fP to
broken-down time representation, expressed in Coordinated Universal Time broken-down time representation, expressed in Coordinated Universal Time
(UTC). It may return NULL when the year does not fit into an integer. (UTC). It may return NULL when the year does not fit into an integer.
The return value points to a statically allocated struct which might be The return value points to a statically allocated struct which might be
overwritten by subsequent calls to any of the date and time functions. overwritten by subsequent calls to any of the date and time functions.
The \fBgmtime_r()\fP function does the same, but stores the data in a The \fBgmtime_r\fP() function does the same, but stores the data in a
user-supplied struct. user-supplied struct.
.PP .PP
The \fBlocaltime()\fP function converts the calendar time \fItimep\fP to The \fBlocaltime\fP() function converts the calendar time \fItimep\fP to
broken-time representation, expressed relative to the user's specified broken-time representation, expressed relative to the user's specified
time zone. The function acts as if it called time zone. The function acts as if it called
.BR tzset (3) .BR tzset (3)
@ -163,45 +163,45 @@ seconds, and \fIdaylight\fP to a non-zero value if daylight savings
time rules apply during some part of the year. time rules apply during some part of the year.
The return value points to a statically allocated struct which might be The return value points to a statically allocated struct which might be
overwritten by subsequent calls to any of the date and time functions. overwritten by subsequent calls to any of the date and time functions.
The \fBlocaltime_r()\fP function does the same, but stores the data in a The \fBlocaltime_r\fP() function does the same, but stores the data in a
user-supplied struct. It need not set \fItzname\fP. user-supplied struct. It need not set \fItzname\fP.
.PP .PP
The \fBasctime()\fP function converts the broken-down time value The \fBasctime\fP() function converts the broken-down time value
\fItm\fP into a string with the same format as \fBctime()\fP. \fItm\fP into a string with the same format as \fBctime\fP().
The return value points to a statically allocated string which might be The return value points to a statically allocated string which might be
overwritten by subsequent calls to any of the date and time functions. overwritten by subsequent calls to any of the date and time functions.
The \fBasctime_r()\fP function does the same, but stores the string in The \fBasctime_r\fP() function does the same, but stores the string in
a user-supplied buffer of length at least 26. a user-supplied buffer of length at least 26.
.PP .PP
The \fBmktime()\fP function converts a broken-down time structure, expressed The \fBmktime\fP() function converts a broken-down time structure, expressed
as local time, to calendar time representation. The function ignores as local time, to calendar time representation. The function ignores
the specified contents of the structure members \fItm_wday\fP and \fItm_yday\fP the specified contents of the structure members \fItm_wday\fP and \fItm_yday\fP
and recomputes them from the other information in the broken-down time and recomputes them from the other information in the broken-down time
structure. structure.
If structure members are outside their legal interval, they will be If structure members are outside their legal interval, they will be
normalized (so that, e.g., 40 October is changed into 9 November). normalized (so that, e.g., 40 October is changed into 9 November).
Calling \fBmktime()\fP also sets the external variable \fItzname\fP with Calling \fBmktime\fP() also sets the external variable \fItzname\fP with
information about the current time zone. If the specified broken-down information about the current time zone. If the specified broken-down
time cannot be represented as calendar time (seconds since the epoch), time cannot be represented as calendar time (seconds since the epoch),
\fBmktime()\fP returns a value of (time_t)(\-1) and does not alter the \fBmktime\fP() returns a value of (time_t)(\-1) and does not alter the
\fItm_wday\fP and \fItm_yday\fP members of the broken-down time structure. \fItm_wday\fP and \fItm_yday\fP members of the broken-down time structure.
.SH "RETURN VALUE" .SH "RETURN VALUE"
Each of these functions returns the value described, or NULL Each of these functions returns the value described, or NULL
(\-1 in case of \fBmktime()\fP) in case an error was detected. (\-1 in case of \fBmktime\fP()) in case an error was detected.
.SH NOTES .SH NOTES
The four functions The four functions
.BR asctime() , .BR asctime (),
.BR ctime() , .BR ctime (),
.B gmtime() .BR gmtime ()
and and
.B localtime() .BR localtime ()
return a pointer to static data and hence are not thread-safe. return a pointer to static data and hence are not thread-safe.
Thread-safe versions Thread-safe versions
.BR asctime_r() , .BR asctime_r (),
.BR ctime_r() , .BR ctime_r (),
.B gmtime_r() .BR gmtime_r ()
and and
.BR localtime_r() .BR localtime_r ()
are specified by SUSv2, and available since libc 5.2.5. are specified by SUSv2, and available since libc 5.2.5.
.LP .LP
In many implementations, including In many implementations, including

View File

@ -58,7 +58,7 @@ will redirect standard input, standard output and standard error
to \fI/dev/null\fP. to \fI/dev/null\fP.
.SH "RETURN VALUE" .SH "RETURN VALUE"
(This function forks, and if the (This function forks, and if the
.B fork() .BR fork ()
succeeds, the parent does succeeds, the parent does
.\" not .IR in order not to underline _ .\" not .IR in order not to underline _
.BR _exit (0), .BR _exit (0),

View File

@ -35,7 +35,7 @@ difftime \- calculate time difference
.BI "double difftime(time_t " time1 ", time_t " time0 ); .BI "double difftime(time_t " time1 ", time_t " time0 );
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
The \fBdifftime()\fP function returns the number of seconds elapsed The \fBdifftime\fP() function returns the number of seconds elapsed
between time \fItime1\fP and time \fItime0\fP, represented as a double. between time \fItime1\fP and time \fItime0\fP, represented as a double.
The two times are specified in calendar time, which represents the time The two times are specified in calendar time, which represents the time
elapsed since the Epoch elapsed since the Epoch

View File

@ -31,7 +31,7 @@ dirfd \- get directory stream file descriptor
.BI "int dirfd(DIR *" dir ); .BI "int dirfd(DIR *" dir );
.SH DESCRIPTION .SH DESCRIPTION
The function The function
.B dirfd() .BR dirfd ()
returns the file descriptor associated with the directory stream returns the file descriptor associated with the directory stream
.IR dir . .IR dir .
.LP .LP

View File

@ -47,13 +47,13 @@ div, ldiv, lldiv, imaxdiv \- compute quotient and remainder of an integer divisi
.BI "imaxdiv_t imaxdiv(intmax_t " numerator ", intmax_t " denominator ); .BI "imaxdiv_t imaxdiv(intmax_t " numerator ", intmax_t " denominator );
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
The \fBdiv()\fP function computes the value \fInumerator\fP/\fIdenominator\fP and The \fBdiv\fP() function computes the value \fInumerator\fP/\fIdenominator\fP and
returns the quotient and remainder in a structure named \fIdiv_t\fP that contains returns the quotient and remainder in a structure named \fIdiv_t\fP that contains
two integer members (in unspecified order) named \fIquot\fP and \fIrem\fP. two integer members (in unspecified order) named \fIquot\fP and \fIrem\fP.
The quotient is rounded towards zero. The quotient is rounded towards zero.
The result satisfies \fIquot\fP*\fIdenominator\fP+\fIrem\fP = \fInumerator\fP. The result satisfies \fIquot\fP*\fIdenominator\fP+\fIrem\fP = \fInumerator\fP.
.LP .LP
The \fBldiv()\fP and \fBlldiv()\fP and \fBimaxdiv()\fP functions do the same, The \fBldiv\fP() and \fBlldiv\fP() and \fBimaxdiv\fP() functions do the same,
dividing numbers of the indicated type and returning the result in a structure dividing numbers of the indicated type and returning the result in a structure
of the indicated name, in all cases with fields \fIquot\fP and \fIrem\fP of the indicated name, in all cases with fields \fIquot\fP and \fIrem\fP
of the same type as the function arguments. of the same type as the function arguments.

View File

@ -82,7 +82,7 @@ argument is a structure of the following type:
.fi .fi
(The (The
.I ElfW() .IR ElfW ()
macro definition turns its argument into the name of an ELF data macro definition turns its argument into the name of an ELF data
type suitable for the hardware architecture. type suitable for the hardware architecture.
For example, on a 32-bit platform, For example, on a 32-bit platform,

View File

@ -55,20 +55,20 @@ lcong48 \- generate uniformly distributed pseudo-random numbers
These functions generate pseudo-random numbers using the linear congruential These functions generate pseudo-random numbers using the linear congruential
algorithm and 48-bit integer arithmetic. algorithm and 48-bit integer arithmetic.
.PP .PP
The \fBdrand48()\fP and \fBerand48()\fP functions return non-negative The \fBdrand48\fP() and \fBerand48\fP() functions return non-negative
double-precision floating-point values uniformly distributed between double-precision floating-point values uniformly distributed between
[0.0, 1.0). [0.0, 1.0).
.PP .PP
The \fBlrand48()\fP and \fBnrand48()\fP functions return non-negative The \fBlrand48\fP() and \fBnrand48\fP() functions return non-negative
long integers uniformly distributed between 0 and 2^31. long integers uniformly distributed between 0 and 2^31.
.PP .PP
The \fBmrand48()\fP and \fBjrand48()\fP functions return signed long The \fBmrand48\fP() and \fBjrand48\fP() functions return signed long
integers uniformly distributed between \-2^31 and 2^31. integers uniformly distributed between \-2^31 and 2^31.
.PP .PP
The \fBsrand48()\fP, \fBseed48()\fP and \fBlcong48()\fP functions are The \fBsrand48\fP(), \fBseed48\fP() and \fBlcong48\fP() functions are
initialization functions, one of which should be called before using initialization functions, one of which should be called before using
\fBdrand48()\fP, \fBlrand48()\fP or \fBmrand48()\fP. The functions \fBdrand48\fP(), \fBlrand48\fP() or \fBmrand48\fP(). The functions
\fBerand48()\fP, \fBnrand48()\fP and \fBjrand48()\fP do not require \fBerand48\fP(), \fBnrand48\fP() and \fBjrand48\fP() do not require
an initialization function to be called first. an initialization function to be called first.
.PP .PP
All the functions work by generating a sequence of 48-bit integers, All the functions work by generating a sequence of 48-bit integers,
@ -81,7 +81,7 @@ All the functions work by generating a sequence of 48-bit integers,
.fi .fi
.sp .sp
The parameter \fIm\fP = 2^48, hence 48-bit integer arithmetic is performed. The parameter \fIm\fP = 2^48, hence 48-bit integer arithmetic is performed.
Unless \fBlcong48()\fP is called, \fIa\fP and \fIc\fP are given by: Unless \fBlcong48\fP() is called, \fIa\fP and \fIc\fP are given by:
.sp .sp
.nf .nf
.RS .RS
@ -90,36 +90,36 @@ Unless \fBlcong48()\fP is called, \fIa\fP and \fIc\fP are given by:
.RE .RE
.fi .fi
.sp .sp
The value returned by any of the functions \fBdrand48()\fP, \fBerand48()\fP, The value returned by any of the functions \fBdrand48\fP(), \fBerand48\fP(),
\fBlrand48()\fP, \fBnrand48()\fP, \fBmrand48()\fP or \fBjrand48()\fP is \fBlrand48\fP(), \fBnrand48\fP(), \fBmrand48\fP() or \fBjrand48\fP() is
computed by first generating the next 48-bit \fIXi\fP in the sequence. computed by first generating the next 48-bit \fIXi\fP in the sequence.
Then the appropriate number of bits, according to the type of data item to Then the appropriate number of bits, according to the type of data item to
be returned, is copied from the high-order bits of \fIXi\fP and transformed be returned, is copied from the high-order bits of \fIXi\fP and transformed
into the returned value. into the returned value.
.PP .PP
The functions \fBdrand48()\fP, \fBlrand48()\fP and \fBmrand48()\fP store The functions \fBdrand48\fP(), \fBlrand48\fP() and \fBmrand48\fP() store
the last 48-bit \fIXi\fP generated in an internal buffer. The functions the last 48-bit \fIXi\fP generated in an internal buffer. The functions
\fBerand48()\fP, \fBnrand48()\fP and \fBjrand48()\fP require the calling \fBerand48\fP(), \fBnrand48\fP() and \fBjrand48\fP() require the calling
program to provide storage for the successive \fIXi\fP values in the array program to provide storage for the successive \fIXi\fP values in the array
argument \fIxsubi\fP. The functions are initialized by placing the initial argument \fIxsubi\fP. The functions are initialized by placing the initial
value of \fIXi\fP into the array before calling the function for the first value of \fIXi\fP into the array before calling the function for the first
time. time.
.PP .PP
The initializer function \fBsrand48()\fP sets the high order 32-bits of The initializer function \fBsrand48\fP() sets the high order 32-bits of
\fIXi\fP to the argument \fIseedval\fP. The low order 16-bits are set \fIXi\fP to the argument \fIseedval\fP. The low order 16-bits are set
to the arbitrary value 0x330E. to the arbitrary value 0x330E.
.PP .PP
The initializer function \fBseed48()\fP sets the value of \fIXi\fP to The initializer function \fBseed48\fP() sets the value of \fIXi\fP to
the 48-bit value specified in the array argument \fIseed16v\fP. The the 48-bit value specified in the array argument \fIseed16v\fP. The
previous value of \fIXi\fP is copied into an internal buffer and a previous value of \fIXi\fP is copied into an internal buffer and a
pointer to this buffer is returned by \fBseed48()\fP. pointer to this buffer is returned by \fBseed48\fP().
.PP .PP
The initialization function \fBlcong48()\fP allows the user to specify The initialization function \fBlcong48\fP() allows the user to specify
initial values for \fIXi\fP, \fIa\fP and \fIc\fP. Array argument initial values for \fIXi\fP, \fIa\fP and \fIc\fP. Array argument
elements \fIparam[0-2]\fP specify \fIXi\fP, \fIparam[3-5]\fP specify elements \fIparam[0-2]\fP specify \fIXi\fP, \fIparam[3-5]\fP specify
\fIa\fP, and \fIparam[6]\fP specifies \fIc\fP. After \fBlcong48()\fP \fIa\fP, and \fIparam[6]\fP specifies \fIc\fP. After \fBlcong48\fP()
has been called, a subsequent call to either \fBsrand48()\fP or has been called, a subsequent call to either \fBsrand48\fP() or
\fBseed48()\fP will restore the standard values of \fIa\fP and \fIc\fP. \fBseed48\fP() will restore the standard values of \fIa\fP and \fIc\fP.
.SH "CONFORMING TO" .SH "CONFORMING TO"
SVID 3 SVID 3
.SH NOTES .SH NOTES

View File

@ -68,10 +68,10 @@ the supplied data
Before the first use, this struct must be initialized, e.g. Before the first use, this struct must be initialized, e.g.
by filling it with zeroes, or by calling one of the functions by filling it with zeroes, or by calling one of the functions
.BR srand48_r() , .BR srand48_r (),
.BR seed48_r() , .BR seed48_r (),
or or
.BR lcong48_r() . .BR lcong48_r ().
.SH "RETURN VALUE" .SH "RETURN VALUE"
The return value is 0. The return value is 0.
.SH "CONFORMING TO" .SH "CONFORMING TO"

View File

@ -39,7 +39,7 @@ ecvt, fcvt \- convert a floating-point number to a string
.BI "char *fcvt(double " number ", int " ndigits ", int *" decpt , .BI "char *fcvt(double " number ", int " ndigits ", int *" decpt ,
.BI "int *" sign ); .BI "int *" sign );
.SH DESCRIPTION .SH DESCRIPTION
The \fBecvt()\fP function converts \fInumber\fP to a null-terminated The \fBecvt\fP() function converts \fInumber\fP to a null-terminated
string of \fIndigits\fP digits (where \fIndigits\fP is reduced to an string of \fIndigits\fP digits (where \fIndigits\fP is reduced to an
system-specific limit determined by the precision of a double), system-specific limit determined by the precision of a double),
and returns a pointer to the string. The high-order digit is non-zero, and returns a pointer to the string. The high-order digit is non-zero,
@ -55,13 +55,13 @@ it's set to 0. If
.I number .I number
is zero, it is unspecified whether *\fIdecpt\fP is 0 or 1. is zero, it is unspecified whether *\fIdecpt\fP is 0 or 1.
.PP .PP
The \fBfcvt()\fP function is identical to \fBecvt()\fP, except that The \fBfcvt\fP() function is identical to \fBecvt\fP(), except that
\fIndigits\fP specifies the number of digits after the decimal point. \fIndigits\fP specifies the number of digits after the decimal point.
.SH "RETURN VALUE" .SH "RETURN VALUE"
Both the \fBecvt()\fP and \fBfcvt()\fP functions return a pointer to a Both the \fBecvt\fP() and \fBfcvt\fP() functions return a pointer to a
static string containing the ASCII representation of \fInumber\fP. static string containing the ASCII representation of \fInumber\fP.
The static string is overwritten by each call to \fBecvt()\fP or The static string is overwritten by each call to \fBecvt\fP() or
\fBfcvt()\fP. \fBfcvt\fP().
.SH NOTES .SH NOTES
These functions are obsolete. Instead, These functions are obsolete. Instead,
.IR sprintf () .IR sprintf ()

View File

@ -49,9 +49,9 @@ Each of these requires linking with
.BR \-lcrypt . .BR \-lcrypt .
.SH DESCRIPTION .SH DESCRIPTION
These functions encrypt and decrypt 64-bit messages. The These functions encrypt and decrypt 64-bit messages. The
.B setkey() .BR setkey ()
function sets the key used by function sets the key used by
.BR encrypt() . .BR encrypt ().
The The
.I key .I key
parameter used here is an array of 64 bytes, each of which has parameter used here is an array of 64 bytes, each of which has
@ -67,9 +67,9 @@ The result is returned in that same vector.
.PP .PP
These two functions are not reentrant, that is, the key data is These two functions are not reentrant, that is, the key data is
kept in static storage. The functions kept in static storage. The functions
.B setkey_r() .BR setkey_r ()
and and
.B encrypt_r() .BR encrypt_r ()
are the reentrant versions. They use the following are the reentrant versions. They use the following
structure to hold the key data: structure to hold the key data:
.RS .RS
@ -88,7 +88,7 @@ struct crypt_data {
.fi .fi
.RE .RE
Before calling Before calling
.B setkey_r() .BR setkey_r ()
set set
.I data->initialized .I data->initialized
to zero. to zero.
@ -124,14 +124,14 @@ main() {
In glibc2.2 these functions use the DES algorithm. In glibc2.2 these functions use the DES algorithm.
.SH "CONFORMING TO" .SH "CONFORMING TO"
The functions The functions
.B encrypt() .BR encrypt ()
and and
.B setkey() .BR setkey ()
conform to SVID, SUSv2, and POSIX 1003.1-2001. conform to SVID, SUSv2, and POSIX 1003.1-2001.
The functions The functions
.B encrypt_r() .BR encrypt_r ()
and and
.B setkey_r() .BR setkey_r ()
are GNU extensions. are GNU extensions.
.SH "SEE ALSO" .SH "SEE ALSO"
.BR cbc_crypt (3), .BR cbc_crypt (3),

View File

@ -47,7 +47,7 @@ to be the value. If there is no '=', the value is taken to be NULL.
.LP .LP
These functions are for handling envz vectors. These functions are for handling envz vectors.
.LP .LP
.B envz_add() .BR envz_add ()
adds the string adds the string
.RI \&" name = value \&" .RI \&" name = value \&"
(in case (in case
@ -66,14 +66,14 @@ If an entry with the same
.I name .I name
existed, it is removed. existed, it is removed.
.LP .LP
.B envz_entry() .BR envz_entry ()
looks for looks for
.I name .I name
in the envz vector in the envz vector
.RI ( envz , envz_len ) .RI ( envz , envz_len )
and returns the entry if found, or NULL if not. and returns the entry if found, or NULL if not.
.LP .LP
.B envz_get() .BR envz_get ()
looks for looks for
.I name .I name
in the envz vector in the envz vector
@ -84,13 +84,13 @@ an entry for
.I name .I name
without '=' sign.) without '=' sign.)
.LP .LP
.B envz_merge() .BR envz_merge ()
adds each entry in adds each entry in
.I envz2 .I envz2
to to
.RI * envz , .RI * envz ,
as if with as if with
.BR envz_add() . .BR envz_add ().
If If
.I override .I override
is true, then values in is true, then values in
@ -99,7 +99,7 @@ will supersede those with the same name in
.RI * envz , .RI * envz ,
otherwise not. otherwise not.
.LP .LP
.B envz_remove() .BR envz_remove ()
removes the entry for removes the entry for
.I name .I name
from from

View File

@ -50,12 +50,12 @@ erf, erff, erfl, erfc, erfcf, erfcl \- error function and complementary error fu
.fi .fi
Link with \-lm. Link with \-lm.
.SH DESCRIPTION .SH DESCRIPTION
The \fBerf()\fP function returns the error function of \fIx\fP; defined The \fBerf\fP() function returns the error function of \fIx\fP; defined
as as
.TP .TP
erf(x) = 2/sqrt(pi)* integral from 0 to x of exp(\-t*t) dt erf(x) = 2/sqrt(pi)* integral from 0 to x of exp(\-t*t) dt
.PP .PP
The \fBerfc()\fP function returns the complementary error function of The \fBerfc\fP() function returns the complementary error function of
\fIx\fP, that is 1.0 \- erf(x). \fIx\fP, that is 1.0 \- erf(x).
.SH "CONFORMING TO" .SH "CONFORMING TO"
SVID 3, 4.3BSD, C99. SVID 3, 4.3BSD, C99.

View File

@ -326,9 +326,9 @@ if (somecall() == \-1) {
where where
.I errno .I errno
no longer needs to have the value it had upon return from no longer needs to have the value it had upon return from
.IR somecall() .IR somecall ()
(i.e., it may have been changed by the (i.e., it may have been changed by the
.IR printf() ). .IR printf ()).
If the value of If the value of
.I errno .I errno
should be preserved across a library call, it must be saved: should be preserved across a library call, it must be saved:

View File

@ -61,29 +61,29 @@ ether_ntoa_r, ether_aton_r \- Ethernet address manipulation routines
.BI "ether_aton_r(const char *" asc ", struct ether_addr *" addr ); .BI "ether_aton_r(const char *" asc ", struct ether_addr *" addr );
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
\fBether_aton()\fP converts the 48-bit Ethernet host address \fIasc\fP \fBether_aton\fP() converts the 48-bit Ethernet host address \fIasc\fP
from the standard hex-digits-and-colons notation into binary data in from the standard hex-digits-and-colons notation into binary data in
network byte order and returns a pointer to it in a statically network byte order and returns a pointer to it in a statically
allocated buffer, which subsequent calls will allocated buffer, which subsequent calls will
overwrite. \fBether_aton\fP() returns NULL if the address is invalid. overwrite. \fBether_aton\fP() returns NULL if the address is invalid.
.PP .PP
The \fBether_ntoa()\fP function converts the Ethernet host address The \fBether_ntoa\fP() function converts the Ethernet host address
\fIaddr\fP given in network byte order to a string in standard \fIaddr\fP given in network byte order to a string in standard
hex-digits-and-colons notation, omitting leading zeroes. hex-digits-and-colons notation, omitting leading zeroes.
The string is returned in a statically allocated buffer, The string is returned in a statically allocated buffer,
which subsequent calls will overwrite. which subsequent calls will overwrite.
.PP .PP
The \fBether_ntohost()\fP function maps an Ethernet address to the The \fBether_ntohost\fP() function maps an Ethernet address to the
corresponding hostname in corresponding hostname in
.B /etc/ethers .B /etc/ethers
and returns non-zero if it cannot be found. and returns non-zero if it cannot be found.
.PP .PP
The \fBether_hostton()\fP function maps a hostname to the The \fBether_hostton\fP() function maps a hostname to the
corresponding Ethernet address in corresponding Ethernet address in
.B /etc/ethers .B /etc/ethers
and returns non-zero if it cannot be found. and returns non-zero if it cannot be found.
.PP .PP
The \fBether_line()\fP function parses a line in The \fBether_line\fP() function parses a line in
.B /etc/ethers .B /etc/ethers
format (ethernet address followed by whitespace followed by format (ethernet address followed by whitespace followed by
hostname; '#' introduces a comment) and returns an address hostname; '#' introduces a comment) and returns an address

View File

@ -45,7 +45,7 @@ exp, expf, expl \- base-e exponential function
.sp .sp
Link with \-lm. Link with \-lm.
.SH DESCRIPTION .SH DESCRIPTION
The \fBexp()\fP function returns the value of e (the base of natural The \fBexp\fP() function returns the value of e (the base of natural
logarithms) raised to the power of \fIx\fP. logarithms) raised to the power of \fIx\fP.
.SH "CONFORMING TO" .SH "CONFORMING TO"
SVID 3, POSIX, 4.3BSD, ISO 9899. SVID 3, POSIX, 4.3BSD, ISO 9899.

View File

@ -46,7 +46,7 @@ exp10, exp10f, exp10l \- base-10 exponential function
.sp .sp
Link with \-lm. Link with \-lm.
.SH DESCRIPTION .SH DESCRIPTION
The \fBexp10()\fP function returns the value of 10 The \fBexp10\fP() function returns the value of 10
raised to the power of \fIx\fP. raised to the power of \fIx\fP.
.SH "CONFORMING TO" .SH "CONFORMING TO"
The function is a GNU extension. The function is a GNU extension.

View File

@ -45,7 +45,7 @@ exp2, exp2f, exp2l \- base-2 exponential function
.sp .sp
Compile with \-std=c99; link with \-lm. Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION .SH DESCRIPTION
The \fBexp2()\fP function returns the value of 2 The \fBexp2\fP() function returns the value of 2
raised to the power of \fIx\fP. raised to the power of \fIx\fP.
.SH "CONFORMING TO" .SH "CONFORMING TO"
SVID 3, POSIX, 4.3BSD, ISO 9899. SVID 3, POSIX, 4.3BSD, ISO 9899.

View File

@ -49,7 +49,7 @@ number \fIx\fP.
No errors can occur. No errors can occur.
.SH "CONFORMING TO" .SH "CONFORMING TO"
The The
.B fabs() .BR fabs ()
function conforms to SVID 3, POSIX, 4.3BSD, ISO 9899. function conforms to SVID 3, POSIX, 4.3BSD, ISO 9899.
The other functions are from C99. The other functions are from C99.
.SH "SEE ALSO" .SH "SEE ALSO"

View File

@ -86,7 +86,7 @@ for any of the errors specified for the routine
.BR write (2). .BR write (2).
.SH NOTES .SH NOTES
Note that Note that
.B fflush() .BR fflush ()
only flushes the user space buffers provided by the C library. only flushes the user space buffers provided by the C library.
To ensure that the data is physically stored on disk To ensure that the data is physically stored on disk
the kernel buffers must be flushed too, e.g. with the kernel buffers must be flushed too, e.g. with
@ -95,7 +95,7 @@ or
.BR fsync (2). .BR fsync (2).
.SH "CONFORMING TO" .SH "CONFORMING TO"
The function The function
.BR fflush() .BR fflush ()
conforms to ANSI X3.159-1989 (``ANSI C''). conforms to ANSI X3.159-1989 (``ANSI C'').
.SH "SEE ALSO" .SH "SEE ALSO"
.BR fsync (2), .BR fsync (2),

View File

@ -46,12 +46,12 @@ ffs \- find first bit set in a word
.BI "int ffsll(long long int " i ); .BI "int ffsll(long long int " i );
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
The \fBffs()\fP function returns the position of the first The \fBffs\fP() function returns the position of the first
(least significant) bit set in the word \fIi\fP. (least significant) bit set in the word \fIi\fP.
The least significant bit is position 1 and the The least significant bit is position 1 and the
most significant position e.g. 32 or 64. most significant position e.g. 32 or 64.
.BR .BR
The functions \fBffsll()\fP and \fBffsl()\fP do the same but take The functions \fBffsll\fP() and \fBffsl\fP() do the same but take
arguments of possibly different size. arguments of possibly different size.
.SH "RETURN VALUE" .SH "RETURN VALUE"
These functions return the position of the first bit set, These functions return the position of the first bit set,

View File

@ -37,7 +37,7 @@ fgetgrent \- get group file entry
.BI "struct group *fgetgrent(FILE *" stream ); .BI "struct group *fgetgrent(FILE *" stream );
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
The \fBfgetgrent()\fP function returns a pointer to a structure containing The \fBfgetgrent\fP() function returns a pointer to a structure containing
the group information from the file \fIstream\fP. The first time it is called the group information from the file \fIstream\fP. The first time it is called
it returns the first entry; thereafter, it returns successive entries. The it returns the first entry; thereafter, it returns successive entries. The
file \fIstream\fP must have the same format as \fI/etc/group\fP. file \fIstream\fP must have the same format as \fI/etc/group\fP.
@ -57,7 +57,7 @@ struct group {
.fi .fi
.RE .RE
.SH "RETURN VALUE" .SH "RETURN VALUE"
The \fBfgetgrent()\fP function returns the group information structure, The \fBfgetgrent\fP() function returns the group information structure,
or NULL if there are no more entries or an error occurs. or NULL if there are no more entries or an error occurs.
.SH ERRORS .SH ERRORS
.TP .TP

View File

@ -40,7 +40,7 @@ fgetpwent \- get password file entry
.BI "struct passwd *fgetpwent(FILE *" stream ); .BI "struct passwd *fgetpwent(FILE *" stream );
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
The \fBfgetpwent()\fP function returns a pointer to a structure containing The \fBfgetpwent\fP() function returns a pointer to a structure containing
the broken out fields of a line in the file \fIstream\fP. The first time the broken out fields of a line in the file \fIstream\fP. The first time
it is called it returns the first entry; thereafter, it returns successive it is called it returns the first entry; thereafter, it returns successive
entries. The file \fIstream\fP must have the same format as entries. The file \fIstream\fP must have the same format as
@ -64,7 +64,7 @@ struct passwd {
.fi .fi
.RE .RE
.SH "RETURN VALUE" .SH "RETURN VALUE"
The \fBfgetpwent()\fP function returns the passwd structure, or NULL if The \fBfgetpwent\fP() function returns the passwd structure, or NULL if
there are no more entries or an error occurs. there are no more entries or an error occurs.
.SH ERRORS .SH ERRORS
.TP .TP

View File

@ -62,19 +62,19 @@ the non-locking versions of the stdio functions: with
\fIgetc_unlocked\fP() and \fIputc_unlocked\fP() instead of \fIgetc_unlocked\fP() and \fIputc_unlocked\fP() instead of
\fIgetc\fP() and \fIputc\fP(). \fIgetc\fP() and \fIputc\fP().
.LP .LP
The \fBflockfile()\fP function waits for *\fIfilehandle\fP to be The \fBflockfile\fP() function waits for *\fIfilehandle\fP to be
no longer locked by a different thread, then makes the no longer locked by a different thread, then makes the
current thread owner of *\fIfilehandle\fP, and increments current thread owner of *\fIfilehandle\fP, and increments
the lockcount. the lockcount.
.LP .LP
The \fBfunlockfile()\fP function decrements the lock count. The \fBfunlockfile\fP() function decrements the lock count.
.LP .LP
The \fBftrylockfile()\fP function is a non-blocking version The \fBftrylockfile\fP() function is a non-blocking version
of \fBflockfile()\fP. It does nothing in case some other thread of \fBflockfile\fP(). It does nothing in case some other thread
owns *\fIfilehandle\fP, and it obtains ownership and increments owns *\fIfilehandle\fP, and it obtains ownership and increments
the lockcount otherwise. the lockcount otherwise.
.SH "RETURN VALUE" .SH "RETURN VALUE"
The \fBftrylockfile()\fP function returns zero for success The \fBftrylockfile\fP() function returns zero for success
(the lock was obtained), and non-zero for failure. (the lock was obtained), and non-zero for failure.
.SH ERRORS .SH ERRORS
None. None.

View File

@ -58,7 +58,7 @@ the maximum value of the exponent is 128 (resp. 1024), and the number
of mantissa bits is 24 (resp. 53).) of mantissa bits is 24 (resp. 53).)
.SH "CONFORMING TO" .SH "CONFORMING TO"
The The
.B floor() .BR floor ()
function conforms to SVID 3, POSIX, 4.3BSD, ISO 9899. function conforms to SVID 3, POSIX, 4.3BSD, ISO 9899.
The other functions are from C99. The other functions are from C99.
.SH "SEE ALSO" .SH "SEE ALSO"

View File

@ -20,7 +20,7 @@ fma, fmaf, fmal \- floating-point multiply and add
Compile with \-std=c99; link with \-lm. Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION .SH DESCRIPTION
The The
.B fma() .BR fma ()
function computes function computes
.IR x " * " y " + " z . .IR x " * " y " + " z .
The result is rounded according to the The result is rounded according to the

View File

@ -44,11 +44,11 @@ fmod, fmodf, fmodl \- floating-point remainder function
.sp .sp
Link with \-lm. Link with \-lm.
.SH DESCRIPTION .SH DESCRIPTION
The \fBfmod()\fP function computes the remainder of dividing \fIx\fP by The \fBfmod\fP() function computes the remainder of dividing \fIx\fP by
\fIy\fP. The return value is \fIx\fP \- \fIn\fP * \fIy\fP, where \fIn\fP \fIy\fP. The return value is \fIx\fP \- \fIn\fP * \fIy\fP, where \fIn\fP
is the quotient of \fIx\fP / \fIy\fP, rounded towards zero to an integer. is the quotient of \fIx\fP / \fIy\fP, rounded towards zero to an integer.
.SH "RETURN VALUE" .SH "RETURN VALUE"
The \fBfmod()\fP function returns the remainder, unless \fIy\fP is zero, The \fBfmod\fP() function returns the remainder, unless \fIy\fP is zero,
when the function fails and \fIerrno\fP is set. when the function fails and \fIerrno\fP is set.
.SH ERRORS .SH ERRORS
.TP .TP

View File

@ -136,7 +136,7 @@ This value is printed as WARNING.
This value is printed as INFO. This value is printed as INFO.
.PP .PP
The numeric values are between 0 and 4. Using The numeric values are between 0 and 4. Using
.B addseverity() .BR addseverity ()
or the environment variable or the environment variable
.B SEV_LEVEL .B SEV_LEVEL
you can add more levels and strings to print. you can add more levels and strings to print.
@ -174,22 +174,22 @@ severity-keyword,level,printstring
.RE .RE
.sp .sp
then then
.I fmtmsg() .IR fmtmsg ()
will also accept the indicated values for the level (in addition to will also accept the indicated values for the level (in addition to
the standard levels 0-4), and use the indicated printstring when the standard levels 0-4), and use the indicated printstring when
such a level occurs. such a level occurs.
.LP .LP
The severity-keyword part is not used by The severity-keyword part is not used by
.I fmtmsg() .IR fmtmsg ()
but it has to be present. but it has to be present.
The level part is a string representation of a number. The level part is a string representation of a number.
The numeric value must be a number greater than 4. The numeric value must be a number greater than 4.
This value must be used in the severity parameter of This value must be used in the severity parameter of
.I fmtmsg() .IR fmtmsg ()
to select this class. It is not possible to overwrite to select this class. It is not possible to overwrite
any of the predefined classes. The printstring any of the predefined classes. The printstring
is the string printed when a message of this class is processed by is the string printed when a message of this class is processed by
.IR fmtmsg() . .IR fmtmsg ().
.SH "RETURN VALUES" .SH "RETURN VALUES"
The function can return 4 values: The function can return 4 values:
.TP 12n .TP 12n
@ -207,16 +207,16 @@ Error writing to
Error writing to the console. Error writing to the console.
.SH "CONFORMING TO" .SH "CONFORMING TO"
The functions The functions
.I fmtmsg() .IR fmtmsg ()
and and
.IR addseverity() , .IR addseverity (),
and environment variables and environment variables
.B MSGVERB .B MSGVERB
and and
.B SEV_LEVEL .B SEV_LEVEL
come from System V (XPG4-UNIX). come from System V (XPG4-UNIX).
The function The function
.I fmtmsg() .IR fmtmsg ()
and the environment variable and the environment variable
.B MSGVERB .B MSGVERB
are described in POSIX 1003.1-2001. are described in POSIX 1003.1-2001.

View File

@ -34,7 +34,7 @@ fnmatch \- match filename or pathname
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
The The
.B fnmatch() .BR fnmatch ()
function checks whether the function checks whether the
.I string .I string
argument matches the argument matches the

View File

@ -33,13 +33,13 @@ fpathconf, pathconf \- get configuration values for files
.BI "long pathconf(char *" path ", int " name ); .BI "long pathconf(char *" path ", int " name );
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
.B fpathconf() .BR fpathconf ()
gets a value for the configuration option gets a value for the configuration option
.I name .I name
for the open file descriptor for the open file descriptor
.IR filedes . .IR filedes .
.PP .PP
.B pathconf() .BR pathconf ()
gets a value for configuration option gets a value for configuration option
.I name .I name
for the file name for the file name
@ -49,9 +49,9 @@ The corresponding macros defined in
.B <unistd.h> .B <unistd.h>
are minimum values; if an application wants to take advantage of values are minimum values; if an application wants to take advantage of values
which may change, a call to which may change, a call to
.B fpathconf() .BR fpathconf ()
or or
.B pathconf() .BR pathconf ()
can be made, which may yield more liberal results. can be made, which may yield more liberal results.
.PP .PP
Setting Setting

View File

@ -74,7 +74,7 @@ is positive infinity, and \-1 if
is negative infinity. is negative infinity.
.SH NOTE .SH NOTE
In glibc 2.01 and earlier, In glibc 2.01 and earlier,
.B isinf() .BR isinf ()
returns a non-zero value (actually: 1) if returns a non-zero value (actually: 1) if
.I x .I x
is an infinity (positive or negative). is an infinity (positive or negative).

View File

@ -39,7 +39,7 @@ fpurge, __fpurge \- purge a stream
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
The function The function
.B fpurge() .BR fpurge ()
clears the buffers of the given stream. clears the buffers of the given stream.
For output streams this discards any unwritten output. For output streams this discards any unwritten output.
For input streams this discards any input read from the underlying object For input streams this discards any input read from the underlying object
@ -49,11 +49,11 @@ this includes any text pushed back via \fIungetc\fP(). See also
.BR fflush (3). .BR fflush (3).
.LP .LP
The function The function
.B __fpurge() .BR __fpurge ()
does precisely the same, but without returning a value. does precisely the same, but without returning a value.
.SH "RETURN VALUE" .SH "RETURN VALUE"
Upon successful completion Upon successful completion
.B fpurge() .BR fpurge ()
returns 0. returns 0.
On error, it returns \-1 and sets On error, it returns \-1 and sets
.I errno .I errno

View File

@ -45,10 +45,10 @@ and integral components
.sp .sp
Link with \-lm. Link with \-lm.
.SH DESCRIPTION .SH DESCRIPTION
The \fBfrexp()\fP function is used to split the number \fIx\fP into a The \fBfrexp\fP() function is used to split the number \fIx\fP into a
normalized fraction and an exponent which is stored in \fIexp\fP. normalized fraction and an exponent which is stored in \fIexp\fP.
.SH "RETURN VALUE" .SH "RETURN VALUE"
The \fBfrexp()\fP function returns the normalized fraction. If the The \fBfrexp\fP() function returns the normalized fraction. If the
argument \fIx\fP is not zero, the normalized fraction is \fIx\fP argument \fIx\fP is not zero, the normalized fraction is \fIx\fP
times a power of two, and is always in the range 1/2 (inclusive) to times a power of two, and is always in the range 1/2 (inclusive) to
1 (exclusive). If \fIx\fP is zero, then the normalized fraction is 1 (exclusive). If \fIx\fP is zero, then the normalized fraction is

View File

@ -33,11 +33,11 @@ fseeko, ftello \- seek to or report file position
.BI .BI
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
The \fBfseeko()\fP and \fBftello()\fP functions are identical to The \fBfseeko\fP() and \fBftello\fP() functions are identical to
\fBfseek()\fP and \fBftell()\fP (see \fBfseek\fP() and \fBftell\fP() (see
.BR fseek (3)), .BR fseek (3)),
respectively, except that the \fIoffset\fP argument of \fBfseeko()\fP respectively, except that the \fIoffset\fP argument of \fBfseeko\fP()
and the return value of \fBftello()\fP is of type \fBoff_t\fP and the return value of \fBftello\fP() is of type \fBoff_t\fP
instead of \fBlong\fP. instead of \fBlong\fP.
.LP .LP
On many architectures both \fBoff_t\fP and \fBlong\fP are 32-bit types, On many architectures both \fBoff_t\fP and \fBlong\fP are 32-bit types,

View File

@ -76,7 +76,7 @@ But early glibc2 is buggy and returns 0 there;
glibc 2.1.1 is correct again. glibc 2.1.1 is correct again.
.SH HISTORY .SH HISTORY
The The
.B ftime() .BR ftime ()
function appeared in 4.2BSD. function appeared in 4.2BSD.
.SH "CONFORMING TO" .SH "CONFORMING TO"
4.2BSD, POSIX 1003.1-2001. 4.2BSD, POSIX 1003.1-2001.

View File

@ -79,7 +79,7 @@ which case it will return zero, or until it hits an error other than EACCES
.BR malloc (3) .BR malloc (3)
failure), in which case it will return \-1. failure), in which case it will return \-1.
.PP .PP
Because \fBftw()\fP uses dynamic data structures, the only safe way to Because \fBftw\fP() uses dynamic data structures, the only safe way to
exit out of a tree walk is to return a non-zero value. To handle exit out of a tree walk is to return a non-zero value. To handle
interrupts, for example, mark that the interrupt occurred and return a interrupts, for example, mark that the interrupt occurred and return a
non-zero value\(emdon't use non-zero value\(emdon't use

View File

@ -22,18 +22,18 @@ For the definition of the Gamma function, see
.PP .PP
.SS "*BSD version" .SS "*BSD version"
4.4BSD and FreeBSD libm have a 4.4BSD and FreeBSD libm have a
.B gamma() .BR gamma ()
function that computes the Gamma function, as one would expect. function that computes the Gamma function, as one would expect.
.SS "glibc version" .SS "glibc version"
Glibc has a Glibc has a
.B gamma() .BR gamma ()
function that is equivalent to function that is equivalent to
.B lgamma() .BR lgamma ()
and computes the natural logarithm of the Gamma function. and computes the natural logarithm of the Gamma function.
(This is for compatibility reasons only. Don't use this function.) (This is for compatibility reasons only. Don't use this function.)
.SH HISTORY .SH HISTORY
4.2BSD had a 4.2BSD had a
.B gamma() .BR gamma ()
that computed that computed
.RI ln(|Gamma(| x |)|), .RI ln(|Gamma(| x |)|),
leaving the sign of leaving the sign of
@ -41,7 +41,7 @@ leaving the sign of
in the external integer in the external integer
.IR signgam . .IR signgam .
In 4.3BSD the name was changed to In 4.3BSD the name was changed to
.BR lgamma() , .BR lgamma (),
and the man page promises and the man page promises
.sp .sp
.in +3 .in +3
@ -50,11 +50,11 @@ and used for the Gamma function"
.in .in
.sp .sp
This did indeed happen in 4.4BSD, where This did indeed happen in 4.4BSD, where
.B gamma() .BR gamma ()
computes the Gamma function (with no effect on computes the Gamma function (with no effect on
.IR signgam ). .IR signgam ).
However, this came too late, and we now have However, this came too late, and we now have
.BR tgamma() , .BR tgamma (),
the "true gamma" function. the "true gamma" function.
.\" The FreeBSD man page says about gamma() that it is like lgamma() .\" The FreeBSD man page says about gamma() that it is like lgamma()
.\" except that is does not set signgam. .\" except that is does not set signgam.

View File

@ -35,7 +35,7 @@ gcvt \- convert a floating-point number to a string
.BI "char *gcvt(double " number ", size_t " ndigit ", char *" buf ); .BI "char *gcvt(double " number ", size_t " ndigit ", char *" buf );
.fi .fi
.SH DESCRIPTION .SH DESCRIPTION
The \fBgcvt()\fP function converts \fInumber\fP to a minimal length NULL The \fBgcvt\fP() function converts \fInumber\fP to a minimal length NULL
terminated ASCII string and stores the result in \fIbuf\fP. It produces terminated ASCII string and stores the result in \fIbuf\fP. It produces
\fIndigit\fP significant digits in either \fIndigit\fP significant digits in either
.BR printf (3) .BR printf (3)
@ -45,7 +45,7 @@ This function is obsolete. Instead,
.IR sprintf () .IR sprintf ()
is recommended. is recommended.
.SH "RETURN VALUE" .SH "RETURN VALUE"
The \fBgcvt()\fP function returns the address of the string pointed to The \fBgcvt\fP() function returns the address of the string pointed to
by \fIbuf\fP. by \fIbuf\fP.
.SH "SEE ALSO" .SH "SEE ALSO"
.BR ecvt (3), .BR ecvt (3),

View File

@ -354,7 +354,7 @@ suitable for error reporting.
.SH "CONFORMING TO" .SH "CONFORMING TO"
POSIX 1003.1-2003. POSIX 1003.1-2003.
The The
.B getaddrinfo() .BR getaddrinfo ()
function is documented in RFC\ 2553. function is documented in RFC\ 2553.
.SH "NOTES" .SH "NOTES"
.BR AI_ADDRCONFIG , .BR AI_ADDRCONFIG ,

Some files were not shown because too many files have changed in this diff Show More