CPU_SET.3, INFINITY.3, __ppc_get_timebase.3, __ppc_set_ppr_med.3, __ppc_yield.3, __setfpucw.3, acos.3, acosh.3, adjtime.3, aio_fsync.3, aio_init.3, aio_read.3, aio_return.3, aio_suspend.3, aio_write.3, alloca.3, argz_add.3, asin.3, asinh.3, asprintf.3, assert.3, assert_perror.3, atan.3, atan2.3, atanh.3, atexit.3, backtrace.3, basename.3, bindresvport.3, bsd_signal.3, bsearch.3, bswap.3, btree.3, byteorder.3, bzero.3, canonicalize_file_name.3, carg.3, cbrt.3, ccos.3, ccosh.3, ceil.3, cexp.3, clearenv.3, clock.3, clog.3, clog10.3, clog2.3, confstr.3, copysign.3, cos.3, cosh.3, crypt.3, csin.3, csinh.3, csqrt.3, ctan.3, ctanh.3, ctime.3, dbopen.3, dl_iterate_phdr.3, dladdr.3, dlerror.3, dlinfo.3, dlopen.3, dlsym.3, drand48_r.3, duplocale.3, encrypt.3, end.3, endian.3, envz_add.3, erf.3, erfc.3, err.3, errno.3, error.3, euidaccess.3, exec.3, exp.3, exp10.3, exp2.3, expm1.3, fabs.3, fcloseall.3, fdim.3, fenv.3, ferror.3, fexecve.3, fflush.3, ffs.3, fgetc.3, finite.3, floor.3, fma.3, fmax.3, fmemopen.3, fmin.3, fmod.3, fmtmsg.3, fopen.3, fopencookie.3, fpclassify.3, fpurge.3, fputwc.3, fputws.3, frexp.3, fseek.3, fseeko.3, ftime.3, fts.3, ftw.3, futimes.3, gamma.3, gcvt.3, get_nprocs_conf.3, get_phys_pages.3, getaddrinfo.3, getaddrinfo_a.3, getauxval.3, getcwd.3, getdate.3, getentropy.3, getenv.3, getfsent.3, getgrent_r.3, getgrnam.3, getgrouplist.3, gethostbyname.3, gethostid.3, getifaddrs.3, getline.3, getlogin.3, getmntent.3, getnameinfo.3, getnetent.3, getnetent_r.3, getopt.3, getprotoent.3, getprotoent_r.3, getpw.3, getpwent.3, getpwent_r.3, getpwnam.3, getrpcent.3, getrpcent_r.3, getrpcport.3, gets.3, getservent.3, getservent_r.3, getspnam.3, getsubopt.3, getttyent.3, getutent.3, getwchar.3, glob.3, gnu_get_libc_version.3, grantpt.3, gsignal.3, hash.3, hsearch.3, hypot.3, iconv.3, iconv_close.3, iconv_open.3, if_nameindex.3, if_nametoindex.3, ilogb.3, inet.3, inet_net_pton.3, inet_ntop.3, initgroups.3, insque.3, intro.3, isalpha.3, isgreater.3, j0.3, key_setsecret.3, killpg.3, ldexp.3, lgamma.3, lio_listio.3, lockf.3, log.3, log10.3, log1p.3, log2.3, logb.3, login.3, lrint.3, lround.3, lsearch.3, lseek64.3, makecontext.3, makedev.3, mallinfo.3, malloc_get_state.3, malloc_info.3, malloc_stats.3, malloc_trim.3, malloc_usable_size.3, mallopt.3, matherr.3, mbsnrtowcs.3, mbsrtowcs.3, mcheck.3, memccpy.3, memchr.3, memcmp.3, memcpy.3, mkfifo.3, mkstemp.3, mktemp.3, modf.3, mpool.3, mq_close.3, mq_getattr.3, mq_notify.3, mq_open.3, mq_receive.3, mq_send.3, mtrace.3, newlocale.3, nextafter.3, nextup.3, nl_langinfo.3, ntp_gettime.3, offsetof.3, on_exit.3, open_memstream.3, opendir.3, openpty.3, perror.3, popen.3, posix_fallocate.3, posix_madvise.3, posix_memalign.3, posix_openpt.3, posix_spawn.3, pow.3, printf.3, profil.3, program_invocation_name.3, psignal.3, pthread_atfork.3, pthread_attr_init.3, pthread_attr_setaffinity_np.3, pthread_attr_setdetachstate.3, pthread_attr_setguardsize.3, pthread_attr_setinheritsched.3, pthread_attr_setschedparam.3, pthread_attr_setschedpolicy.3, pthread_attr_setscope.3, pthread_attr_setstack.3, pthread_attr_setstackaddr.3, pthread_attr_setstacksize.3, pthread_cancel.3, pthread_cleanup_push.3, pthread_cleanup_push_defer_np.3, pthread_create.3, pthread_detach.3, pthread_exit.3, pthread_getattr_default_np.3, pthread_getattr_np.3, pthread_getcpuclockid.3, pthread_join.3, pthread_kill.3, pthread_kill_other_threads_np.3, pthread_self.3, pthread_setaffinity_np.3, pthread_setcancelstate.3, pthread_setconcurrency.3, pthread_setname_np.3, pthread_setschedparam.3, pthread_sigmask.3, pthread_sigqueue.3, pthread_testcancel.3, pthread_tryjoin_np.3, ptsname.3, putgrent.3, putpwent.3, qsort.3, random.3, random_r.3, rcmd.3, re_comp.3, readdir.3, realpath.3, recno.3, regex.3, remainder.3, remove.3, remquo.3, resolver.3, rexec.3, rint.3, round.3, rpc.3, rpmatch.3, rtime.3, scalb.3, scalbln.3, scandir.3, scanf.3, sem_close.3, sem_destroy.3, sem_getvalue.3, sem_init.3, sem_open.3, sem_wait.3, setbuf.3, setenv.3, setlocale.3, setlogmask.3, setnetgrent.3, shm_open.3, signbit.3, significand.3, sigpause.3, sigqueue.3, sigset.3, sigvec.3, sin.3, sincos.3, sinh.3, sleep.3, sockatmark.3, sqrt.3, statvfs.3, stdarg.3, stdin.3, strcasecmp.3, strcat.3, strchr.3, strcoll.3, strcpy.3, strdup.3, strerror.3, strfmon.3, strfromd.3, strftime.3, strptime.3, strsignal.3, strstr.3, strtod.3, strtok.3, strtol.3, strtoul.3, syslog.3, system.3, sysv_signal.3, tan.3, tanh.3, telldir.3, tempnam.3, termios.3, tgamma.3, timeradd.3, tmpnam.3, toupper.3, towlower.3, towupper.3, trunc.3, tzset.3, ualarm.3, ulimit.3, undocumented.3, unlocked_stdio.3, updwtmp.3, uselocale.3, usleep.3, wcrtomb.3, wcsdup.3, wcsnrtombs.3, wcsrtombs.3, wcstombs.3, wctob.3, wcwidth.3, wordexp.3, wprintf.3, xcrypt.3, xdr.3, y0.3: Formatting fix: replace blank lines with .PP/.IP

Blank lines shouldn't generally appear in *roff source (other
than in code examples), since they create large vertical
spaces between text blocks.

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
Michael Kerrisk 2017-08-16 05:13:02 +02:00
parent 5b539973c4
commit 847e0d8871
382 changed files with 1475 additions and 1471 deletions

View File

@ -83,14 +83,14 @@ data structure represents a set of CPUs.
CPU sets are used by CPU sets are used by
.BR sched_setaffinity (2) .BR sched_setaffinity (2)
and similar interfaces. and similar interfaces.
.PP
The The
.I cpu_set_t .I cpu_set_t
data type is implemented as a bit mask. data type is implemented as a bit mask.
However, the data structure treated as considered opaque: However, the data structure treated as considered opaque:
all manipulation of CPU sets should be done via the macros all manipulation of CPU sets should be done via the macros
described in this page. described in this page.
.PP
The following macros are provided to operate on the CPU set The following macros are provided to operate on the CPU set
.IR set : .IR set :
.TP 17 .TP 17
@ -139,7 +139,7 @@ The constant
(currently 1024) specifies a value one greater than the maximum CPU (currently 1024) specifies a value one greater than the maximum CPU
number that can be stored in number that can be stored in
.IR cpu_set_t . .IR cpu_set_t .
.PP
The following macros perform logical operations on CPU sets: The following macros perform logical operations on CPU sets:
.TP 17 .TP 17
.BR CPU_AND () .BR CPU_AND ()
@ -182,7 +182,7 @@ size CPU sets (e.g., to allocate sets larger than that
defined by the standard defined by the standard
.I cpu_set_t .I cpu_set_t
data type), glibc nowadays provides a set of macros to support this. data type), glibc nowadays provides a set of macros to support this.
.PP
The following macros are used to allocate and deallocate CPU sets: The following macros are used to allocate and deallocate CPU sets:
.TP 17 .TP 17
.BR CPU_ALLOC () .BR CPU_ALLOC ()
@ -219,27 +219,27 @@ return nonzero if
is in is in
.IR set ; .IR set ;
otherwise, it returns 0. otherwise, it returns 0.
.PP
.BR CPU_COUNT () .BR CPU_COUNT ()
and and
.BR CPU_COUNT_S () .BR CPU_COUNT_S ()
return the number of CPUs in return the number of CPUs in
.IR set . .IR set .
.PP
.BR CPU_EQUAL () .BR CPU_EQUAL ()
and and
.BR CPU_EQUAL_S () .BR CPU_EQUAL_S ()
return nonzero if the two CPU sets are equal; otherwise they return 0. return nonzero if the two CPU sets are equal; otherwise they return 0.
.PP
.BR CPU_ALLOC () .BR CPU_ALLOC ()
returns a pointer on success, or NULL on failure. returns a pointer on success, or NULL on failure.
(Errors are as for (Errors are as for
.BR malloc (3).) .BR malloc (3).)
.PP
.BR CPU_ALLOC_SIZE () .BR CPU_ALLOC_SIZE ()
returns the number of bytes required to store a returns the number of bytes required to store a
CPU set of the specified cardinality. CPU set of the specified cardinality.
.PP
The other functions do not return a value. The other functions do not return a value.
.SH VERSIONS .SH VERSIONS
The The
@ -249,10 +249,10 @@ The
and and
.BR CPU_ISSET () .BR CPU_ISSET ()
macros were added in glibc 2.3.3. macros were added in glibc 2.3.3.
.PP
.BR CPU_COUNT () .BR CPU_COUNT ()
first appeared in glibc 2.6. first appeared in glibc 2.6.
.PP
.BR CPU_AND (), .BR CPU_AND (),
.BR CPU_OR (), .BR CPU_OR (),
.BR CPU_XOR (), .BR CPU_XOR (),
@ -275,14 +275,14 @@ These interfaces are Linux-specific.
.SH NOTES .SH NOTES
To duplicate a CPU set, use To duplicate a CPU set, use
.BR memcpy (3). .BR memcpy (3).
.PP
Since CPU sets are bit masks allocated in units of long words, Since CPU sets are bit masks allocated in units of long words,
the actual number of CPUs in a dynamically the actual number of CPUs in a dynamically
allocated CPU set will be rounded up to the next multiple of allocated CPU set will be rounded up to the next multiple of
.IR "sizeof(unsigned long)" . .IR "sizeof(unsigned long)" .
An application should consider the contents of these extra bits An application should consider the contents of these extra bits
to be undefined. to be undefined.
.PP
Notwithstanding the similarity in the names, Notwithstanding the similarity in the names,
note that the constant note that the constant
.B CPU_SETSIZE .B CPU_SETSIZE
@ -294,7 +294,7 @@ while the
argument of the argument of the
.BR CPU_*_S () .BR CPU_*_S ()
macros is a size in bytes. macros is a size in bytes.
.PP
The data types for arguments and return values shown The data types for arguments and return values shown
in the SYNOPSIS are hints what about is expected in each case. in the SYNOPSIS are hints what about is expected in each case.
However, since these interfaces are implemented as macros, However, since these interfaces are implemented as macros,
@ -315,7 +315,7 @@ These bugs are fixed in glibc 2.9.
.SH EXAMPLE .SH EXAMPLE
The following program demonstrates the use of some of the macros The following program demonstrates the use of some of the macros
used for dynamically allocated CPU sets. used for dynamically allocated CPU sets.
.PP
.nf .nf
#define _GNU_SOURCE #define _GNU_SOURCE
#include <sched.h> #include <sched.h>

View File

@ -47,7 +47,7 @@ The macro
expands to a expands to a
.I float .I float
constant representing positive infinity. constant representing positive infinity.
.PP
The macro The macro
.B NAN .B NAN
expands to a expands to a
@ -62,7 +62,7 @@ The opposite is a
.I signaling .I signaling
NaN. NaN.
See IEC 60559:1989. See IEC 60559:1989.
.PP
The macros The macros
.BR HUGE_VAL , .BR HUGE_VAL ,
.BR HUGE_VALF , .BR HUGE_VALF ,

View File

@ -39,7 +39,7 @@ reads the current value of the Time Base Register and returns its
value, while value, while
.BR __ppc_get_timebase_freq () .BR __ppc_get_timebase_freq ()
returns the frequency in which the Time Base Register is updated. returns the frequency in which the Time Base Register is updated.
.PP
The Time Base Register is a 64-bit register provided by Power Architecture The Time Base Register is a 64-bit register provided by Power Architecture
processors. processors.
It stores a monotonically incremented value that is updated at a It stores a monotonically incremented value that is updated at a
@ -49,7 +49,7 @@ frequency.
.BR __ppc_get_timebase () .BR __ppc_get_timebase ()
returns a 64-bit unsigned integer that represents the current value of the returns a 64-bit unsigned integer that represents the current value of the
Time Base Register. Time Base Register.
.PP
.BR __ppc_get_timebase_freq () .BR __ppc_get_timebase_freq ()
returns a 64-bit unsigned integer that represents the frequency at returns a 64-bit unsigned integer that represents the frequency at
which the Time Base Register is updated. which the Time Base Register is updated.

View File

@ -129,5 +129,5 @@ Availability of these functions can be tested using
.BR "#ifdef _ARCH_PWR8" . .BR "#ifdef _ARCH_PWR8" .
.SH SEE ALSO .SH SEE ALSO
.BR __ppc_yield (3) .BR __ppc_yield (3)
.PP
.IR "Power ISA, Book\ II - Section\ 3.1 (Program Priority Registers)" .IR "Power ISA, Book\ II - Section\ 3.1 (Program Priority Registers)"

View File

@ -80,5 +80,5 @@ T} Thread safety MT-Safe
These functions are nonstandard GNU extensions. These functions are nonstandard GNU extensions.
.SH SEE ALSO .SH SEE ALSO
.BR __ppc_set_ppr_med (3) .BR __ppc_set_ppr_med (3)
.PP
.IR "Power ISA, Book\ II - Section\ 3.2 (""or"" architecture)" .IR "Power ISA, Book\ II - Section\ 3.2 (""or"" architecture)"

View File

@ -50,7 +50,7 @@ macros from
can be used. can be used.
.SH EXAMPLE .SH EXAMPLE
.B __setfpucw(0x1372) .B __setfpucw(0x1372)
.PP
Set FPU control word on the i386 architecture to Set FPU control word on the i386 architecture to
.br .br
\- extended precision \- extended precision

View File

@ -70,22 +70,22 @@ the value whose cosine is
On success, these functions return the arc cosine of On success, these functions return the arc cosine of
.IR x .IR x
in radians; the return value is in the range [0,\ pi]. in radians; the return value is in the range [0,\ pi].
.PP
If If
.I x .I x
is a NaN, a NaN is returned. is a NaN, a NaN is returned.
.PP
If If
.I x .I x
is +1, is +1,
+0 is returned. +0 is returned.
.PP
If If
.I x .I x
is positive infinity or negative infinity, is positive infinity or negative infinity,
a domain error occurs, a domain error occurs,
and a NaN is returned. and a NaN is returned.
.PP
If If
.I x .I x
is outside the range [\-1,\ 1], is outside the range [\-1,\ 1],
@ -122,7 +122,7 @@ T} Thread safety MT-Safe
.TE .TE
.SH CONFORMING TO .SH CONFORMING TO
C99, POSIX.1-2001, POSIX.1-2008. C99, POSIX.1-2001, POSIX.1-2008.
.PP
The variant returning The variant returning
.I double .I double
also conforms to also conforms to

View File

@ -79,19 +79,19 @@ that is the value whose hyperbolic cosine is
.SH RETURN VALUE .SH RETURN VALUE
On success, these functions return the inverse hyperbolic cosine of On success, these functions return the inverse hyperbolic cosine of
.IR x . .IR x .
.PP
If If
.I x .I x
is a NaN, a NaN is returned. is a NaN, a NaN is returned.
.PP
If If
.I x .I x
is +1, +0 is returned. is +1, +0 is returned.
.PP
If If
.I x .I x
is positive infinity, positive infinity is returned. is positive infinity, positive infinity is returned.
.PP
If If
.I x .I x
is less than 1, is less than 1,
@ -128,7 +128,7 @@ T} Thread safety MT-Safe
.TE .TE
.SH CONFORMING TO .SH CONFORMING TO
C99, POSIX.1-2001, POSIX.1-2008. C99, POSIX.1-2001, POSIX.1-2008.
.PP
The variant returning The variant returning
.I double .I double
also conforms to also conforms to

View File

@ -70,7 +70,7 @@ has been completed.
If the adjustment in If the adjustment in
.I delta .I delta
is negative, then the clock is slowed down in a similar fashion. is negative, then the clock is slowed down in a similar fashion.
.PP
If a clock adjustment from an earlier If a clock adjustment from an earlier
.BR adjtime () .BR adjtime ()
call is already in progress call is already in progress
@ -80,7 +80,7 @@ call, and
.I delta .I delta
is not NULL for the later call, then the earlier adjustment is stopped, is not NULL for the later call, then the earlier adjustment is stopped,
but any already completed part of that adjustment is not undone. but any already completed part of that adjustment is not undone.
.PP
If If
.I olddelta .I olddelta
is not NULL, then the buffer that it points to is used to return is not NULL, then the buffer that it points to is used to return
@ -130,7 +130,7 @@ to adjust the time prevents the problems that can be caused for certain
applications (e.g., applications (e.g.,
.BR make (1)) .BR make (1))
by abrupt positive or negative jumps in the system time. by abrupt positive or negative jumps in the system time.
.PP
.BR adjtime () .BR adjtime ()
is intended to be used to make small adjustments to the system time. is intended to be used to make small adjustments to the system time.
Most systems impose a limit on the adjustment that can be specified in Most systems impose a limit on the adjustment that can be specified in

View File

@ -55,7 +55,7 @@ is
.BR O_DSYNC , .BR O_DSYNC ,
this call is the asynchronous analog of this call is the asynchronous analog of
.BR fdatasync (2). .BR fdatasync (2).
.PP
Note that this is a request only; it does not wait for I/O completion. Note that this is a request only; it does not wait for I/O completion.
.LP .LP
Apart from Apart from

View File

@ -42,7 +42,7 @@ function allows the caller to provide tuning hints to the
glibc POSIX AIO implementation. glibc POSIX AIO implementation.
Use of this function is optional, but to be effective, Use of this function is optional, but to be effective,
it must be called before employing any other functions in the POSIX AIO API. it must be called before employing any other functions in the POSIX AIO API.
.PP
The tuning information is provided in the buffer pointed to by the argument The tuning information is provided in the buffer pointed to by the argument
.IR init . .IR init .
This buffer is a structure of the following form: This buffer is a structure of the following form:

View File

@ -38,9 +38,9 @@ function queues the I/O request described by the buffer pointed to by
This function is the asynchronous analog of This function is the asynchronous analog of
.BR read (2). .BR read (2).
The arguments of the call The arguments of the call
.PP
read(fd, buf, count) read(fd, buf, count)
.PP
correspond (in order) to the fields correspond (in order) to the fields
.IR aio_fildes , .IR aio_fildes ,
.IR aio_buf , .IR aio_buf ,
@ -151,7 +151,7 @@ The buffer area being read into
.\" or the control block of the operation .\" or the control block of the operation
must not be accessed during the operation or undefined results may occur. must not be accessed during the operation or undefined results may occur.
The memory areas involved must remain valid. The memory areas involved must remain valid.
.PP
Simultaneous I/O operations specifying the same Simultaneous I/O operations specifying the same
.I aiocb .I aiocb
structure produce undefined results. structure produce undefined results.

View File

@ -56,7 +56,7 @@ or
.BR fdatasync (2), .BR fdatasync (2),
call. call.
On error, \-1 is returned, and \fIerrno\fP is set appropriately. On error, \-1 is returned, and \fIerrno\fP is set appropriately.
.PP
If the asynchronous I/O operation has not yet completed, If the asynchronous I/O operation has not yet completed,
the return value and effect of the return value and effect of
.BR aio_return () .BR aio_return ()

View File

@ -122,13 +122,13 @@ POSIX.1-2001, POSIX.1-2008.
One can achieve polling by using a non-NULL One can achieve polling by using a non-NULL
.I timeout .I timeout
that specifies a zero time interval. that specifies a zero time interval.
.PP
If one or more of the asynchronous I/O operations specified in If one or more of the asynchronous I/O operations specified in
.IR aiocb_list .IR aiocb_list
has already completed at the time of the call to has already completed at the time of the call to
.BR aio_suspend (), .BR aio_suspend (),
then the call returns immediately. then the call returns immediately.
.PP
To determine which I/O operations have completed To determine which I/O operations have completed
after a successful return from after a successful return from
.BR aio_suspend (), .BR aio_suspend (),

View File

@ -38,9 +38,9 @@ function queues the I/O request described by the buffer pointed to by
This function is the asynchronous analog of This function is the asynchronous analog of
.BR write (2). .BR write (2).
The arguments of the call The arguments of the call
.PP
write(fd, buf, count) write(fd, buf, count)
.PP
correspond (in order) to the fields correspond (in order) to the fields
.IR aio_fildes , .IR aio_fildes ,
.IR aio_buf , .IR aio_buf ,
@ -156,7 +156,7 @@ The buffer area being written out
.\" or the control block of the operation .\" or the control block of the operation
must not be accessed during the operation or undefined results may occur. must not be accessed during the operation or undefined results may occur.
The memory areas involved must remain valid. The memory areas involved must remain valid.
.PP
Simultaneous I/O operations specifying the same Simultaneous I/O operations specifying the same
.I aiocb .I aiocb
structure produce undefined results. structure produce undefined results.

View File

@ -76,7 +76,7 @@ T} Thread safety MT-Safe
.TE .TE
.SH CONFORMING TO .SH CONFORMING TO
This function is not in POSIX.1. This function is not in POSIX.1.
.PP
There is evidence that the There is evidence that the
.BR alloca () .BR alloca ()
function appeared in 32V, PWB, PWB.2, 3BSD, and 4BSD. function appeared in 32V, PWB, PWB.2, 3BSD, and 4BSD.
@ -97,7 +97,7 @@ it can also simplify memory deallocation in applications that use
or or
.BR siglongjmp (3). .BR siglongjmp (3).
Otherwise, its use is discouraged. Otherwise, its use is discouraged.
.PP
Because the space allocated by Because the space allocated by
.BR alloca () .BR alloca ()
is allocated within the stack frame, is allocated within the stack frame,
@ -106,7 +106,7 @@ is jumped over by a call to
.BR longjmp (3) .BR longjmp (3)
or or
.BR siglongjmp (3). .BR siglongjmp (3).
.PP
Do not attempt to Do not attempt to
.BR free (3) .BR free (3)
space allocated by space allocated by
@ -154,7 +154,7 @@ There is no error indication if the stack frame cannot be extended.
(However, after a failed allocation, the program is likely to receive a (However, after a failed allocation, the program is likely to receive a
.B SIGSEGV .B SIGSEGV
signal if it attempts to access the unallocated space.) signal if it attempts to access the unallocated space.)
.PP
On many systems On many systems
.BR alloca () .BR alloca ()
cannot be used inside the list of arguments of a function call, because cannot be used inside the list of arguments of a function call, because

View File

@ -223,7 +223,7 @@ T{
.BR argz_stringify () .BR argz_stringify ()
T} Thread safety MT-Safe T} Thread safety MT-Safe
.TE .TE
.sp 1
.SH CONFORMING TO .SH CONFORMING TO
These functions are a GNU extension. These functions are a GNU extension.
Handle with care. Handle with care.

View File

@ -71,16 +71,16 @@ that is the value whose sine is
On success, these functions return the principal value of the arc sine of On success, these functions return the principal value of the arc sine of
.IR x .IR x
in radians; the return value is in the range [\-pi/2,\ pi/2]. in radians; the return value is in the range [\-pi/2,\ pi/2].
.PP
If If
.I x .I x
is a NaN, a NaN is returned. is a NaN, a NaN is returned.
.PP
If If
.I x .I x
is +0 (\-0), is +0 (\-0),
+0 (\-0) is returned. +0 (\-0) is returned.
.PP
If If
.I x .I x
is outside the range [\-1,\ 1], is outside the range [\-1,\ 1],
@ -120,7 +120,7 @@ T} Thread safety MT-Safe
.TE .TE
.SH CONFORMING TO .SH CONFORMING TO
C99, POSIX.1-2001, POSIX.1-2008. C99, POSIX.1-2001, POSIX.1-2008.
.PP
The variant returning The variant returning
.I double .I double
also conforms to also conforms to

View File

@ -79,15 +79,15 @@ that is the value whose hyperbolic sine is
.SH RETURN VALUE .SH RETURN VALUE
On success, these functions return the inverse hyperbolic sine of On success, these functions return the inverse hyperbolic sine of
.IR x . .IR x .
.PP
If If
.I x .I x
is a NaN, a NaN is returned. is a NaN, a NaN is returned.
.PP
If If
.I x .I x
is +0 (\-0), +0 (\-0) is returned. is +0 (\-0), +0 (\-0) is returned.
.PP
If If
.I x .I x
is positive infinity (negative infinity), is positive infinity (negative infinity),
@ -113,7 +113,7 @@ T} Thread safety MT-Safe
.TE .TE
.SH CONFORMING TO .SH CONFORMING TO
C99, POSIX.1-2001, POSIX.1-2008. C99, POSIX.1-2001, POSIX.1-2008.
.PP
The variant returning The variant returning
.I double .I double
also conforms to also conforms to

View File

@ -71,7 +71,7 @@ T{
.BR vasprintf () .BR vasprintf ()
T} Thread safety MT-Safe locale T} Thread safety MT-Safe locale
.TE .TE
.sp 1
.SH CONFORMING TO .SH CONFORMING TO
These functions are GNU extensions, not in C or POSIX. These functions are GNU extensions, not in C or POSIX.
They are also available under *BSD. They are also available under *BSD.

View File

@ -38,7 +38,7 @@ assert \- abort the program if assertion is false
This macro can help programmers find bugs in their programs, This macro can help programmers find bugs in their programs,
or handle exceptional cases or handle exceptional cases
via a crash that will produce limited debugging output. via a crash that will produce limited debugging output.
.PP
If If
.I expression .I expression
is false (i.e., compares equal to zero), is false (i.e., compares equal to zero),
@ -50,9 +50,9 @@ The error message includes the name of the file and function containing the
.BR assert () .BR assert ()
call, the source code line number of the call, and the text of the argument; call, the source code line number of the call, and the text of the argument;
something like: something like:
.PP
prog: some_file.c:16: some_func: Assertion `val == 0' failed. prog: some_file.c:16: some_func: Assertion `val == 0' failed.
.PP
If the macro If the macro
.B NDEBUG .B NDEBUG
is defined at the moment is defined at the moment
@ -80,7 +80,7 @@ T{
.BR assert () .BR assert ()
T} Thread safety MT-Safe T} Thread safety MT-Safe
.TE .TE
.sp 1
.SH CONFORMING TO .SH CONFORMING TO
POSIX.1-2001, POSIX.1-2008, C89, C99. POSIX.1-2001, POSIX.1-2008, C89, C99.
In C89, In C89,

View File

@ -68,7 +68,7 @@ T{
.BR assert_perror () .BR assert_perror ()
T} Thread safety MT-Safe T} Thread safety MT-Safe
.TE .TE
.sp 1
.SH CONFORMING TO .SH CONFORMING TO
This is a GNU extension. This is a GNU extension.
.SH BUGS .SH BUGS

View File

@ -71,16 +71,16 @@ that is the value whose tangent is
On success, these functions return the principal value of the arc tangent of On success, these functions return the principal value of the arc tangent of
.IR x .IR x
in radians; the return value is in the range [\-pi/2,\ pi/2]. in radians; the return value is in the range [\-pi/2,\ pi/2].
.PP
If If
.I x .I x
is a NaN, a NaN is returned. is a NaN, a NaN is returned.
.PP
If If
.I x .I x
is +0 (\-0), is +0 (\-0),
+0 (\-0) is returned. +0 (\-0) is returned.
.PP
If If
.I x .I x
is positive infinity (negative infinity), +pi/2 (\-pi/2) is returned. is positive infinity (negative infinity), +pi/2 (\-pi/2) is returned.
@ -105,7 +105,7 @@ T} Thread safety MT-Safe
.TE .TE
.SH CONFORMING TO .SH CONFORMING TO
C99, POSIX.1-2001, POSIX.1-2008. C99, POSIX.1-2001, POSIX.1-2008.
.PP
The variant returning The variant returning
.I double .I double
also conforms to also conforms to

View File

@ -69,31 +69,31 @@ the quadrant of the result.
On success, these functions return the principal value of the arc tangent of On success, these functions return the principal value of the arc tangent of
.IR y/x .IR y/x
in radians; the return value is in the range [\-pi,\ pi]. in radians; the return value is in the range [\-pi,\ pi].
.PP
If If
.I y .I y
is +0 (\-0) and is +0 (\-0) and
.I x .I x
is less than 0, +pi (\-pi) is returned. is less than 0, +pi (\-pi) is returned.
.PP
If If
.I y .I y
is +0 (\-0) and is +0 (\-0) and
.I x .I x
is greater than 0, +0 (\-0) is returned. is greater than 0, +0 (\-0) is returned.
.PP
If If
.I y .I y
is less than 0 and is less than 0 and
.I x .I x
is +0 or \-0, \-pi/2 is returned. is +0 or \-0, \-pi/2 is returned.
.PP
If If
.I y .I y
is greater than 0 and is greater than 0 and
.I x .I x
is +0 or \-0, pi/2 is returned. is +0 or \-0, pi/2 is returned.
.PP
.\" POSIX.1 says: .\" POSIX.1 says:
.\" If .\" If
.\" .I x .\" .I x
@ -104,7 +104,7 @@ If either
or or
.I y .I y
is NaN, a NaN is returned. is NaN, a NaN is returned.
.PP
.\" POSIX.1 says: .\" POSIX.1 says:
.\" If the result underflows, a range error may occur and .\" If the result underflows, a range error may occur and
.\" .I y/x .\" .I y/x
@ -115,38 +115,38 @@ If
is +0 (\-0) and is +0 (\-0) and
.I x .I x
is \-0, +pi (\-pi) is returned. is \-0, +pi (\-pi) is returned.
.PP
If If
.I y .I y
is +0 (\-0) and is +0 (\-0) and
.I x .I x
is +0, +0 (\-0) is returned. is +0, +0 (\-0) is returned.
.PP
If If
.I y .I y
is a finite value greater (less) than 0, and is a finite value greater (less) than 0, and
.I x .I x
is negative infinity, +pi (\-pi) is returned. is negative infinity, +pi (\-pi) is returned.
.PP
If If
.I y .I y
is a finite value greater (less) than 0, and is a finite value greater (less) than 0, and
.I x .I x
is positive infinity, +0 (\-0) is returned. is positive infinity, +0 (\-0) is returned.
.PP
If If
.I y .I y
is positive infinity (negative infinity), and is positive infinity (negative infinity), and
.I x .I x
is finite, is finite,
pi/2 (\-pi/2) is returned. pi/2 (\-pi/2) is returned.
.PP
If If
.I y .I y
is positive infinity (negative infinity) and is positive infinity (negative infinity) and
.I x .I x
is negative infinity, +3*pi/4 (\-3*pi/4) is returned. is negative infinity, +3*pi/4 (\-3*pi/4) is returned.
.PP
If If
.I y .I y
is positive infinity (negative infinity) and is positive infinity (negative infinity) and
@ -175,7 +175,7 @@ T} Thread safety MT-Safe
.TE .TE
.SH CONFORMING TO .SH CONFORMING TO
C99, POSIX.1-2001, POSIX.1-2008. C99, POSIX.1-2001, POSIX.1-2008.
.PP
The variant returning The variant returning
.I double .I double
also conforms to also conforms to

View File

@ -79,15 +79,15 @@ that is the value whose hyperbolic tangent is
.SH RETURN VALUE .SH RETURN VALUE
On success, these functions return the inverse hyperbolic tangent of On success, these functions return the inverse hyperbolic tangent of
.IR x . .IR x .
.PP
If If
.I x .I x
is a NaN, a NaN is returned. is a NaN, a NaN is returned.
.PP
If If
.I x .I x
is +0 (\-0), +0 (\-0) is returned. is +0 (\-0), +0 (\-0) is returned.
.PP
If If
.I x .I x
is +1 or \-1, is +1 or \-1,
@ -98,7 +98,7 @@ and the functions return
or or
.BR HUGE_VALL , .BR HUGE_VALL ,
respectively, with the mathematically correct sign. respectively, with the mathematically correct sign.
.PP
If the absolute value of If the absolute value of
.I x .I x
is greater than 1, is greater than 1,
@ -147,7 +147,7 @@ T} Thread safety MT-Safe
.TE .TE
.SH CONFORMING TO .SH CONFORMING TO
C99, POSIX.1-2001, POSIX.1-2008. C99, POSIX.1-2001, POSIX.1-2008.
.PP
The variant returning The variant returning
.I double .I double
also conforms to also conforms to

View File

@ -51,7 +51,7 @@ or via return from the program's
.IR main (). .IR main ().
Functions so registered are called in Functions so registered are called in
the reverse order of their registration; no arguments are passed. the reverse order of their registration; no arguments are passed.
.PP
The same function may be registered multiple times: The same function may be registered multiple times:
it is called once for each registration. it is called once for each registration.
.LP .LP
@ -86,7 +86,7 @@ T{
.BR atexit () .BR atexit ()
T} Thread safety MT-Safe T} Thread safety MT-Safe
.TE .TE
.sp 1
.SH CONFORMING TO .SH CONFORMING TO
POSIX.1-2001, POSIX.1-2008, C89, C99, SVr4, 4.3BSD. POSIX.1-2001, POSIX.1-2008, C89, C99, SVr4, 4.3BSD.
.SH NOTES .SH NOTES
@ -96,14 +96,14 @@ Functions registered using
.BR on_exit (3)) .BR on_exit (3))
are not called if a process terminates abnormally because are not called if a process terminates abnormally because
of the delivery of a signal. of the delivery of a signal.
.PP
If one of the functions registered functions calls If one of the functions registered functions calls
.BR _exit (2), .BR _exit (2),
then any remaining functions are not invoked, then any remaining functions are not invoked,
and the other process termination steps performed by and the other process termination steps performed by
.BR exit (3) .BR exit (3)
are not performed. are not performed.
.PP
POSIX.1 says that the result of calling POSIX.1 says that the result of calling
.\" POSIX.1-2001, POSIX.1-2008 .\" POSIX.1-2001, POSIX.1-2008
.BR exit (3) .BR exit (3)
@ -121,7 +121,7 @@ portable programs should not invoke
.BR exit (3) .BR exit (3)
inside a function registered using inside a function registered using
.BR atexit (). .BR atexit ().
.PP
The The
.BR atexit () .BR atexit ()
and and
@ -130,7 +130,7 @@ functions register functions on the same list:
at normal process termination, at normal process termination,
the registered functions are invoked in reverse order the registered functions are invoked in reverse order
of their registration by these two functions. of their registration by these two functions.
.PP
According to POSIX.1, the result is undefined if According to POSIX.1, the result is undefined if
.BR longjmp (3) .BR longjmp (3)
is used to terminate execution of one of the functions registered is used to terminate execution of one of the functions registered

View File

@ -75,7 +75,7 @@ to obtain the complete backtrace, make sure that
and and
.I size .I size
are large enough. are large enough.
.PP
Given the set of addresses returned by Given the set of addresses returned by
.BR backtrace () .BR backtrace ()
in in
@ -100,7 +100,7 @@ by
and must be freed by the caller. and must be freed by the caller.
(The strings pointed to by the array of pointers (The strings pointed to by the array of pointers
need not and should not be freed.) need not and should not be freed.)
.PP
.BR backtrace_symbols_fd () .BR backtrace_symbols_fd ()
takes the same takes the same
.I buffer .I buffer
@ -127,7 +127,7 @@ then the full backtrace was stored; if it is equal to
.IR size , .IR size ,
then it may have been truncated, in which case the addresses of the then it may have been truncated, in which case the addresses of the
oldest stack frames are not returned. oldest stack frames are not returned.
.PP
On success, On success,
.BR backtrace_symbols () .BR backtrace_symbols ()
returns a pointer to the array returns a pointer to the array

View File

@ -173,7 +173,7 @@ the POSIX versions of these functions modify the
.I path .I path
argument, and segfault when called with a static string argument, and segfault when called with a static string
such as "/usr/". such as "/usr/".
.PP
Before glibc 2.2.1, the glibc version of Before glibc 2.2.1, the glibc version of
.BR dirname () .BR dirname ()
did not correctly handle pathnames with trailing \(aq/\(aq characters, did not correctly handle pathnames with trailing \(aq/\(aq characters,

View File

@ -46,7 +46,7 @@ file descriptor
to a privileged anonymous IP port, to a privileged anonymous IP port,
that is, a port number arbitrarily selected from the range 512 to 1023. that is, a port number arbitrarily selected from the range 512 to 1023.
.\" Glibc actually starts searching with a port # in the range 600 to 1023 .\" Glibc actually starts searching with a port # in the range 600 to 1023
.PP
If the If the
.BR bind (2) .BR bind (2)
performed by performed by
@ -56,7 +56,7 @@ is successful, and
is not NULL, then is not NULL, then
.I sin\->sin_port .I sin\->sin_port
returns the port number actually allocated. returns the port number actually allocated.
.PP
.I sin .I sin
can be NULL, in which case can be NULL, in which case
.I sin\->sin_family .I sin\->sin_family

View File

@ -54,7 +54,7 @@ The
.BR bsd_signal () .BR bsd_signal ()
function takes the same arguments, and performs the same task, as function takes the same arguments, and performs the same task, as
.BR signal (2). .BR signal (2).
.PP
The difference between the two is that The difference between the two is that
.BR bsd_signal () .BR bsd_signal ()
is guaranteed to provide reliable signal semantics, that is: is guaranteed to provide reliable signal semantics, that is:
@ -101,7 +101,7 @@ Use of
should be avoided; use should be avoided; use
.BR sigaction (2) .BR sigaction (2)
instead. instead.
.PP
On modern Linux systems, On modern Linux systems,
.BR bsd_signal () .BR bsd_signal ()
and and
@ -112,7 +112,7 @@ But on older systems,
provided unreliable signal semantics; see provided unreliable signal semantics; see
.BR signal (2) .BR signal (2)
for details. for details.
.PP
The use of The use of
.I sighandler_t .I sighandler_t
is a GNU extension; is a GNU extension;

View File

@ -86,7 +86,7 @@ T{
.BR bsearch () .BR bsearch ()
T} Thread safety MT-Safe T} Thread safety MT-Safe
.TE .TE
.sp 1
.SH CONFORMING TO .SH CONFORMING TO
POSIX.1-2001, POSIX.1-2008, C89, C99, SVr4, 4.3BSD. POSIX.1-2001, POSIX.1-2008, C89, C99, SVr4, 4.3BSD.
.SH EXAMPLE .SH EXAMPLE

View File

@ -46,7 +46,7 @@ These macros are GNU extensions.
The program below swaps the bytes of the 8-byte integer supplied as The program below swaps the bytes of the 8-byte integer supplied as
its command-line argument. its command-line argument.
The following shell session demonstrates the use of the program: The following shell session demonstrates the use of the program:
.PP
.nf .nf
.in +4n .in +4n
$ \fB./a.out 0x0123456789abcdef\fP $ \fB./a.out 0x0123456789abcdef\fP

View File

@ -51,7 +51,7 @@ Since version 2.2, glibc no longer provides these interfaces.
Probably, you are looking for the APIs provided by the Probably, you are looking for the APIs provided by the
.I libdb .I libdb
library instead. library instead.
.PP
The routine The routine
.BR dbopen (3) .BR dbopen (3)
is the library interface to database files. is the library interface to database files.
@ -242,13 +242,13 @@ Only big and little endian byte order is supported.
.BR hash (3), .BR hash (3),
.BR mpool (3), .BR mpool (3),
.BR recno (3) .BR recno (3)
.PP
.IR "The Ubiquitous B-tree" , .IR "The Ubiquitous B-tree" ,
Douglas Comer, ACM Comput. Surv. 11, 2 (June 1979), 121-138. Douglas Comer, ACM Comput. Surv. 11, 2 (June 1979), 121-138.
.PP
.IR "Prefix B-trees" , .IR "Prefix B-trees" ,
Bayer and Unterauer, ACM Transactions on Database Systems, Vol. 2, 1 Bayer and Unterauer, ACM Transactions on Database Systems, Vol. 2, 1
(March 1977), 11-26. (March 1977), 11-26.
.PP
.IR "The Art of Computer Programming Vol. 3: Sorting and Searching" , .IR "The Art of Computer Programming Vol. 3: Sorting and Searching" ,
D.E. Knuth, 1968, pp 471-480. D.E. Knuth, 1968, pp 471-480.

View File

@ -90,7 +90,7 @@ T} Thread safety MT-Safe
.TE .TE
.SH CONFORMING TO .SH CONFORMING TO
POSIX.1-2001, POSIX.1-2008. POSIX.1-2001, POSIX.1-2008.
.PP
Some systems require the inclusion of Some systems require the inclusion of
.I <netinet/in.h> .I <netinet/in.h>
instead of instead of

View File

@ -43,7 +43,7 @@ function erases the data in the
bytes of the memory starting at the location pointed to by bytes of the memory starting at the location pointed to by
.IR s , .IR s ,
by writing zeroes (bytes containing \(aq\\0\(aq) to that area. by writing zeroes (bytes containing \(aq\\0\(aq) to that area.
.PP
The The
.BR explicit_bzero () .BR explicit_bzero ()
function performs the same task as function performs the same task as
@ -82,7 +82,7 @@ POSIX.1-2008 removes the specification of
The The
.BR bzero () .BR bzero ()
function first appeared in 4.3BSD. function first appeared in 4.3BSD.
.PP
The The
.BR explicit_bzero () .BR explicit_bzero ()
function is a nonstandard extension that is also present on some of the BSDs. function is a nonstandard extension that is also present on some of the BSDs.
@ -110,7 +110,7 @@ by an incorrect or compromised program.
Calls to Calls to
.BR explicit_bzero () .BR explicit_bzero ()
are never optimized away by the compiler. are never optimized away by the compiler.
.PP
The The
.BR explicit_bzero () .BR explicit_bzero ()
function does not solve all problems associated with erasing sensitive data: function does not solve all problems associated with erasing sensitive data:
@ -159,7 +159,7 @@ Indeed, it will make them worse, since, for example,
it may force a variable that would otherwise have been optimized it may force a variable that would otherwise have been optimized
into a register to instead be maintained in (more vulnerable) into a register to instead be maintained in (more vulnerable)
RAM for its entire lifetime. RAM for its entire lifetime.
.PP
Notwithstanding the above details, for security-conscious applications, using Notwithstanding the above details, for security-conscious applications, using
.BR explicit_bzero () .BR explicit_bzero ()
is generally preferable to not using it. is generally preferable to not using it.

View File

@ -46,17 +46,17 @@ pathname components.
Consecutive slash Consecutive slash
.RI ( / ) .RI ( / )
characters are replaced by a single slash. characters are replaced by a single slash.
.PP
The returned string is dynamically allocated by The returned string is dynamically allocated by
.BR canonicalize_file_name () .BR canonicalize_file_name ()
and the caller should deallocate it with and the caller should deallocate it with
.BR free (3) .BR free (3)
when it is no longer required. when it is no longer required.
.PP
The call The call
.I canonicalize_file_name(path) .I canonicalize_file_name(path)
is equivalent to the call: is equivalent to the call:
.PP
realpath(path, NULL); realpath(path, NULL);
.SH RETURN VALUE .SH RETURN VALUE
On success, On success,

View File

@ -21,14 +21,14 @@ Link with \fI\-lm\fP.
These functions calculate the complex argument (also called phase angle) of These functions calculate the complex argument (also called phase angle) of
.IR z , .IR z ,
with a branch cut along the negative real axis. with a branch cut along the negative real axis.
.PP
A complex number can be described by two real coordinates. A complex number can be described by two real coordinates.
One may use rectangular coordinates and gets One may use rectangular coordinates and gets
.PP
.nf .nf
z = x + I * y z = x + I * y
.fi .fi
.PP
where where
.IR "x\ =\ creal(z)" .IR "x\ =\ creal(z)"
and and

View File

@ -74,7 +74,7 @@ representable real cube root.
.SH RETURN VALUE .SH RETURN VALUE
These functions return the cube root of These functions return the cube root of
.IR x . .IR x .
.PP
If If
.I x .I x
is +0, \-0, positive infinity, negative infinity, or NaN, is +0, \-0, positive infinity, negative infinity, or NaN,

View File

@ -20,7 +20,7 @@ Link with \fI\-lm\fP.
.SH DESCRIPTION .SH DESCRIPTION
These functions calculate the complex cosine of These functions calculate the complex cosine of
.IR z . .IR z .
.PP
The complex cosine function is defined as: The complex cosine function is defined as:
.nf .nf
@ -42,7 +42,7 @@ T{
.BR ccosl () .BR ccosl ()
T} Thread safety MT-Safe T} Thread safety MT-Safe
.TE .TE
.sp 1
.SH CONFORMING TO .SH CONFORMING TO
C99, POSIX.1-2001, POSIX.1-2008. C99, POSIX.1-2001, POSIX.1-2008.
.SH SEE ALSO .SH SEE ALSO

View File

@ -20,7 +20,7 @@ Link with \fI\-lm\fP.
.SH DESCRIPTION .SH DESCRIPTION
These functions calculate the complex hyperbolic cosine of These functions calculate the complex hyperbolic cosine of
.IR z . .IR z .
.PP
The complex hyperbolic cosine function is defined as: The complex hyperbolic cosine function is defined as:
.nf .nf

View File

@ -58,7 +58,7 @@ _ISOC99_SOURCE || _POSIX_C_SOURCE\ >=\ 200112L
.SH DESCRIPTION .SH DESCRIPTION
These functions return the smallest integral value that is not less than These functions return the smallest integral value that is not less than
.IR x . .IR x .
.PP
For example, For example,
.IR ceil(0.5) .IR ceil(0.5)
is 1.0, and is 1.0, and
@ -67,7 +67,7 @@ is 0.0.
.SH RETURN VALUE .SH RETURN VALUE
These functions return the ceiling of These functions return the ceiling of
.IR x . .IR x .
.PP
If If
.I x .I x
is integral, +0, \-0, NaN, or infinite, is integral, +0, \-0, NaN, or infinite,
@ -92,7 +92,7 @@ T} Thread safety MT-Safe
.TE .TE
.SH CONFORMING TO .SH CONFORMING TO
C99, POSIX.1-2001, POSIX.1-2008. C99, POSIX.1-2001, POSIX.1-2008.
.PP
The variant returning The variant returning
.I double .I double
also conforms to also conforms to
@ -113,7 +113,7 @@ of the exponent is smaller than the number of mantissa bits.
For the IEEE-754 standard 32-bit and 64-bit floating-point numbers For the IEEE-754 standard 32-bit and 64-bit floating-point numbers
the maximum value of the exponent is 128 (respectively, 1024), the maximum value of the exponent is 128 (respectively, 1024),
and the number of mantissa bits is 24 (respectively, 53).) and the number of mantissa bits is 24 (respectively, 53).)
.PP
The integral value returned by these functions may be too large The integral value returned by these functions may be too large
to store in an integer type to store in an integer type
.RI ( int , .RI ( int ,

View File

@ -43,7 +43,7 @@ T{
.BR cexpl () .BR cexpl ()
T} Thread safety MT-Safe T} Thread safety MT-Safe
.TE .TE
.sp 1
.SH CONFORMING TO .SH CONFORMING TO
C99, POSIX.1-2001, POSIX.1-2008. C99, POSIX.1-2001, POSIX.1-2008.
.SH SEE ALSO .SH SEE ALSO

View File

@ -73,7 +73,7 @@ T{
.BR clearenv () .BR clearenv ()
T} Thread safety MT-Unsafe const:env T} Thread safety MT-Unsafe const:env
.TE .TE
.sp 1
.SH CONFORMING TO .SH CONFORMING TO
Various UNIX variants (DG/UX, HP-UX, QNX, ...). Various UNIX variants (DG/UX, HP-UX, QNX, ...).
POSIX.9 (bindings for FORTRAN77). POSIX.9 (bindings for FORTRAN77).
@ -98,7 +98,7 @@ is unavailable, the assignment
.fi .fi
will probably do. will probably do.
.PP
The The
.BR clearenv () .BR clearenv ()
function may be useful in security-conscious applications that want to function may be useful in security-conscious applications that want to
@ -107,14 +107,14 @@ executed using
.BR exec (3). .BR exec (3).
The application would do this by first clearing the environment The application would do this by first clearing the environment
and then adding select environment variables. and then adding select environment variables.
.PP
Note that the main effect of Note that the main effect of
.BR clearenv () .BR clearenv ()
is to adjust the value of the pointer is to adjust the value of the pointer
.BR environ (7); .BR environ (7);
this function does not erase the contents of the buffers this function does not erase the contents of the buffers
containing the environment definitions. containing the environment definitions.
.PP
The DG/UX and Tru64 man pages write: If The DG/UX and Tru64 man pages write: If
.I environ .I environ
has been modified by anything other than the has been modified by anything other than the

View File

@ -59,7 +59,7 @@ T{
.BR clock () .BR clock ()
T} Thread safety MT-Safe T} Thread safety MT-Safe
.TE .TE
.sp 1
.SH CONFORMING TO .SH CONFORMING TO
POSIX.1-2001, POSIX.1-2008, C89, C99. POSIX.1-2001, POSIX.1-2008, C89, C99.
XSI requires that XSI requires that
@ -96,7 +96,7 @@ The
.BR times (2) .BR times (2)
function, which explicitly returns (separate) information about the function, which explicitly returns (separate) information about the
caller and its children, may be preferable. caller and its children, may be preferable.
.PP
In glibc 2.17 and earlier, In glibc 2.17 and earlier,
.BR clock () .BR clock ()
was implemented on top of was implemented on top of

View File

@ -21,7 +21,7 @@ Link with \fI\-lm\fP.
These functions calculate the complex natural logarithm of These functions calculate the complex natural logarithm of
.IR z , .IR z ,
with a branch cut along the negative real axis. with a branch cut along the negative real axis.
.PP
The logarithm The logarithm
.BR clog () .BR clog ()
is the inverse function of the exponential is the inverse function of the exponential

View File

@ -23,18 +23,18 @@ Link with \fI\-lm\fP.
The call The call
.I clog10(z) .I clog10(z)
is equivalent to: is equivalent to:
.PP
clog(z)/log(10) clog(z)/log(10)
.PP
or equally: or equally:
.PP
log10(cabs(c)) + I * carg(c) / log(10) log10(cabs(c)) + I * carg(c) / log(10)
.PP
The other functions perform the same task for The other functions perform the same task for
.I float .I float
and and
.IR "long double" . .IR "long double" .
.PP
Note that Note that
.I z .I z
close to zero will cause an overflow. close to zero will cause an overflow.

View File

@ -22,12 +22,12 @@ The call
.I clog2(z) .I clog2(z)
is equivalent to is equivalent to
.IR clog(z)/log(2) . .IR clog(z)/log(2) .
.PP
The other functions perform the same task for The other functions perform the same task for
.I float .I float
and and
.IR "long double" . .IR "long double" .
.PP
Note that Note that
.I z .I z
close to zero will cause an overflow. close to zero will cause an overflow.

View File

@ -105,7 +105,7 @@ This value may be greater than
which means that the value in which means that the value in
.I buf .I buf
is truncated. is truncated.
.PP
If If
.I name .I name
is a valid configuration variable, is a valid configuration variable,

View File

@ -64,7 +64,7 @@ These functions return a value whose absolute value matches that of
.IR x , .IR x ,
but whose sign bit matches that of but whose sign bit matches that of
.IR y . .IR y .
.PP
For example, For example,
.I "copysign(42.0,\ \-1.0)" .I "copysign(42.0,\ \-1.0)"
and and
@ -75,7 +75,7 @@ On success, these functions return a value whose magnitude is taken from
.I x .I x
and whose sign is taken from and whose sign is taken from
.IR y . .IR y .
.PP
If If
.I x .I x
is a NaN, is a NaN,

View File

@ -71,11 +71,11 @@ given in radians.
.SH RETURN VALUE .SH RETURN VALUE
On success, these functions return the cosine of On success, these functions return the cosine of
.IR x . .IR x .
.PP
If If
.I x .I x
is a NaN, a NaN is returned. is a NaN, a NaN is returned.
.PP
If If
.I x .I x
is positive infinity or negative infinity, is positive infinity or negative infinity,
@ -113,7 +113,7 @@ T} Thread safety MT-Safe
.TE .TE
.SH CONFORMING TO .SH CONFORMING TO
C99, POSIX.1-2001, POSIX.1-2008. C99, POSIX.1-2001, POSIX.1-2008.
.PP
The variant returning The variant returning
.I double .I double
also conforms to also conforms to

View File

@ -74,20 +74,20 @@ which is defined mathematically as:
.SH RETURN VALUE .SH RETURN VALUE
On success, these functions return the hyperbolic cosine of On success, these functions return the hyperbolic cosine of
.IR x . .IR x .
.PP
If If
.I x .I x
is a NaN, a NaN is returned. is a NaN, a NaN is returned.
.PP
If If
.I x .I x
is +0 or \-0, 1 is returned. is +0 or \-0, 1 is returned.
.PP
If If
.I x .I x
is positive infinity or negative infinity, is positive infinity or negative infinity,
positive infinity is returned. positive infinity is returned.
.PP
If the result overflows, If the result overflows,
a range error occurs, a range error occurs,
and the functions return and the functions return
@ -127,7 +127,7 @@ T} Thread safety MT-Safe
.TE .TE
.SH CONFORMING TO .SH CONFORMING TO
C99, POSIX.1-2001, POSIX.1-2008. C99, POSIX.1-2001, POSIX.1-2008.
.PP
The variant returning The variant returning
.I double .I double
also conforms to also conforms to

View File

@ -105,7 +105,7 @@ If you are planning on using the
.BR crypt () .BR crypt ()
interface for a cryptography project, don't do it: get a good book on interface for a cryptography project, don't do it: get a good book on
encryption and one of the widely available DES libraries. encryption and one of the widely available DES libraries.
.PP
.BR crypt_r () .BR crypt_r ()
is a reentrant version of is a reentrant version of
.BR crypt (). .BR crypt ().
@ -193,15 +193,15 @@ is a GNU extension.
.SS Glibc notes .SS Glibc notes
The glibc2 version of this function supports additional The glibc2 version of this function supports additional
encryption algorithms. encryption algorithms.
.PP
If If
.I salt .I salt
is a character string starting with the characters "$\fIid\fP$" is a character string starting with the characters "$\fIid\fP$"
followed by a string terminated by "$": followed by a string terminated by "$":
.RS .RS
.PP
$\fIid\fP$\fIsalt\fP$\fIencrypted\fP $\fIid\fP$\fIsalt\fP$\fIencrypted\fP
.PP
.RE .RE
then instead of using the DES machine, then instead of using the DES machine,
.I id .I id
@ -228,11 +228,11 @@ _
6 | SHA-512 (since glibc 2.7) 6 | SHA-512 (since glibc 2.7)
.TE .TE
.RE .RE
.PP
So $5$\fIsalt\fP$\fIencrypted\fP is an SHA-256 encoded So $5$\fIsalt\fP$\fIencrypted\fP is an SHA-256 encoded
password and $6$\fIsalt\fP$\fIencrypted\fP is an password and $6$\fIsalt\fP$\fIencrypted\fP is an
SHA-512 encoded one. SHA-512 encoded one.
.PP
"\fIsalt\fP" stands for the up to 16 characters "\fIsalt\fP" stands for the up to 16 characters
following "$\fIid\fP$" in the salt. following "$\fIid\fP$" in the salt.
The encrypted part of the password string is the actual computed password. The encrypted part of the password string is the actual computed password.
@ -243,7 +243,7 @@ MD5 | 22 characters
SHA-256 | 43 characters SHA-256 | 43 characters
SHA-512 | 86 characters SHA-512 | 86 characters
.TE .TE
.sp 1
The characters in "\fIsalt\fP" and "\fIencrypted\fP" are drawn from the set The characters in "\fIsalt\fP" and "\fIencrypted\fP" are drawn from the set
[\fBa\-zA\-Z0\-9./\fP]. [\fBa\-zA\-Z0\-9./\fP].
In the MD5 and SHA implementations the entire In the MD5 and SHA implementations the entire

View File

@ -20,7 +20,7 @@ Link with \fI\-lm\fP.
.SH DESCRIPTION .SH DESCRIPTION
These functions calculate the complex sine of These functions calculate the complex sine of
.IR z . .IR z .
.PP
The complex sine function is defined as: The complex sine function is defined as:
.nf .nf
@ -42,7 +42,7 @@ T{
.BR csinl () .BR csinl ()
T} Thread safety MT-Safe T} Thread safety MT-Safe
.TE .TE
.sp 1
.SH CONFORMING TO .SH CONFORMING TO
C99, POSIX.1-2001, POSIX.1-2008. C99, POSIX.1-2001, POSIX.1-2008.
.SH SEE ALSO .SH SEE ALSO

View File

@ -20,7 +20,7 @@ Link with \fI\-lm\fP.
.SH DESCRIPTION .SH DESCRIPTION
These functions calculate the complex hyperbolic sine of These functions calculate the complex hyperbolic sine of
.IR z . .IR z .
.PP
The complex hyperbolic sine function is defined as: The complex hyperbolic sine function is defined as:
.nf .nf
@ -42,7 +42,7 @@ T{
.BR csinhl () .BR csinhl ()
T} Thread safety MT-Safe T} Thread safety MT-Safe
.TE .TE
.sp 1
.SH CONFORMING TO .SH CONFORMING TO
C99, POSIX.1-2001, POSIX.1-2008. C99, POSIX.1-2001, POSIX.1-2008.
.SH SEE ALSO .SH SEE ALSO

View File

@ -40,7 +40,7 @@ T{
.BR csqrtl () .BR csqrtl ()
T} Thread safety MT-Safe T} Thread safety MT-Safe
.TE .TE
.sp 1
.SH CONFORMING TO .SH CONFORMING TO
C99, POSIX.1-2001, POSIX.1-2008. C99, POSIX.1-2001, POSIX.1-2008.
.SH SEE ALSO .SH SEE ALSO

View File

@ -20,7 +20,7 @@ Link with \fI\-lm\fP.
.SH DESCRIPTION .SH DESCRIPTION
These functions calculate the complex tangent of These functions calculate the complex tangent of
.IR z . .IR z .
.PP
The complex tangent function is defined as: The complex tangent function is defined as:
.nf .nf
@ -42,7 +42,7 @@ T{
.BR ctanl () .BR ctanl ()
T} Thread safety MT-Safe T} Thread safety MT-Safe
.TE .TE
.sp 1
.SH CONFORMING TO .SH CONFORMING TO
C99, POSIX.1-2001, POSIX.1-2008. C99, POSIX.1-2001, POSIX.1-2008.
.SH SEE ALSO .SH SEE ALSO

View File

@ -20,7 +20,7 @@ Link with \fI\-lm\fP.
.SH DESCRIPTION .SH DESCRIPTION
These functions calculate the complex hyperbolic tangent of These functions calculate the complex hyperbolic tangent of
.IR z . .IR z .
.PP
The complex hyperbolic tangent function is defined The complex hyperbolic tangent function is defined
mathematically as: mathematically as:
.nf .nf
@ -43,7 +43,7 @@ T{
.BR ctanhl () .BR ctanhl ()
T} Thread safety MT-Safe T} Thread safety MT-Safe
.TE .TE
.sp 1
.SH CONFORMING TO .SH CONFORMING TO
C99, POSIX.1-2001, POSIX.1-2008. C99, POSIX.1-2001, POSIX.1-2008.
.SH SEE ALSO .SH SEE ALSO

View File

@ -246,7 +246,7 @@ and a negative value means that
.BR mktime () .BR mktime ()
should (use timezone information and system databases to) should (use timezone information and system databases to)
attempt to determine whether DST is in effect at the specified time. attempt to determine whether DST is in effect at the specified time.
.PP
The The
.BR mktime () .BR mktime ()
function modifies the fields of the function modifies the fields of the
@ -266,7 +266,7 @@ Calling
.BR mktime () .BR mktime ()
also sets the external variable \fItzname\fP with also sets the external variable \fItzname\fP with
information about the current timezone. information about the current timezone.
.PP
If the specified broken-down If the specified broken-down
time cannot be represented as calendar time (seconds since the Epoch), time cannot be represented as calendar time (seconds since the Epoch),
.BR mktime () .BR mktime ()
@ -281,33 +281,33 @@ and
.BR localtime () .BR localtime ()
return a pointer to a return a pointer to a
.IR "struct\ tm" . .IR "struct\ tm" .
.PP
On success, On success,
.BR gmtime_r () .BR gmtime_r ()
and and
.BR localtime_r () .BR localtime_r ()
return the address of the structure pointed to by return the address of the structure pointed to by
.IR result . .IR result .
.PP
On success, On success,
.BR asctime () .BR asctime ()
and and
.BR ctime () .BR ctime ()
return a pointer to a string. return a pointer to a string.
.PP
On success, On success,
.BR asctime_r () .BR asctime_r ()
and and
.BR ctime_r () .BR ctime_r ()
return a pointer to the string pointed to by return a pointer to the string pointed to by
.IR buf . .IR buf .
.PP
On success, On success,
.BR mktime () .BR mktime ()
returns the calendar time (seconds since the Epoch), returns the calendar time (seconds since the Epoch),
expressed as a value of type expressed as a value of type
.IR time_t . .IR time_t .
.PP
On error, On error,
.BR mktime () .BR mktime ()
returns the value returns the value
@ -388,7 +388,7 @@ The thread-safe versions,
and and
.BR localtime_r (), .BR localtime_r (),
are specified by SUSv2. are specified by SUSv2.
.PP
POSIX.1-2001 says: POSIX.1-2001 says:
"The "The
.BR asctime (), .BR asctime (),
@ -421,7 +421,7 @@ defined when
was set before including was set before including
.IR <time.h> . .IR <time.h> .
This is a BSD extension, present in 4.3BSD-Reno. This is a BSD extension, present in 4.3BSD-Reno.
.PP
According to POSIX.1-2004, According to POSIX.1-2004,
.BR localtime () .BR localtime ()
is required to behave as though is required to behave as though

View File

@ -55,7 +55,7 @@ Since version 2.2, glibc no longer provides these interfaces.
Probably, you are looking for the APIs provided by the Probably, you are looking for the APIs provided by the
.I libdb .I libdb
library instead. library instead.
.PP
.BR dbopen () .BR dbopen ()
is the library interface to database files. is the library interface to database files.
The supported file formats are btree, hashed and UNIX file oriented. The supported file formats are btree, hashed and UNIX file oriented.
@ -556,6 +556,6 @@ locking, or transactions.
.BR hash (3), .BR hash (3),
.BR mpool (3), .BR mpool (3),
.BR recno (3) .BR recno (3)
.PP
.IR "LIBTP: Portable, Modular Transactions for UNIX" , .IR "LIBTP: Portable, Modular Transactions for UNIX" ,
Margo Seltzer, Michael Olson, USENIX proceedings, Winter 1992. Margo Seltzer, Michael Olson, USENIX proceedings, Winter 1992.

View File

@ -41,7 +41,7 @@ The
function allows an application to inquire at run time to find function allows an application to inquire at run time to find
out which shared objects it has loaded, out which shared objects it has loaded,
and the order in which they were loaded. and the order in which they were loaded.
.PP
The The
.BR dl_iterate_phdr () .BR dl_iterate_phdr ()
function walks through the list of an function walks through the list of an
@ -51,7 +51,7 @@ once for each object,
until either all shared objects have been processed or until either all shared objects have been processed or
.I callback .I callback
returns a nonzero value. returns a nonzero value.
.PP
Each call to Each call to
.I callback .I callback
receives three arguments: receives three arguments:
@ -68,11 +68,11 @@ program as the second argument (also named
.IR data ) .IR data )
in the call to in the call to
.BR dl_iterate_phdr (). .BR dl_iterate_phdr ().
.PP
The The
.I info .I info
argument is a structure of the following type: argument is a structure of the following type:
.PP
.in +4n .in +4n
.nf .nf
struct dl_phdr_info { struct dl_phdr_info {
@ -106,7 +106,7 @@ struct dl_phdr_info {
}; };
.fi .fi
.in .in
.PP
(The (The
.IR ElfW () .IR ElfW ()
macro definition turns its argument into the name of an ELF data macro definition turns its argument into the name of an ELF data
@ -118,7 +118,7 @@ yields the data type name
Further information on these types can be found in the Further information on these types can be found in the
.IR <elf.h> " and " <link.h> .IR <elf.h> " and " <link.h>
header files.) header files.)
.PP
The The
.I dlpi_addr .I dlpi_addr
field indicates the base address of the shared object field indicates the base address of the shared object
@ -129,7 +129,7 @@ The
.I dlpi_name .I dlpi_name
field is a null-terminated string giving the pathname field is a null-terminated string giving the pathname
from which the shared object was loaded. from which the shared object was loaded.
.PP
To understand the meaning of the To understand the meaning of the
.I dlpi_phdr .I dlpi_phdr
and and
@ -144,7 +144,7 @@ shared object.
The The
.I dlpi_phnum .I dlpi_phnum
field indicates the size of this array. field indicates the size of this array.
.PP
These program headers are structures of the following form: These program headers are structures of the following form:
.in +4n .in +4n
.nf .nf
@ -161,21 +161,21 @@ typedef struct {
} Elf32_Phdr; } Elf32_Phdr;
.fi .fi
.in .in
.PP
Note that we can calculate the location of a particular program header, Note that we can calculate the location of a particular program header,
.IR x , .IR x ,
in virtual memory using the formula: in virtual memory using the formula:
.PP
.nf .nf
addr == info\->dlpi_addr + info\->dlpi_phdr[x].p_vaddr; addr == info\->dlpi_addr + info\->dlpi_phdr[x].p_vaddr;
.fi .fi
.PP
Possible values for Possible values for
.I p_type .I p_type
include the following (see include the following (see
.IR <elf.h> .IR <elf.h>
for further details): for further details):
.PP
.nf .nf
.in +4n .in +4n
#define PT_LOAD 1 /* Loadable program segment */ #define PT_LOAD 1 /* Loadable program segment */
@ -211,7 +211,7 @@ T{
.BR dl_iterate_phdr () .BR dl_iterate_phdr ()
T} Thread safety MT-Safe T} Thread safety MT-Safe
.TE .TE
.sp 1
.SH CONFORMING TO .SH CONFORMING TO
The The
.BR dl_iterate_phdr () .BR dl_iterate_phdr ()
@ -234,7 +234,7 @@ structure; in that event, the
.I size .I size
argument provides a mechanism for the callback function to discover argument provides a mechanism for the callback function to discover
whether it is running on a system with added fields. whether it is running on a system with added fields.
.PP
The first object visited by The first object visited by
.IR callback .IR callback
is the main program. is the main program.
@ -247,7 +247,7 @@ shared objects it has loaded.
For each shared object, the program lists some information For each shared object, the program lists some information
(virtual address, size, flags, and type) (virtual address, size, flags, and type)
for each of the objects ELF segments. for each of the objects ELF segments.
.PP
The following shell session demonstrates the output The following shell session demonstrates the output
produced by the program on an x86-64 system. produced by the program on an x86-64 system.
The first shared object for which output is displayed The first shared object for which output is displayed
@ -292,7 +292,7 @@ Name: "/lib64/ld-linux-x86-64.so.2" (7 segments)
6: [0x7f55718afba0; memsz: 460] flags: 0x4; PT_GNU_RELRO 6: [0x7f55718afba0; memsz: 460] flags: 0x4; PT_GNU_RELRO
.in .in
.fi .fi
.PP
.SS Program source .SS Program source
\& \&
.nf .nf
@ -352,6 +352,6 @@ main(int argc, char *argv[])
.BR dlopen (3), .BR dlopen (3),
.BR elf (5), .BR elf (5),
.BR ld.so (8) .BR ld.so (8)
.PP
.IR "Executable and Linking Format Specification" , .IR "Executable and Linking Format Specification" ,
available at various locations online. available at various locations online.

View File

@ -75,7 +75,7 @@ could be found, then
and and
.I dli_saddr .I dli_saddr
are set to NULL. are set to NULL.
.PP
The function The function
.BR dladdr1 () .BR dladdr1 ()
is like is like
@ -97,7 +97,7 @@ structure (i.e.,
defined in defined in
.I <link.h> .I <link.h>
as: as:
.IP
.in +4n .in +4n
.nf .nf
struct link_map { struct link_map {
@ -134,7 +134,7 @@ yields the data type name
which is defined in which is defined in
.IR <elf.h> .IR <elf.h>
as: as:
.IP
.in +4n .in +4n
.nf .nf
typedef struct { typedef struct {
@ -147,11 +147,11 @@ typedef struct {
} Elf64_Sym; } Elf64_Sym;
.fi .fi
.in .in
.IP
The The
.I st_name .I st_name
field is an index into the string table. field is an index into the string table.
.IP
The The
.I st_info .I st_info
field encodes the symbol's type and binding. field encodes the symbol's type and binding.
@ -223,7 +223,7 @@ but not to a symbol in the shared object, then the
and and
.I info->dli_saddr .I info->dli_saddr
fields are set to NULL. fields are set to NULL.
.PP
If the address specified in If the address specified in
.I addr .I addr
could not be matched to a shared object, then these functions return 0. could not be matched to a shared object, then these functions return 0.

View File

@ -42,7 +42,7 @@ since the last call to
The returned string does The returned string does
.I not .I not
include a trailing newline. include a trailing newline.
.PP
.BR dlerror () .BR dlerror ()
returns NULL if no errors have occurred since initialization or since returns NULL if no errors have occurred since initialization or since
it was last called. it was last called.

View File

@ -54,7 +54,7 @@ The
argument is a pointer to a buffer used to store information argument is a pointer to a buffer used to store information
returned by the call; the type of this argument depends on returned by the call; the type of this argument depends on
.IR request . .IR request .
.PP
The following values are supported for The following values are supported for
.IR request .IR request
(with the corresponding type for (with the corresponding type for
@ -78,7 +78,7 @@ argument points to a pointer to a
structure, defined in structure, defined in
.I <link.h> .I <link.h>
as: as:
.IP
.in +4n .in +4n
.nf .nf
struct link_map { struct link_map {
@ -154,7 +154,7 @@ to obtain the library search paths.
The The
.I Dl_serinfo .I Dl_serinfo
structure is defined as follows: structure is defined as follows:
.IP
.in +4n .in +4n
.nf .nf
typedef struct { typedef struct {
@ -171,7 +171,7 @@ typedef struct {
Each of the Each of the
.I dls_serpath .I dls_serpath
elements in the above structure is a structure of the following form: elements in the above structure is a structure of the following form:
.IP
.in +4n .in +4n
.nf .nf
typedef struct { typedef struct {
@ -182,7 +182,7 @@ typedef struct {
} Dl_serpath; } Dl_serpath;
.fi .fi
.in .in
.IP
The The
.I dls_flags .I dls_flags
field is currently unused, and always contains zero. field is currently unused, and always contains zero.
@ -250,7 +250,7 @@ and
.B RTLD_DI_SERINFO .B RTLD_DI_SERINFO
requests to obtain the library search path list for the library. requests to obtain the library search path list for the library.
Here is an example of what we might see when running the program: Here is an example of what we might see when running the program:
.PP
.in +4n .in +4n
.nf .nf
$ \fB./a.out /lib64/libm.so.6\fP $ \fB./a.out /lib64/libm.so.6\fP

View File

@ -65,7 +65,7 @@ This handle is employed with other functions in the dlopen API, such as
.BR dlinfo (3), .BR dlinfo (3),
and and
.BR dlclose (). .BR dlclose ().
.PP
If If
.I filename .I filename
.\" FIXME On Solaris, when handle is NULL, we seem to get back .\" FIXME On Solaris, when handle is NULL, we seem to get back
@ -242,7 +242,7 @@ and
.I flags .I flags
arguments, as well as the return value, are the same, arguments, as well as the return value, are the same,
except for the differences noted below. except for the differences noted below.
.PP
The The
.BR dlmopen () .BR dlmopen ()
function differs from function differs from
@ -261,7 +261,7 @@ call is made.)
The The
.I Lmid_t .I Lmid_t
type is an opaque handle that refers to a namespace. type is an opaque handle that refers to a namespace.
.PP
The The
.I lmid .I lmid
argument is either the ID of an existing namespace argument is either the ID of an existing namespace
@ -300,7 +300,7 @@ All shared objects that were automatically loaded when
was invoked on the object referred to by was invoked on the object referred to by
.I handle .I handle
are recursively closed in the same manner. are recursively closed in the same manner.
.PP
A successful return from A successful return from
.BR dlclose () .BR dlclose ()
does not guarantee that the symbols associated with does not guarantee that the symbols associated with
@ -322,11 +322,11 @@ On error
(file could not be found, was not readable, had the wrong format, (file could not be found, was not readable, had the wrong format,
or caused errors during loading), or caused errors during loading),
these functions return NULL. these functions return NULL.
.PP
On success, On success,
.BR dlclose () .BR dlclose ()
returns 0; on error, it returns a nonzero value. returns 0; on error, it returns a nonzero value.
.PP
Errors from these functions can be diagnosed using Errors from these functions can be diagnosed using
.BR dlerror (3). .BR dlerror (3).
.SH VERSIONS .SH VERSIONS
@ -358,7 +358,7 @@ and
The The
.BR dlmopen () .BR dlmopen ()
function is a GNU extension. function is a GNU extension.
.PP
The The
.BR RTLD_NOLOAD , .BR RTLD_NOLOAD ,
.BR RTLD_NODELETE , .BR RTLD_NODELETE ,
@ -375,7 +375,7 @@ dependent shared objects are implicitly loaded according to the usual rules,
and symbol references are likewise resolved according to the usual rules, and symbol references are likewise resolved according to the usual rules,
but such resolution is confined to the definitions provided by the but such resolution is confined to the definitions provided by the
objects that have been (explicitly and implicitly) loaded into the namespace. objects that have been (explicitly and implicitly) loaded into the namespace.
.PP
The The
.BR dlmopen () .BR dlmopen ()
function permits object-load isolation\(emthe ability function permits object-load isolation\(emthe ability
@ -395,7 +395,7 @@ without exposing those symbols to the entire application.
This can be achieved by using a separate namespace and the This can be achieved by using a separate namespace and the
.B RTLD_GLOBAL .B RTLD_GLOBAL
flag. flag.
.PP
The The
.BR dlmopen () .BR dlmopen ()
function also can be used to provide better isolation than the function also can be used to provide better isolation than the
@ -411,7 +411,7 @@ Thus,
.BR RTLD_LOCAL .BR RTLD_LOCAL
is insufficient to isolate a loaded shared object except in the (uncommon) is insufficient to isolate a loaded shared object except in the (uncommon)
case where one has explicit control over all shared object dependencies. case where one has explicit control over all shared object dependencies.
.PP
Possible uses of Possible uses of
.BR dlmopen () .BR dlmopen ()
are plugins where the author of the plugin-loading framework are plugins where the author of the plugin-loading framework
@ -426,7 +426,7 @@ Using
.BR dlmopen (), .BR dlmopen (),
this can be achieved by loading the same shared object file into this can be achieved by loading the same shared object file into
different namespaces. different namespaces.
.PP
The glibc implementation supports a maximum of The glibc implementation supports a maximum of
.\" DL_NNS .\" DL_NNS
16 namespaces. 16 namespaces.
@ -450,7 +450,7 @@ See the
info pages (under "Function attributes") info pages (under "Function attributes")
.\" info gcc "C Extensions" "Function attributes" .\" info gcc "C Extensions" "Function attributes"
for further information. for further information.
.PP
An older method of (partially) achieving the same result is via the use of An older method of (partially) achieving the same result is via the use of
two special symbols recognized by the linker: two special symbols recognized by the linker:
.B _init .B _init
@ -491,7 +491,7 @@ permit multiple initialization and finalization functions to be defined.
.\" .\" void _init(void) __attribute__((constructor)); .\" .\" void _init(void) __attribute__((constructor));
.\" .\" void _fini(void) __attribute__((destructor)); .\" .\" void _fini(void) __attribute__((destructor));
.\" .\"
.PP
Since glibc 2.2.3, Since glibc 2.2.3,
.BR atexit (3) .BR atexit (3)
can be used to register an exit handler that is automatically can be used to register an exit handler that is automatically
@ -519,7 +519,7 @@ looks up the address of the
.BR cos (3) .BR cos (3)
function, and prints the cosine of 2.0. function, and prints the cosine of 2.0.
The following is an example of building and running the program: The following is an example of building and running the program:
.PP
.in +4n .in +4n
.nf .nf
$ \fBcc dlopen_demo.c \-ldl\fP $ \fBcc dlopen_demo.c \-ldl\fP
@ -594,5 +594,5 @@ main(void)
.BR rtld-audit (7), .BR rtld-audit (7),
.BR ld.so (8), .BR ld.so (8),
.BR ldconfig (8) .BR ldconfig (8)
.PP
gcc info pages, ld info pages gcc info pages, ld info pages

View File

@ -54,7 +54,7 @@ returns NULL.
(The search performed by (The search performed by
.BR dlsym () .BR dlsym ()
is breadth first through the dependency tree of these shared objects.) is breadth first through the dependency tree of these shared objects.)
.PP
Since the value of the symbol could actually be NULL (so that a Since the value of the symbol could actually be NULL (so that a
NULL return from NULL return from
.BR dlsym () .BR dlsym ()
@ -103,7 +103,7 @@ and
.B RTLD_NEXT .B RTLD_NEXT
from from
.IR <dlfcn.h> . .IR <dlfcn.h> .
.PP
.PP .PP
The function The function
.BR dlvsym () .BR dlvsym ()

View File

@ -87,7 +87,7 @@ These functions are the reentrant analogs of the functions described in
Instead of modifying the global random generator state, they use Instead of modifying the global random generator state, they use
the supplied data the supplied data
.IR buffer . .IR buffer .
.PP
Before the first use, this struct must be initialized, for example, Before the first use, this struct must be initialized, for example,
by filling it with zeros, or by calling one of the functions by filling it with zeros, or by calling one of the functions
.BR srand48_r (), .BR srand48_r (),

View File

@ -54,7 +54,7 @@ The
.BR duplocale () .BR duplocale ()
function creates a duplicate of the locale object referred to by function creates a duplicate of the locale object referred to by
.IR locobj . .IR locobj .
.PP
If If
.I locobj .I locobj
is is
@ -95,7 +95,7 @@ other functions that employ a locale handle, such as
This is done by applying This is done by applying
.BR duplocale () .BR duplocale ()
to the value returned by the following call: to the value returned by the following call:
.IP
loc = uselocale((locale_t) 0); loc = uselocale((locale_t) 0);
.IP .IP
This technique is necessary, because the above This technique is necessary, because the above

View File

@ -142,7 +142,7 @@ T} Thread safety MT-Safe
.BR encrypt (), .BR encrypt (),
.BR setkey (): .BR setkey ():
POSIX.1-2001, POSIX.1-2008, SUS, SVr4. POSIX.1-2001, POSIX.1-2008, SUS, SVr4.
.PP
The functions The functions
.BR encrypt_r () .BR encrypt_r ()
and and

View File

@ -53,7 +53,7 @@ they are not standardized; use with caution.
.SH NOTES .SH NOTES
The program must explicitly declare these symbols; The program must explicitly declare these symbols;
they are not defined in any header file. they are not defined in any header file.
.PP
On some systems the names of these symbols are preceded by underscores, On some systems the names of these symbols are preceded by underscores,
thus: thus:
.IR _etext , .IR _etext ,
@ -61,7 +61,7 @@ thus:
and and
.IR _end . .IR _end .
These symbols are also defined for programs compiled on Linux. These symbols are also defined for programs compiled on Linux.
.PP
At the start of program execution, At the start of program execution,
the program break will be somewhere near the program break will be somewhere near
.IR &end .IR &end

View File

@ -77,21 +77,21 @@ Feature Test Macro Requirements for glibc (see
These functions convert the byte encoding of integer values from These functions convert the byte encoding of integer values from
the byte order that the current CPU (the "host") uses, the byte order that the current CPU (the "host") uses,
to and from little-endian and big-endian byte order. to and from little-endian and big-endian byte order.
.PP
The number, The number,
.IR nn , .IR nn ,
in the name of each function indicates the size of in the name of each function indicates the size of
integer handled by the function, either 16, 32, or 64 bits. integer handled by the function, either 16, 32, or 64 bits.
.PP
The functions with names of the form "htobe\fInn\fP" convert The functions with names of the form "htobe\fInn\fP" convert
from host byte order to big-endian order. from host byte order to big-endian order.
.PP
The functions with names of the form "htole\fInn\fP" convert The functions with names of the form "htole\fInn\fP" convert
from host byte order to little-endian order. from host byte order to little-endian order.
.PP
The functions with names of the form "be\fInn\fPtoh" convert The functions with names of the form "be\fInn\fPtoh" convert
from big-endian order to host byte order. from big-endian order to host byte order.
.PP
The functions with names of the form "le\fInn\fPtoh" convert The functions with names of the form "le\fInn\fPtoh" convert
from little-endian order to host byte order. from little-endian order to host byte order.
.SH VERSIONS .SH VERSIONS
@ -119,7 +119,7 @@ For example,
.BR be32toh () .BR be32toh ()
is identical to is identical to
.BR ntohl (). .BR ntohl ().
.PP
The advantage of the The advantage of the
.BR byteorder (3) .BR byteorder (3)
functions is that they are standard functions available functions is that they are standard functions available

View File

@ -134,7 +134,7 @@ T{
.BR envz_strip () .BR envz_strip ()
T} Thread safety MT-Safe T} Thread safety MT-Safe
.TE .TE
.sp 1
.SH CONFORMING TO .SH CONFORMING TO
These functions are a GNU extension. These functions are a GNU extension.
Handle with care. Handle with care.

View File

@ -77,20 +77,20 @@ defined as
On success, these functions return the error function of On success, these functions return the error function of
.IR x , .IR x ,
a value in the range [\-1,\ 1]. a value in the range [\-1,\ 1].
.PP
If If
.I x .I x
is a NaN, a NaN is returned. is a NaN, a NaN is returned.
.PP
If If
.I x .I x
is +0 (\-0), +0 (\-0) is returned. is +0 (\-0), +0 (\-0) is returned.
.PP
If If
.I x .I x
is positive infinity (negative infinity), is positive infinity (negative infinity),
+1 (\-1) is returned. +1 (\-1) is returned.
.PP
If If
.I x .I x
is subnormal, is subnormal,
@ -132,7 +132,7 @@ T} Thread safety MT-Safe
.TE .TE
.SH CONFORMING TO .SH CONFORMING TO
C99, POSIX.1-2001, POSIX.1-2008. C99, POSIX.1-2001, POSIX.1-2008.
.PP
The variant returning The variant returning
.I double .I double
also conforms to also conforms to

View File

@ -66,28 +66,28 @@ that is, 1.0 \- erf(x).
On success, these functions return the complementary error function of On success, these functions return the complementary error function of
.IR x , .IR x ,
a value in the range [0,2]. a value in the range [0,2].
.PP
If If
.I x .I x
is a NaN, a NaN is returned. is a NaN, a NaN is returned.
.PP
If If
.I x .I x
is +0 or \-0, 1 is returned. is +0 or \-0, 1 is returned.
.PP
If If
.I x .I x
is positive infinity, is positive infinity,
+0 is returned. +0 is returned.
.PP
If If
.I x .I x
is negative infinity, is negative infinity,
+2 is returned. +2 is returned.
.PP
If the function result underflows and produces an unrepresentable value, If the function result underflows and produces an unrepresentable value,
the return value is 0.0. the return value is 0.0.
.PP
If the function result underflows but produces a representable If the function result underflows but produces a representable
(i.e., subnormal) value, (i.e., subnormal) value,
.\" e.g., erfc(27) on x86-32 .\" e.g., erfc(27) on x86-32
@ -129,7 +129,7 @@ T} Thread safety MT-Safe
.TE .TE
.SH CONFORMING TO .SH CONFORMING TO
C99, POSIX.1-2001, POSIX.1-2008. C99, POSIX.1-2001, POSIX.1-2008.
.PP
The variant returning The variant returning
.I double .I double
also conforms to also conforms to

View File

@ -128,7 +128,7 @@ T{
.BR vwarnx () .BR vwarnx ()
T} Thread safety MT-Safe locale T} Thread safety MT-Safe locale
.TE .TE
.sp 1
.SH CONFORMING TO .SH CONFORMING TO
These functions are nonstandard BSD extensions. These functions are nonstandard BSD extensions.
.\" .SH HISTORY .\" .SH HISTORY

View File

@ -50,12 +50,12 @@ a function that succeeds
.I is .I is
allowed to change allowed to change
.IR errno . .IR errno .
.PP
Valid error numbers are all nonzero; Valid error numbers are all nonzero;
.I errno .I errno
is never set to zero is never set to zero
by any system call or library function. by any system call or library function.
.PP
For some system calls and library functions (e.g., For some system calls and library functions (e.g.,
.BR getpriority (2)), .BR getpriority (2)),
\-1 is a valid return on success. \-1 is a valid return on success.
@ -67,7 +67,7 @@ if the call returns a status that indicates that an error
may have occurred, checking to see if may have occurred, checking to see if
.I errno .I errno
has a nonzero value. has a nonzero value.
.PP
.I errno .I errno
is defined by the ISO C standard to be a modifiable lvalue is defined by the ISO C standard to be a modifiable lvalue
of type of type
@ -78,14 +78,14 @@ may be a macro.
.I errno .I errno
is thread-local; setting it in one thread is thread-local; setting it in one thread
does not affect its value in any other thread. does not affect its value in any other thread.
.PP
All the error names specified by POSIX.1 All the error names specified by POSIX.1
must have distinct values, with the exception of must have distinct values, with the exception of
.B EAGAIN .B EAGAIN
and and
.BR EWOULDBLOCK , .BR EWOULDBLOCK ,
which may be the same. which may be the same.
.PP
.\" The following is now .\" The following is now
.\" POSIX.1 (2001 edition) lists the following symbolic error names. Of .\" POSIX.1 (2001 edition) lists the following symbolic error names. Of
.\" these, \fBEDOM\fP and \fBERANGE\fP are in the ISO C standard. ISO C .\" these, \fBEDOM\fP and \fBERANGE\fP are in the ISO C standard. ISO C
@ -208,7 +208,7 @@ Identifier removed (POSIX.1).
.TP .TP
.B EILSEQ .B EILSEQ
Invalid or incomplete multibyte or wide character (POSIX.1, C99). Invalid or incomplete multibyte or wide character (POSIX.1, C99).
.IP
The text shown here is the glibc error description; The text shown here is the glibc error description;
in POSIX.1, this error is described as "Illegal byte sequence". in POSIX.1, this error is described as "Illegal byte sequence".
.TP .TP
@ -327,7 +327,7 @@ No such device (POSIX.1).
.TP .TP
.B ENOENT .B ENOENT
No such file or directory (POSIX.1). No such file or directory (POSIX.1).
.IP
Typically, this error results when a specified pathname does not exist, Typically, this error results when a specified pathname does not exist,
or one of the components in the directory prefix of a pathname does not exist, or one of the components in the directory prefix of a pathname does not exist,
or the specified pathname is a dangling symbolic link. or the specified pathname is a dangling symbolic link.

View File

@ -61,7 +61,7 @@ should follow
.I format .I format
in the argument list. in the argument list.
The output is terminated by a newline character. The output is terminated by a newline character.
.PP
The program name printed by The program name printed by
.BR error () .BR error ()
is the value of the global variable is the value of the global variable
@ -72,13 +72,13 @@ initially has the same value as
.IR argv[0] . .IR argv[0] .
The value of this variable can be modified to change the output of The value of this variable can be modified to change the output of
.BR error (). .BR error ().
.PP
If \fIstatus\fP has a nonzero value, then If \fIstatus\fP has a nonzero value, then
.BR error () .BR error ()
calls calls
.BR exit (3) .BR exit (3)
to terminate the program using the given value as the exit status. to terminate the program using the given value as the exit status.
.PP
The The
.BR error_at_line () .BR error_at_line ()
function is exactly the same as function is exactly the same as
@ -98,20 +98,20 @@ The preprocessor values \fB__LINE__\fP and
.BR error_at_line (), .BR error_at_line (),
but other values can also be used. but other values can also be used.
For example, these arguments could refer to a location in an input file. For example, these arguments could refer to a location in an input file.
.PP
If the global variable \fIerror_one_per_line\fP is set nonzero, If the global variable \fIerror_one_per_line\fP is set nonzero,
a sequence of a sequence of
.BR error_at_line () .BR error_at_line ()
calls with the calls with the
same value of \fIfilename\fP and \fIlinenum\fP will result in only same value of \fIfilename\fP and \fIlinenum\fP will result in only
one message (the first) being output. one message (the first) being output.
.PP
The global variable \fIerror_message_count\fP counts the number of The global variable \fIerror_message_count\fP counts the number of
messages that have been output by messages that have been output by
.BR error () .BR error ()
and and
.BR error_at_line (). .BR error_at_line ().
.PP
If the global variable \fIerror_print_progname\fP If the global variable \fIerror_print_progname\fP
is assigned the address of a function is assigned the address of a function
(i.e., is not NULL), then that function is called (i.e., is not NULL), then that function is called
@ -137,7 +137,7 @@ MT-Unsafe\ race: error_at_line/error_one_per_line locale
T} T}
.TE .TE
.ad .ad
.PP
The internal The internal
.I error_one_per_line .I error_one_per_line
variable is accessed (without any form of synchronization, but since it's an variable is accessed (without any form of synchronization, but since it's an

View File

@ -44,13 +44,13 @@ However, whereas
performs checks using the real user and group identifiers of the process, performs checks using the real user and group identifiers of the process,
.BR euidaccess () .BR euidaccess ()
uses the effective identifiers. uses the effective identifiers.
.PP
.I mode .I mode
is a mask consisting of one or more of is a mask consisting of one or more of
.BR R_OK ", " W_OK ", " X_OK ", and " F_OK , .BR R_OK ", " W_OK ", " X_OK ", and " F_OK ,
with the same meanings as for with the same meanings as for
.BR access (2). .BR access (2).
.PP
.BR eaccess () .BR eaccess ()
is a synonym for is a synonym for
.BR euidaccess (), .BR euidaccess (),
@ -96,7 +96,7 @@ performing some operation based on that information leads to race conditions:
the file permissions may change between the two steps. the file permissions may change between the two steps.
Generally, it is safer just to attempt the desired operation and handle Generally, it is safer just to attempt the desired operation and handle
any permission error that occurs. any permission error that occurs.
.PP
This function always dereferences symbolic links. This function always dereferences symbolic links.
If you need to check the permissions on a symbolic link, use If you need to check the permissions on a symbolic link, use
.BR faccessat (2) .BR faccessat (2)

View File

@ -158,13 +158,13 @@ the current directory followed by the list of directories returned by
(This (This
.BR confstr (3) .BR confstr (3)
call typically returns the value "/bin:/usr/bin".) call typically returns the value "/bin:/usr/bin".)
.PP
If the specified filename includes a slash character, then If the specified filename includes a slash character, then
.B PATH .B PATH
is ignored, and the file at the specified pathname is executed. is ignored, and the file at the specified pathname is executed.
.PP
In addition, certain errors are treated specially. In addition, certain errors are treated specially.
.PP
If permission is denied for a file (the attempted If permission is denied for a file (the attempted
.BR execve (2) .BR execve (2)
failed with the error failed with the error
@ -175,7 +175,7 @@ they will return with
.I errno .I errno
set to set to
.BR EACCES . .BR EACCES .
.PP
If the header of a file isn't recognized (the attempted If the header of a file isn't recognized (the attempted
.BR execve (2) .BR execve (2)
failed with the error failed with the error
@ -221,7 +221,7 @@ T} Thread safety MT-Safe env
.TE .TE
.SH CONFORMING TO .SH CONFORMING TO
POSIX.1-2001, POSIX.1-2008. POSIX.1-2001, POSIX.1-2008.
.PP
The The
.BR execvpe () .BR execvpe ()
function is a GNU extension. function is a GNU extension.

View File

@ -70,26 +70,26 @@ logarithms) raised to the power of
.SH RETURN VALUE .SH RETURN VALUE
On success, these functions return the exponential value of On success, these functions return the exponential value of
.IR x . .IR x .
.PP
If If
.I x .I x
is a NaN, is a NaN,
a NaN is returned. a NaN is returned.
.PP
If If
.I x .I x
is positive infinity, is positive infinity,
positive infinity is returned. positive infinity is returned.
.PP
If If
.I x .I x
is negative infinity, is negative infinity,
+0 is returned. +0 is returned.
.PP
If the result underflows, If the result underflows,
a range error occurs, a range error occurs,
and zero is returned. and zero is returned.
.PP
If the result overflows, If the result overflows,
a range error occurs, a range error occurs,
and the functions return and the functions return
@ -103,7 +103,7 @@ See
.BR math_error (7) .BR math_error (7)
for information on how to determine whether an error has occurred for information on how to determine whether an error has occurred
when calling these functions. when calling these functions.
.PP
The following errors can occur: The following errors can occur:
.TP .TP
Range error, overflow Range error, overflow
@ -137,7 +137,7 @@ T} Thread safety MT-Safe
.TE .TE
.SH CONFORMING TO .SH CONFORMING TO
C99, POSIX.1-2001, POSIX.1-2008. C99, POSIX.1-2001, POSIX.1-2008.
.PP
The variant returning The variant returning
.I double .I double
also conforms to also conforms to

View File

@ -56,7 +56,7 @@ raised to the power of
.SH RETURN VALUE .SH RETURN VALUE
On success, these functions return the base-10 exponential value of On success, these functions return the base-10 exponential value of
.IR x . .IR x .
.PP
For various special cases, including the handling of infinity and NaN, For various special cases, including the handling of infinity and NaN,
as well as overflows and underflows, see as well as overflows and underflows, see
.BR exp (3). .BR exp (3).
@ -65,7 +65,7 @@ See
.BR math_error (7) .BR math_error (7)
for information on how to determine whether an error has occurred for information on how to determine whether an error has occurred
when calling these functions. when calling these functions.
.PP
For a discussion of the errors that can occur for these functions, see For a discussion of the errors that can occur for these functions, see
.BR exp (3). .BR exp (3).
.SH VERSIONS .SH VERSIONS

View File

@ -68,7 +68,7 @@ These functions return the value of 2 raised to the power of
.SH RETURN VALUE .SH RETURN VALUE
On success, these functions return the base-2 exponential value of On success, these functions return the base-2 exponential value of
.IR x . .IR x .
.PP
For various special cases, including the handling of infinity and NaN, For various special cases, including the handling of infinity and NaN,
as well as overflows and underflows, see as well as overflows and underflows, see
.BR exp (3). .BR exp (3).
@ -77,7 +77,7 @@ See
.BR math_error (7) .BR math_error (7)
for information on how to determine whether an error has occurred for information on how to determine whether an error has occurred
when calling these functions. when calling these functions.
.PP
For a discussion of the errors that can occur for these functions, see For a discussion of the errors that can occur for these functions, see
.BR exp (3). .BR exp (3).
.SH VERSIONS .SH VERSIONS
@ -98,7 +98,7 @@ T} Thread safety MT-Safe
.TE .TE
.SH CONFORMING TO .SH CONFORMING TO
C99, POSIX.1-2001, POSIX.1-2008. C99, POSIX.1-2001, POSIX.1-2008.
.PP
The variant returning The variant returning
.I double .I double
also conforms to also conforms to

View File

@ -83,25 +83,25 @@ subtraction of two numbers that are nearly equal.
.SH RETURN VALUE .SH RETURN VALUE
On success, these functions return On success, these functions return
.IR "exp(x)\ \-\ 1" . .IR "exp(x)\ \-\ 1" .
.PP
If If
.I x .I x
is a NaN, is a NaN,
a NaN is returned. a NaN is returned.
.PP
If If
.I x .I x
is +0 (\-0), is +0 (\-0),
+0 (\-0) is returned. +0 (\-0) is returned.
.PP
If If
.I x .I x
is positive infinity, positive infinity is returned. is positive infinity, positive infinity is returned.
.PP
If If
.I x .I x
is negative infinity, \-1 is returned. is negative infinity, \-1 is returned.
.PP
If the result overflows, a range error occurs, If the result overflows, a range error occurs,
and the functions return and the functions return
.RB - HUGE_VAL , .RB - HUGE_VAL ,
@ -153,7 +153,7 @@ values (where the function result approaches \-1),
raises a bogus underflow floating-point exception. raises a bogus underflow floating-point exception.
.\" FIXME . .\" FIXME .
.\" Bug raised: http://sources.redhat.com/bugzilla/show_bug.cgi?id=6778 .\" Bug raised: http://sources.redhat.com/bugzilla/show_bug.cgi?id=6778
.PP
For some large positive For some large positive
.I x .I x
values, values,
@ -164,7 +164,7 @@ overflow exception, and returns a NaN instead of positive infinity.
.\" Bug raised: http://sources.redhat.com/bugzilla/show_bug.cgi?id=6814 .\" Bug raised: http://sources.redhat.com/bugzilla/show_bug.cgi?id=6814
.\" e.g., expm1(1e5) through expm1(1.00199970127e5), .\" e.g., expm1(1e5) through expm1(1.00199970127e5),
.\" but not expm1(1.00199970128e5) and beyond. .\" but not expm1(1.00199970128e5) and beyond.
.PP
Before version 2.11, Before version 2.11,
.\" It looks like the fix was in 2.11, or possibly 2.12. .\" It looks like the fix was in 2.11, or possibly 2.12.
.\" I have no test system for 2.11, but 2.12 passes. .\" I have no test system for 2.11, but 2.12 passes.

View File

@ -66,15 +66,15 @@ number
.SH RETURN VALUE .SH RETURN VALUE
These functions return the absolute value of These functions return the absolute value of
.IR x . .IR x .
.PP
If If
.I x .I x
is a NaN, a NaN is returned. is a NaN, a NaN is returned.
.PP
If If
.I x .I x
is \-0, +0 is returned. is \-0, +0 is returned.
.PP
If If
.I x .I x
is negative infinity or positive infinity, positive infinity is returned. is negative infinity or positive infinity, positive infinity is returned.
@ -96,7 +96,7 @@ T} Thread safety MT-Safe
.TE .TE
.SH CONFORMING TO .SH CONFORMING TO
C99, POSIX.1-2001, POSIX.1-2008. C99, POSIX.1-2001, POSIX.1-2008.
.PP
The variant returning The variant returning
.I double .I double
also conforms to also conforms to

View File

@ -40,7 +40,7 @@ Buffered output for each stream is written before it is closed
(as for (as for
.BR fflush (3)); .BR fflush (3));
buffered input is discarded. buffered input is discarded.
.PP
The standard streams, The standard streams,
.IR stdin , .IR stdin ,
.IR stdout , .IR stdout ,

View File

@ -37,13 +37,13 @@ These functions return the positive difference, max(\fIx\fP-\fIy\fP,0),
between their arguments. between their arguments.
.SH RETURN VALUE .SH RETURN VALUE
On success, these functions return the positive difference. On success, these functions return the positive difference.
.PP
If If
.I x .I x
or or
.I y .I y
is a NaN, a NaN is returned. is a NaN, a NaN is returned.
.PP
If the result overflows, If the result overflows,
a range error occurs, a range error occurs,
and the functions return and the functions return

View File

@ -160,7 +160,7 @@ round to nearest (the default),
round up (toward positive infinity), round up (toward positive infinity),
round down (toward negative infinity), and round down (toward negative infinity), and
round toward zero. round toward zero.
.PP
Each of the macros Each of the macros
.BR FE_TONEAREST , .BR FE_TONEAREST ,
.BR FE_UPWARD , .BR FE_UPWARD ,
@ -179,7 +179,7 @@ The
.BR fesetround () .BR fesetround ()
function sets the rounding mode as specified by its argument function sets the rounding mode as specified by its argument
and returns zero when it was successful. and returns zero when it was successful.
.PP
C99 and POSIX.1-2008 specify an identifier, C99 and POSIX.1-2008 specify an identifier,
.BR FLT_ROUNDS , .BR FLT_ROUNDS ,
defined in defined in

View File

@ -126,7 +126,7 @@ The functions
and and
.BR ferror () .BR ferror ()
conform to C89, C99, POSIX.1-2001, and POSIX.1-2008. conform to C89, C99, POSIX.1-2001, and POSIX.1-2008.
.PP
The function The function
.BR fileno () .BR fileno ()
conforms to POSIX.1-2001 and POSIX.1-2008. conforms to POSIX.1-2001 and POSIX.1-2008.

View File

@ -103,7 +103,7 @@ T{
.BR fexecve () .BR fexecve ()
T} Thread safety MT-Safe T} Thread safety MT-Safe
.TE .TE
.sp 1
.SH CONFORMING TO .SH CONFORMING TO
POSIX.1-2008. POSIX.1-2008.
This function is not specified in POSIX.1-2001, This function is not specified in POSIX.1-2001,
@ -121,7 +121,7 @@ needs to be mounted and available at the time of the call.
.\" With the addition of the execveat(2), fexecve() can be implemented .\" With the addition of the execveat(2), fexecve() can be implemented
.\" even where /proc is unavailable. Review future glibc releases to .\" even where /proc is unavailable. Review future glibc releases to
.\" see if the implementation is changed to use execveat(2). .\" see if the implementation is changed to use execveat(2).
.PP
The idea behind The idea behind
.BR fexecve () .BR fexecve ()
is to allow the caller to verify (checksum) the contents of is to allow the caller to verify (checksum) the contents of
@ -138,7 +138,7 @@ of a file could be changed between the checksumming and the call to
.BR fexecve (); .BR fexecve ();
for that, the solution is to ensure that the permissions on the file for that, the solution is to ensure that the permissions on the file
prevent it from being modified by malicious users. prevent it from being modified by malicious users.
.PP
The natural idiom when using The natural idiom when using
.BR fexecve () .BR fexecve ()
is to set the close-on-exec flag on is to set the close-on-exec flag on

View File

@ -55,13 +55,13 @@ For output streams,
forces a write of all user-space buffered data for the given output or update forces a write of all user-space buffered data for the given output or update
.I stream .I stream
via the stream's underlying write function. via the stream's underlying write function.
.PP
For input streams associated with seekable files For input streams associated with seekable files
(e.g., disk files, but not pipes or terminals), (e.g., disk files, but not pipes or terminals),
.BR fflush () .BR fflush ()
discards any buffered data that has been fetched from the underlying file, discards any buffered data that has been fetched from the underlying file,
but has not been consumed by the application. but has not been consumed by the application.
.PP
The open status of the stream is unaffected. The open status of the stream is unaffected.
.PP .PP
If the If the
@ -109,7 +109,7 @@ T} Thread safety MT-Safe
.TE .TE
.SH CONFORMING TO .SH CONFORMING TO
C89, C99, POSIX.1-2001, POSIX.1-2008. C89, C99, POSIX.1-2001, POSIX.1-2008.
.PP
POSIX.1-2001 did not specify the behavior for flushing of input streams, POSIX.1-2001 did not specify the behavior for flushing of input streams,
but the behavior is specified in POSIX.1-2008. but the behavior is specified in POSIX.1-2008.
.SH NOTES .SH NOTES

View File

@ -107,7 +107,7 @@ T} Thread safety MT-Safe
.SH CONFORMING TO .SH CONFORMING TO
.BR ffs (): .BR ffs ():
POSIX.1-2001, POSIX.1-2008, 4.3BSD. POSIX.1-2001, POSIX.1-2008, 4.3BSD.
.PP
The The
.BR ffsl () .BR ffsl ()
and and

View File

@ -138,10 +138,10 @@ T{
.BR ungetc () .BR ungetc ()
T} Thread safety MT-Safe T} Thread safety MT-Safe
.TE .TE
.sp 1
.SH CONFORMING TO .SH CONFORMING TO
POSIX.1-2001, POSIX.1-2008, C89, C99. POSIX.1-2001, POSIX.1-2008, C89, C99.
.PP
It is not advisable to mix calls to input functions from the It is not advisable to mix calls to input functions from the
.I stdio .I stdio
library with low-level calls to library with low-level calls to

View File

@ -99,7 +99,7 @@ functions return a nonzero value if
.I x .I x
is neither infinite is neither infinite
nor a "not-a-number" (NaN) value, and 0 otherwise. nor a "not-a-number" (NaN) value, and 0 otherwise.
.PP
The The
.BR isnan (), .BR isnan (),
.BR isnanf (), .BR isnanf (),
@ -109,7 +109,7 @@ functions return a nonzero value if
.I x .I x
is a NaN value, is a NaN value,
and 0 otherwise. and 0 otherwise.
.PP
The The
.BR isinf (), .BR isinf (),
.BR isinff (), .BR isinff (),

View File

@ -57,7 +57,7 @@ _ISOC99_SOURCE || _POSIX_C_SOURCE\ >=\ 200112L
.SH DESCRIPTION .SH DESCRIPTION
These functions return the largest integral value that is not greater than These functions return the largest integral value that is not greater than
.IR x . .IR x .
.PP
For example, For example,
.IR floor(0.5) .IR floor(0.5)
is 0.0, and is 0.0, and
@ -66,7 +66,7 @@ is \-1.0.
.SH RETURN VALUE .SH RETURN VALUE
These functions return the floor of These functions return the floor of
.IR x . .IR x .
.PP
If If
.I x .I x
is integral, +0, \-0, NaN, or an infinity, is integral, +0, \-0, NaN, or an infinity,
@ -91,7 +91,7 @@ T} Thread safety MT-Safe
.TE .TE
.SH CONFORMING TO .SH CONFORMING TO
C99, POSIX.1-2001, POSIX.1-2008. C99, POSIX.1-2001, POSIX.1-2008.
.PP
The variant returning The variant returning
.I double .I double
also conforms to also conforms to

View File

@ -48,13 +48,13 @@ current rounding mode (see
These functions return the value of These functions return the value of
.IR x " * " y " + " z , .IR x " * " y " + " z ,
rounded as one ternary operation. rounded as one ternary operation.
.PP
If If
.I x .I x
or or
.I y .I y
is a NaN, a NaN is returned. is a NaN, a NaN is returned.
.PP
If If
.I x .I x
times times
@ -64,7 +64,7 @@ is an exact infinity, and
is an infinity with the opposite sign, is an infinity with the opposite sign,
a domain error occurs, a domain error occurs,
and a NaN is returned. and a NaN is returned.
.PP
.\" POSIX.1-2008 allows some possible differences for the following two .\" POSIX.1-2008 allows some possible differences for the following two
.\" domain error cases, but on Linux they are treated the same (AFAICS). .\" domain error cases, but on Linux they are treated the same (AFAICS).
.\" Nevertheless, we'll mirror POSIX.1 and describe the two cases .\" Nevertheless, we'll mirror POSIX.1 and describe the two cases
@ -80,7 +80,7 @@ a domain error occurs, and
a NaN is returned. a NaN is returned.
.\" POSIX.1 says that a NaN or an implementation-defined value shall .\" POSIX.1 says that a NaN or an implementation-defined value shall
.\" be returned for this case. .\" be returned for this case.
.PP
If one of If one of
.I x .I x
or or
@ -91,7 +91,7 @@ is a NaN,
.\" POSIX.1 makes the domain error optional for this case. .\" POSIX.1 makes the domain error optional for this case.
a domain error occurs, and a domain error occurs, and
a NaN is returned. a NaN is returned.
.PP
If If
.I x .I x
times times
@ -100,11 +100,11 @@ is not an infinity times zero (or vice versa), and
.I z .I z
is a NaN, is a NaN,
a NaN is returned. a NaN is returned.
.PP
If the result overflows, If the result overflows,
a range error occurs, and a range error occurs, and
an infinity with the correct sign is returned. an infinity with the correct sign is returned.
.PP
If the result underflows, If the result underflows,
a range error occurs, and a range error occurs, and
a signed 0 is returned. a signed 0 is returned.

View File

@ -43,9 +43,9 @@ These functions return the maximum of
.I x .I x
and and
.IR y . .IR y .
.PP
If one argument is a NaN, the other argument is returned. If one argument is a NaN, the other argument is returned.
.PP
If both arguments are NaN, a NaN is returned. If both arguments are NaN, a NaN is returned.
.SH ERRORS .SH ERRORS
No errors occur. No errors occur.

View File

@ -40,7 +40,7 @@ function opens a stream that permits the access specified by
The stream allows I/O to be performed on the string or memory buffer The stream allows I/O to be performed on the string or memory buffer
pointed to by pointed to by
.IR buf . .IR buf .
.PP
The The
.I mode .I mode
argument specifies the semantics of I/O on the stream, argument specifies the semantics of I/O on the stream,
@ -113,7 +113,7 @@ buffer
.I size .I size
counts that byte) counts that byte)
to allow for this. to allow for this.
.PP
In a stream opened for reading, In a stream opened for reading,
null bytes (\(aq\\0\(aq) in the buffer do not cause read null bytes (\(aq\\0\(aq) in the buffer do not cause read
operations to return an end-of-file indication. operations to return an end-of-file indication.
@ -121,11 +121,11 @@ A read from the buffer will indicate end-of-file
only when the current buffer position advances only when the current buffer position advances
.I size .I size
bytes past the start of the buffer. bytes past the start of the buffer.
.PP
Write operations take place either at the current position Write operations take place either at the current position
(for modes other than append), or at the current size of the stream (for modes other than append), or at the current size of the stream
(for append modes). (for append modes).
.PP
Attempts to write more than Attempts to write more than
.I size .I size
bytes to the buffer result in an error. bytes to the buffer result in an error.
@ -135,7 +135,7 @@ By default, such errors will be visible
buffer is flushed. buffer is flushed.
Disabling buffering with the following call Disabling buffering with the following call
may be useful to detect errors at the time of an output operation: may be useful to detect errors at the time of an output operation:
.PP
setbuf(stream, NULL); setbuf(stream, NULL);
.SH RETURN VALUE .SH RETURN VALUE
Upon successful completion, Upon successful completion,
@ -161,12 +161,12 @@ T{
.BR fmemopen (), .BR fmemopen (),
T} Thread safety MT-Safe T} Thread safety MT-Safe
.TE .TE
.sp 1
.SH CONFORMING TO .SH CONFORMING TO
POSIX.1-2008. POSIX.1-2008.
This function is not specified in POSIX.1-2001, This function is not specified in POSIX.1-2001,
and is not widely available on other systems. and is not widely available on other systems.
.PP
POSIX.1-2008 specifies that \(aqb\(aq in POSIX.1-2008 specifies that \(aqb\(aq in
.IR mode .IR mode
shall be ignored. shall be ignored.
@ -180,7 +180,7 @@ returned by this function
(i.e., (i.e.,
.BR fileno (3) .BR fileno (3)
will return an error if called on the returned stream). will return an error if called on the returned stream).
.PP
With version 2.22, binary mode (see below) was removed, With version 2.22, binary mode (see below) was removed,
many longstanding bugs in the implementation of many longstanding bugs in the implementation of
.BR fmemopen () .BR fmemopen ()
@ -199,7 +199,7 @@ writes don't implicitly add a terminating null byte, and
is relative to the end of the buffer (i.e., the value specified by the is relative to the end of the buffer (i.e., the value specified by the
.I size .I size
argument), rather than the current string length. argument), rather than the current string length.
.PP
An API bug afflicted the implementation of binary mode: An API bug afflicted the implementation of binary mode:
to specify binary mode, the \(aqb\(aq must be the to specify binary mode, the \(aqb\(aq must be the
.I second .I second
@ -211,7 +211,7 @@ This is inconsistent with the treatment of
.IR mode .IR mode
by by
.BR fopen (3). .BR fopen (3).
.PP
Binary mode was removed in glibc 2.22; a \(aqb\(aq specified in Binary mode was removed in glibc 2.22; a \(aqb\(aq specified in
.I mode .I mode
has no effect. has no effect.
@ -226,7 +226,7 @@ fails with the error
It would be more consistent if this case successfully created It would be more consistent if this case successfully created
a stream that then returned end-of-file on the first attempt at reading; a stream that then returned end-of-file on the first attempt at reading;
since version 2.22, the glibc implementation provides that behavior. since version 2.22, the glibc implementation provides that behavior.
.PP
In versions of glibc before 2.22, In versions of glibc before 2.22,
specifying append mode ("a" or "a+") for specifying append mode ("a" or "a+") for
.BR fmemopen () .BR fmemopen ()
@ -236,7 +236,7 @@ sets the initial buffer position to the first null byte, but
the end of the stream) the end of the stream)
does not force subsequent writes to append at the end of the stream. does not force subsequent writes to append at the end of the stream.
This bug is fixed in glibc 2.22. This bug is fixed in glibc 2.22.
.PP
In versions of glibc before 2.22, if the In versions of glibc before 2.22, if the
.I mode .I mode
argument to argument to
@ -253,7 +253,7 @@ However, in this case the glibc
.BR fmemopen () .BR fmemopen ()
sets the buffer position to \-1. sets the buffer position to \-1.
This bug is fixed in glibc 2.22. This bug is fixed in glibc 2.22.
.PP
In versions of glibc before 2.22, In versions of glibc before 2.22,
.\" https://sourceware.org/bugzilla/show_bug.cgi?id=14292 .\" https://sourceware.org/bugzilla/show_bug.cgi?id=14292
when a call to when a call to
@ -270,7 +270,7 @@ was
.IR subtracted .IR subtracted
from the end-of-stream position, instead of being added. from the end-of-stream position, instead of being added.
This bug is fixed in glibc 2.22. This bug is fixed in glibc 2.22.
.PP
The glibc 2.9 addition of "binary" mode for The glibc 2.9 addition of "binary" mode for
.BR fmemopen () .BR fmemopen ()
.\" http://sourceware.org/bugzilla/show_bug.cgi?id=6544 .\" http://sourceware.org/bugzilla/show_bug.cgi?id=6544

View File

@ -43,9 +43,9 @@ These functions return the minimum of
.I x .I x
and and
.IR y . .IR y .
.PP
If one argument is a NaN, the other argument is returned. If one argument is a NaN, the other argument is returned.
.PP
If both arguments are NaN, a NaN is returned. If both arguments are NaN, a NaN is returned.
.SH ERRORS .SH ERRORS
No errors occur. No errors occur.

View File

@ -89,25 +89,25 @@ such that the returned value has the same sign as
.I x .I x
and a magnitude less than the magnitude of and a magnitude less than the magnitude of
.IR y . .IR y .
.PP
If If
.I x .I x
or or
.I y .I y
is a NaN, a NaN is returned. is a NaN, a NaN is returned.
.PP
If If
.I x .I x
is an infinity, is an infinity,
a domain error occurs, and a domain error occurs, and
a NaN is returned. a NaN is returned.
.PP
If If
.I y .I y
is zero, is zero,
a domain error occurs, and a domain error occurs, and
a NaN is returned. a NaN is returned.
.PP
If If
.I x .I x
is +0 (\-0), and is +0 (\-0), and
@ -155,7 +155,7 @@ T} Thread safety MT-Safe
.TE .TE
.SH CONFORMING TO .SH CONFORMING TO
C99, POSIX.1-2001, POSIX.1-2008. C99, POSIX.1-2001, POSIX.1-2008.
.PP
The variant returning The variant returning
.I double .I double
also conforms to also conforms to

View File

@ -243,7 +243,7 @@ Before glibc 2.16, the
.BR fmtmsg () .BR fmtmsg ()
function uses a static variable that is not protected, function uses a static variable that is not protected,
so it is not thread-safe. so it is not thread-safe.
.PP
Since glibc 2.16, Since glibc 2.16,
.\" Modified in commit 7724defcf8873116fe4efab256596861eef21a94 .\" Modified in commit 7724defcf8873116fe4efab256596861eef21a94
the the
@ -259,7 +259,7 @@ and environment variables
and and
.B SEV_LEVEL .B SEV_LEVEL
come from System V. come from System V.
.PP
The function The function
.BR fmtmsg () .BR fmtmsg ()
and the environment variable and the environment variable

View File

@ -202,7 +202,7 @@ The
argument is used just as in the argument is used just as in the
.BR fopen () .BR fopen ()
function. function.
.PP
If the If the
.I pathname .I pathname
argument is a null pointer, argument is a null pointer,
@ -213,7 +213,7 @@ that is,
.BR freopen () .BR freopen ()
reopens the pathname that is associated with the stream. reopens the pathname that is associated with the stream.
The specification for this behavior was added in the C99 standard, which says: The specification for this behavior was added in the C99 standard, which says:
.PP
.RS .RS
In this case, In this case,
the file descriptor associated with the stream need not be closed the file descriptor associated with the stream need not be closed
@ -303,7 +303,7 @@ T} Thread safety MT-Safe
.BR fopen (), .BR fopen (),
.BR freopen (): .BR freopen ():
POSIX.1-2001, POSIX.1-2008, C89, C99. POSIX.1-2001, POSIX.1-2008, C89, C99.
.PP
.BR fdopen (): .BR fdopen ():
POSIX.1-2001, POSIX.1-2008. POSIX.1-2001, POSIX.1-2008.
.SH NOTES .SH NOTES
@ -364,9 +364,9 @@ and
support the following syntax support the following syntax
in in
.IR mode : .IR mode :
.PP
.BI " ,ccs=" string .BI " ,ccs=" string
.PP
The given The given
.I string .I string
is taken as the name of a coded character set and is taken as the name of a coded character set and

Some files were not shown because too many files have changed in this diff Show More