-==================== Changes in man-pages-3.41 ====================
+==================== Changes in man-pages-3.50 ====================
-Released: 2011-05-11, Christchurch
+Released: 2013-03-15, Munich
Contributors
in the changelog below) reports, notes, and ideas that have been
incorporated in changes in this release:
-Akihiro MOTOKI <amotoki@gmail.com>
-Andries E. Brouwer <Andries.Brouwer@cwi.nl>
-Angelo Borsotti <angelo.borsotti@gmail.com >
-Bjarni Ingi Gislason <bjarniig@rhi.hi.is>
-Brian M. Carlson <sandals@crustytoothpaste.ath.cx>
-Casper.Dik@oracle.com
-David Prévot <taffit@debian.org>
-D. Barbier <bouzim@gmail.com>
-Eric Blake <eblake@redhat.com>
-Hugh Dickins <hughd@google.com>
-Ivana Varekova <varekova@redhat.com>
-Jakub Jelinek <jakub@redhat.com>
-Jan Kara <jack@suse.cz>
-Jason Baron <jbaron@redhat.com>
-Jean-Michel Vourgère <jmv_deb@nirgal.com>
-Jeff Moyer <jmoyer@redhat.com>
-Josh Triplett <josh@joshtriplett.org>
-Kasper Dupont <kasperd@gmail.com>
-KOSAKI Motohiro <kosaki.motohiro@jp.fujitsu.com>
-Lauri Kasanen <curaga@operamail.com>
-Mel Gorman <mgorman@suse.de>
+Andrey Vagin <avagin@openvz.org>
+Bernhard Kuemel <bernhard@bksys.at>
+Elie De Brauwer <eliedebrauwer@gmail.com>
+Erik Saule <erik.saule@bmi.osu.edu>
+Florian Weimer <fweimer@bfk.de>
+Friedrich Delgado Friedrichs <friedel@nomaden.org>
+Jonathan Nieder <jrnieder@gmail.com>
+Jose Luis Domingo Lopez <debian@24x7linux.com>
+Mark R Bannister <mark@proseconsulting.co.uk>
Michael Kerrisk <mtk.manpages@gmail.com>
-Mike Frysinger <vapier@gentoo.org>
-Nick Piggin <npiggin@gmail.com>
-Paul Pluzhnikov <ppluzhnikov@google.com>
-Petr Baudis <pasky@ucw.cz>
-Ralph Corderoy <ralph@inputplus.co.uk >
-Rich Felker <bugdal@aerifal.cx>
-Simone Piccardi <piccardi@truelite.it>
+Sam Varshavchik <mrsam@courier-mta.com>
Simon Paillard <spaillard@debian.org>
-Stefan Puiu <stefan.puiu@gmail.com>
-Stephen Hemminger <shemminger@vyatta.com>
-Vincent Lefevre <vincent@vinc17.net>
-Yuri Kozlov <yuray@komyakino.ru>
Apologies if I missed anyone!
New and rewritten pages
-----------------------
-get_robust_list.2
- Ivana Varekova [Michael Kerrisk]
- New page documenting get_robust_list(2) and set_robust_list(2)
-
-mallinfo.3
- Michael Kerrisk [KOSAKI Motohiro, Paul Pluzhnikov]
- New page for mallinfo(3)
-
-malloc_info.3
- Michael Kerrisk [Jakub Jelinek]
- New page for malloc_info(3)
-
-malloc_stats.3
- Michael Kerrisk [KOSAKI Motohiro]
- New man page for malloc_stats(3)
-
-
-Newly documented interfaces in existing pages
----------------------------------------------
-
-madvise.2
- Jason Baron
- Document MADV_DONTDUMP and MADV_DODUMP
-
-
-New and changed links
----------------------
-
-set_robust_list.2
- Michael Kerrisk
- New link to new get_robust_list.2 page
-
-LIST_ENTRY.3
-LIST_HEAD.3
-LIST_INIT.3
-LIST_INSERT_AFTER.3
-LIST_INSERT_HEAD.3
-LIST_REMOVE.3
-TAILQ_ENTRY.3
-TAILQ_HEAD.3
-TAILQ_INIT.3
-TAILQ_INSERT_AFTER.3
-TAILQ_INSERT_HEAD.3
-TAILQ_INSERT_TAIL.3
-TAILQ_REMOVE.3
-CIRCLEQ_ENTRY.3
-CIRCLEQ_HEAD.3
-CIRCLEQ_INIT.3
-CIRCLEQ_INSERT_AFTER.3
-CIRCLEQ_INSERT_BEFORE.3
-CIRCLEQ_INSERT_HEAD.3
-CIRCLEQ_INSERT_TAIL.3
-CIRCLEQ_REMOVE.3
+canonicalize_file_name.3
Michael Kerrisk
- New link to queue.3
- The queue(3) page documents these macros, so it makes sense to
- have links for the names.
-
-DES_FAILED.3
- Michael Kerrisk
- New link to des_crypt.3
- The des_crypt(3) page documents this macro, so it makes sense
- to have a link for the name.
-
-qsort_r.3
- Michael Kerrisk
- New link to qsort.3
- Overlooked to add this link in 3.38, when documentation of
- qsort_r() was added to the qsort.3 page.
+ Rewrite page, adding much more detail
Global changes
--------------
-faccessat.2
-fchmodat.2
-fchownat.2
-fstatat.2
-futimesat.2
-inotify_init.2
-linkat.2
-mkdirat.2
-mknodat.2
-openat.2
-readlinkat.2
-renameat.2
-setns.2
-splice.2
-symlinkat.2
-sync.2
-tee.2
-unlinkat.2
-vmsplice.2
- Michael Kerrisk [Lauri Kasanen]
- Global fix: note glibc version that added library support
-
-confstr.3
-strcasecmp.3
-strcat.3
-strcmp.3
-strcpy.3
-strdup.3
-strftime.3
-strlen.3
-strnlen.3
-strpbrk.3
-strspn.3
-strtok.3
-strxfrm.3
- Michael Kerrisk [Andries E. Brouwer]
- Clarify that these functions operate on bytes, not (wide) characters
- Change 'character(s)' to 'byte(s)' to make clear that these
- functions operate on bytes, not wide / UTF8 characters.
- (POSIX uses 'byte(s)' similarly, to make this point.)
-
-icmp.7
-ipv6.7
-packet.7
-raw.7
-rtnetlink.7
-unix.7
-x25.7
+Various pages
+ Michael Kerrisk
+ Global fix: s/END_LICENSE/LICENSE_END/
+
+Various pages
Michael Kerrisk
- Remove names of constants from NAME line
- Some of the sockets/network protocol pages included names of
- the corresponding address family constants in the NAME line,
- but this wasn't done consistently across all pages, and probably
- it adds little value in those pages that did do this. So, remove
- these constants from those pages that have them in the NAME
- section.
+ Global fix: s/bitmask/bit mask/
Changes to individual pages
---------------------------
-clock_getres.2
- Michael Kerrisk [Josh Triplett]
- Expand description of CLOCK_REALTIME
- Make it clear that this clock may be discontinuous, and is
- affected my incremental NTP and clock-adjtime(2) adjustments.
-
- See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=540872
-
-epoll_wait.2
- Michael Kerrisk
- Clarify that 'timeout' is a *minimum* interval
- Make it clear that 'timeout' is a minimum interval; the actual
- interval will be rounded up to the system clock granularity,
- and may overrun because of kernel scheduling delays.
+getent.1
+ Mark R Bannister
+ netgroup description incorrectly refers to initgroups
-execve.2
+capget.2
Michael Kerrisk
- Rewording to deemphasize libc5 details
+ Update URL for libcap
fork.2
- Mike Frysinger
- ERRORS: add ENOSYS
- Can occur on, for example, non-MMU hardware.
-
-getcpu.2
- Mike Frysinger
- Add RETURN VALUE and ERRORS sections
- Michael Kerrisk
- Refer reader to NOTES for more info about 'tcache'
Michael Kerrisk
- DESCRIPTION: reword a sentence to be clearer
+ Port access permission bits (ioperm()) are turned off in the child
-io_cancel.2
-io_destroy.2
-io_getevents.2
-io_setup.2
-io_submit.2
+futex.2
Michael Kerrisk
- Rewrite to focus on system call API
- Rewrite to focus on the system call interface, adding
- some notes on the libaio wrapper differences.
- See the following mail:
- 2012-05-07 "aio manuals", linux-man@vger.kernel.org
- http://thread.gmane.org/gmane.linux.man/1935/focus=2910
-
- Other minor rewrites.
+ 'timeout' is a minimum duration that the call will wait, not a maximum
-mount.2
+ioperm.2
Michael Kerrisk
- Comment out an old Linux libc detail
-
-open.2
- Nick Piggin [KOSAKI Motohiro, Jan Kara, Hugh Dickins]
- Describe race of direct I/O and fork()
- Rework 04cd7f64, which didn't capture the details correctly.
- See the April/May 2012 linux-man@ mail thread "[PATCH]
- Describe race of direct read and fork for unaligned buffers"
- http://thread.gmane.org/gmane.linux.kernel.mm/77571
-
-poll.2
+ Note that iopl() level of 3 is needed to access ports
Michael Kerrisk
- Clarify that 'timeout' is a *minimum* interval
- Make it clear that 'timeout' is a minimum interval; the actual
- interval will be rounded up to the system clock granularity,
- and may overrun because of kernel scheduling delays.
+ 'num' is *bits* not bytes!
Michael Kerrisk
- Clarify discussion of wrapper function emulation
- Clarify that glibc (as well as old libc) provides emulation
- using select(2) on older kernels that don't have a poll()
- system call.
+ Linux 2.6.8 lifted the port limit to 65,536
+ See http://article.gmane.org/gmane.linux.kernel/202624/
+ From: Stas Sergeev <stsp <at> aknet.ru>
+ Subject: [patch][rfc] Larger IO bitmap
+ Date: 2004-05-07 19:55:03 GMT
Michael Kerrisk
- Make the meaning of a zero timeout explicit
- Clarify that timeout==0 causes an immediate return, even if
- no file descriptors are ready.
-
-pread.2
- Michael Kerrisk [Kasper Dupont]
- BUGS: Note O_APPEND + pwrite() does the wrong thing
- See https://bugzilla.kernel.org/show_bug.cgi?id=43178
-
-recvmmsg.2
+ ioperm() operates on the calling *thread* (not process)
Michael Kerrisk
- Clarify that 'timeout' is a *minimum* interval
- Make it clear that 'timeout' interval will be rounded up to the
- system clock granularity, and may overrun because of kernel
- scheduling delays.
-
-select.2
+ Clarify meaning of 'turn_on' argument
+ Plus form formatting fixes.
Michael Kerrisk
- Clarify that 'timeout' is a *minimum* interval
- Make it clear that 'timeout' is a minimum interval; the actual
- interval will be rounded up to the system clock granularity,
- and may overrun because of kernel scheduling delays.
+ Clarify that default state of permission bits in child is off
Michael Kerrisk
- Expand description of the self-pipe trick
+ NOTES: add mention of /proc/ioports
Michael Kerrisk
- Add further details on pselect6() system call that underlies pselect()
+ SEE ALSO: add outb(2)
-semop.2
+iopl.2
Michael Kerrisk
- Clarify that 'timeout' of semtimedop() is a *minimum* interval
- Make it clear that 'timeout' interval will be rounded up to the
- system clock granularity, and may overrun because of kernel
- scheduling delays.
-
-signal.2
+ CAP_SYS_RAWIO is required to *raise* the I/O privilege level
Michael Kerrisk
- Note that 'sig_t' requires _BSD_SOURCE
- Also remove some old Linux libc details
-
-sigwaitinfo.2
+ Clarify that the two least significant bits of 'level' are what matter
Michael Kerrisk
- Clarify that 'timeout' of sigtimedwait() is a *minimum* interval
- Make it clear that 'timeout' is a minimum interval; the actual
- interval will be rounded up to the system clock granularity,
- and may overrun because of kernel scheduling delays.
-
-stat.2
- Bjarni Ingi Gislason
- Formatting fixes
- From "groff -ww" (or "man --warnings=w ..."):
-
- warning: around line 442: table wider than line width
-
- GNU man uses line length of 78.
-
- Use text blocks. Two spaces between sentences or better: start
- each sentence in a new line.
+ SEE ALSO: add outb(2)
syscalls.2
- Bjarni Ingi Gislason
- Formatting fixes
- From "groff -ww ..." (or "man --warnings=w ..."):
-
- warning: around line 157: table wider than line width
-
- Have to use text blocks. Move some text to its correct column.
- Split text to two columns to avoid hyphenation.
-
-sysinfo.2
- Michael Kerrisk
- Remove reference to obsolete libc5
-
-syslog.2
- Michael Kerrisk
- Remove some details about obsolete Linux libc
-
-aio_cancel.3
-aio_error.3
-aio_fsync.3
-aio_read.3
-aio_return.3
-aio_suspend.3
-aio_write.3
- Michael Kerrisk
- ERRORS: Add/update ENOSYS error
-
-aio_cancel.3
- Michael Kerrisk
- Clarify what happens when a request isn't successfully canceled
- Michael Kerrisk
- Add pointers to aio(7) and sigevent(7)
-
-dbopen.3
- Michael Kerrisk
- SYNOPSIS: Add header file <fcntl.h>
- Upstreamed from Debian, and consistent with FreeBSD
- dbopen(3) man page.
-
-fmemopen.3
- Michael Kerrisk
- Note details of POSIX.1-2008 specification of 'b' in 'mode'
- Michael Kerrisk [Rich Felker]
- BUGS: fmemopen() doesn't correctly set file position in some cases
- If 'mode' is append, but 'size' does not cover a null byte
- in 'buf', then fmemopen() incorrectly sets the initial file
- position to -1, rather than the next byte after the end of
- the buffer.
-
- See http://sourceware.org/bugzilla/show_bug.cgi?id=13151
- Michael Kerrisk
- BUGS: fmemopen() incorrectly handles size==0 case
- If size is zero, fmemopen() fails, This is surprising behavior,
- and not specified in POSIX.1-2008.
-
- See http://sourceware.org/bugzilla/show_bug.cgi?id=11216
-
- Reported-by; Alex Shinn <alexshinn@gmail.com>
Michael Kerrisk
- BUGS: Note silent ABI change for fmemopen() in glibc 2.9
- Michael Kerrisk [Rich Felker]
- BUGS: Append mode does not force writes to append
- Append mode correctly sets the initial offset but does
- not force subsequent writes to append at end of stream.
-
- See http://sourceware.org/bugzilla/show_bug.cgi?id=13152
- Michael Kerrisk [Eric Blake]
- BUGS: Note inconsistent treatment of 'b' in 'mode'
- fopen() permits, for example, both "w+b" and "wb+",
- but only the latter is meaningful to fmemopen().
-
- See http://sourceware.org/bugzilla/show_bug.cgi?id=12836
-
-fopencookie.3
- Michael Kerrisk [Petr Baudis]
- Correct description of return for user-supplied 'write' function
- See http://sourceware.org/bugzilla/show_bug.cgi?id=2074
-
-getaddrinfo.3
- Jean-Michel Vourgère
- Note that AI_ADDRCONFIG is not affected by loopback addresses
- See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=660479
-
-iconv.3
+ Add version information for all (other) syscalls
Michael Kerrisk
- Upstream useful NOTE from Debian
- Warn the reader that the pointer arguments can't be
- interpreted as C style strings. Also, note possible
- alignment requirements for the referenced bytes sequences,
- Michael Kerrisk
- Write a better paragraph introducing iconv() and its arguments
-
-isgreater.3
- Michael Kerrisk [Vincent Lefevre]
- Clarify that the arguments to these macros must be real-floating
- See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609033
+ Add perfmonctl(2)
-lio_listio.3
- Michael Kerrisk
- Clarify that async notification occurs when *all* I/Os complete
+futimes.3
+ Michael Kerrisk [Jonathan Nieder]
+ ERRORS: Add ENOSYS for lutimes()
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=620746
-makedev.3
- Michael Kerrisk
- SYNOPSIS: Correct return types of major() and minor()
- See https://bugzilla.redhat.com/show_bug.cgi?id=754188
-
- Reported-by; Zdenek Kabelac <zkabelac@redhat.com>
-
-malloc.3
- Michael Kerrisk
- SEE ALSO: Add malloc_info(3)
-
-malloc_get_state.3
- Michael Kerrisk
- Fix wordos in function names in NAME line
-
-mallopt.3
- Michael Kerrisk
- Fix example program
- The example code was a version that was not consistent with
- the shell output shown on the page.
-
- Reported-bY: Simon Paillard <spaillard@debian.org>
- Michael Kerrisk
- Restore accidentally omitted line in shell session
- Michael Kerrisk
- SEE ALSO: Add malloc_stats(3)
-
-mmap64.3
- Michael Kerrisk
- Change target of link to mmap.2 (was mmap2.2)
- Upstreamed from Red Hat / Fedora
+getpass.3
+ Michael Kerrisk [Erik Saule]
+ Suggest use of the ECHO flag as an alternative
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=644261
realpath.3
- Michael Kerrisk [Casper.Dik@oracle.com]
- Remove note about Solaris possibly returning a relative path
-
-syslog.3
- Michael Kerrisk [Ralph Corderoy]
- Document behavior when 'ident' argument to openlog() is NULL
- See https://bugs.launchpad.net/ubuntu/+source/manpages/+bug/382096
- Michael Kerrisk
- Update CONFORMING TO for POSIX.1-2008
- POSIX.1-2008 doesn't change any details, but make
- that more explicit.
-
-undocumented.3
- Michael Kerrisk
- Remove some functions that have been documented
-
-sd.4
- Michael Kerrisk
- Remove reference to nonexistent scsi(4) page
- Upstreamed from RedHat / Fedora
-
-sk98lin.4
- Michael Kerrisk [Stephen Hemminger]
- Note that this driver was removed in 2.6.28
- See https://bugs.launchpad.net/ubuntu/+source/manpages/+bug/528020
-
-passwd.5
- Michael Kerrisk
- Upstream pieces from Red Hat/Fedora
- Note mention of empty password field.
- Add description of "*NP*" in password field.
- Michael Kerrisk
- Various minor fixes and improvements
-
-proc.5
- Michael Kerrisk
- Note that CAP_SYS_ADMIN processes can override file-max
- Upstreamed from red Hat / Fedora
- Michael Kerrisk
- Document /proc/[pid]/cgroup
- Upstreamed from Red Hat / Fedora
-
-resolv.conf.5
- Michael Kerrisk
- Take a Debian improvement into upstream
-
-tzfile.5
- Michael Kerrisk
- Mention timezone directories in DESCRIPTION
- Note that timezone files are usually in /usr/lib/zoneinfo
- or /usr/share/zoneinfo.
- Michael Kerrisk
- Drop SYNOPSIS
- The SYNOPSIS doesn't correspond to a user-visible file.
- Michael Kerrisk
- SEE ALSO: Add pointer to glibc source file timezone/tzfile.h
- Michael Kerrisk
- SEE ALSO: add tzset(3) and tzselect(8)
-
-ascii.7
- Bjarni Ingi Gislason
- Indent for "troff" makes table too wide
- Fix following from "groff -t -ww ...":
-
- warning: around line 53: table wider than line width
-
- Extra indent for "troff" makes the table look misplaced
- (default "ps" output).
-
-cp1251.7
- Bjarni Ingi Gislason
- table too wide
- From "nroff -ww -t ...":
-
- warning: around line 44: table wider than line width
-
- Columns are made narrower (column gutter decreased).
-
-ipv6.7
- Stefan Puiu
- Add ENODEV error for bind() to link-local IPv6 address
-
-signal.7
- Michael Kerrisk [Simone Piccardi]
- Clarify that SIGLOST is unused
- Michael Kerrisk
- Comment out crufty BUGS text on SIGLOST
- It must be a very long time since the statement there
- about SIGLOST was true. (The text seems to date back to
- 1996.)
- Michael Kerrisk
- Update architectures for tables of signal numbers
-
-utf-8.7
- Brian M. Carlson
- Two clarifications
- This patch clarifies that 0xc0 and 0xc1 are not valid in any UTF-8
- encoding[0], and it also references RFC 3629 instead of RFC 2279.
-
- [0] In order to have 0xc0, you'd have to have a two-byte encoding
- with all the data bits zero in the first byte (and thus only six
- bits of data), which would be an ASCII character encoded in the
- non-shortest form. Similarly with 0xc1.
-
- See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538641
-
-ldconfig.8
-nscd.8
Michael Kerrisk
- Remove path prefix from NAME line
- Command names shown in NAME are normally just the basename,
- not the full pathname of the command.
+ Document GNU extensions for EACCES and ENOENT errors
+
+stdarg.3
+ Michael Kerrisk [Friedrich Delgado Friedrichs]
+ Describe va_copy()
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=575077
+
+termios.3
+ Michael Kerrisk [Bernhard Kuemel]
+ Mention that noncanonical mode does not do input processing
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=643854
+
+random.4
+ Elie De Brauwer
+ Document write and document the ioctl interface of /dev/random
+ The update consists out of two parts:
+ - a minor thing which just documents what happens if a write to
+ /dev/(u)random is performed, which is used in the example
+ script but not explicitly mentioned.
+ - the other (biggest) part is the documentation of the ioctl()
+ interface which /dev/(u)random exposes. This ioctl() lives in
+ drivers/char/random.c and the primitives can be found in
+ include/linux/random.h
+
+ One comment remains, there used to be an RNDGETPOOL ioctl() which
+ disappeared in v2.6.9. I found two patches on the net:
+ - http://www.kernel.org/pub/linux/kernel/people/akpm/patches/2.6/2.6.8.1/2.6.8.1-mm4/broken-out/dev-random-remove-rndgetpool-ioctl.patch
+ - https://lkml.org/lkml/2004/3/25/168
+
+ But as far as I can tell the first one got applied but the 2nd
+ one seems more correct. The result is that even today one can
+ still find traces of the RNDGETPOOL ioctl() in the header files.
+ Is this there for historical reasons or because it might break
+ userspace, even though using it will just give an EINVAL.
+
+bootparam.7
+ Jose Luis Domingo Lopez
+ Document 'rootfstype' option
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=182014
+
+capabilities.7
+ Michael Kerrisk
+ Add various pieces under CAP_SYS_RAWIO
+ Info obtained by grepping the kernel source.
+ Michael Kerrisk
+ Add CAP_SYS_RESOURCE /proc/PID/oom_score_adj case
+
+netlink.7
+ Andrey Vagin
+ Add a note about broadcast messages to multiple groups
+
+socket.7
+ Michael Kerrisk [Florian Weimer]
+ Define _GNU_SOURCE to obtain the definition of 'struct ucred'
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=572210
dup.2
Michael Kerrisk
- SYNOPSIS: Add "#include <fntl.h>" for O_* constants
+ SYNOPSIS: Add "#include <fcntl.h>" for O_* constants
fallocate.2
Michael Kerrisk
pipe.2
Michael Kerrisk [Salvo Tomaselli]
- SYNOPSIS: Add "#include <fntl.h>" for O_* constants
+ SYNOPSIS: Add "#include <fcntl.h>" for O_* constants
See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659750
sched_rr_get_interval.2
tcp.7
lepton
Correct description for TCP_MAXSEG on modern kernel
+
+
+==================== Changes in man-pages-3.41 ====================
+
+Released: 2012-05-11, Christchurch
+
+
+Contributors
+------------
+
+The following people contributed patches/fixes or (noted in brackets
+in the changelog below) reports, notes, and ideas that have been
+incorporated in changes in this release:
+
+Akihiro MOTOKI <amotoki@gmail.com>
+Andries E. Brouwer <Andries.Brouwer@cwi.nl>
+Angelo Borsotti <angelo.borsotti@gmail.com >
+Bjarni Ingi Gislason <bjarniig@rhi.hi.is>
+Brian M. Carlson <sandals@crustytoothpaste.ath.cx>
+Casper.Dik@oracle.com
+David Prévot <taffit@debian.org>
+D. Barbier <bouzim@gmail.com>
+Eric Blake <eblake@redhat.com>
+Hugh Dickins <hughd@google.com>
+Ivana Varekova <varekova@redhat.com>
+Jakub Jelinek <jakub@redhat.com>
+Jan Kara <jack@suse.cz>
+Jason Baron <jbaron@redhat.com>
+Jean-Michel Vourgère <jmv_deb@nirgal.com>
+Jeff Moyer <jmoyer@redhat.com>
+Josh Triplett <josh@joshtriplett.org>
+Kasper Dupont <kasperd@gmail.com>
+KOSAKI Motohiro <kosaki.motohiro@jp.fujitsu.com>
+Lauri Kasanen <curaga@operamail.com>
+Mel Gorman <mgorman@suse.de>
+Michael Kerrisk <mtk.manpages@gmail.com>
+Mike Frysinger <vapier@gentoo.org>
+Nick Piggin <npiggin@gmail.com>
+Paul Pluzhnikov <ppluzhnikov@google.com>
+Petr Baudis <pasky@ucw.cz>
+Ralph Corderoy <ralph@inputplus.co.uk >
+Rich Felker <bugdal@aerifal.cx>
+Simone Piccardi <piccardi@truelite.it>
+Simon Paillard <spaillard@debian.org>
+Stefan Puiu <stefan.puiu@gmail.com>
+Stephen Hemminger <shemminger@vyatta.com>
+Vincent Lefevre <vincent@vinc17.net>
+Yuri Kozlov <yuray@komyakino.ru>
+
+Apologies if I missed anyone!
+
+
+New and rewritten pages
+-----------------------
+
+get_robust_list.2
+ Ivana Varekova [Michael Kerrisk]
+ New page documenting get_robust_list(2) and set_robust_list(2)
+
+mallinfo.3
+ Michael Kerrisk [KOSAKI Motohiro, Paul Pluzhnikov]
+ New page for mallinfo(3)
+
+malloc_info.3
+ Michael Kerrisk [Jakub Jelinek]
+ New page for malloc_info(3)
+
+malloc_stats.3
+ Michael Kerrisk [KOSAKI Motohiro]
+ New man page for malloc_stats(3)
+
+
+Newly documented interfaces in existing pages
+---------------------------------------------
+
+madvise.2
+ Jason Baron
+ Document MADV_DONTDUMP and MADV_DODUMP
+
+
+New and changed links
+---------------------
+
+set_robust_list.2
+ Michael Kerrisk
+ New link to new get_robust_list.2 page
+
+LIST_ENTRY.3
+LIST_HEAD.3
+LIST_INIT.3
+LIST_INSERT_AFTER.3
+LIST_INSERT_HEAD.3
+LIST_REMOVE.3
+TAILQ_ENTRY.3
+TAILQ_HEAD.3
+TAILQ_INIT.3
+TAILQ_INSERT_AFTER.3
+TAILQ_INSERT_HEAD.3
+TAILQ_INSERT_TAIL.3
+TAILQ_REMOVE.3
+CIRCLEQ_ENTRY.3
+CIRCLEQ_HEAD.3
+CIRCLEQ_INIT.3
+CIRCLEQ_INSERT_AFTER.3
+CIRCLEQ_INSERT_BEFORE.3
+CIRCLEQ_INSERT_HEAD.3
+CIRCLEQ_INSERT_TAIL.3
+CIRCLEQ_REMOVE.3
+ Michael Kerrisk
+ New link to queue.3
+ The queue(3) page documents these macros, so it makes sense to
+ have links for the names.
+
+DES_FAILED.3
+ Michael Kerrisk
+ New link to des_crypt.3
+ The des_crypt(3) page documents this macro, so it makes sense
+ to have a link for the name.
+
+qsort_r.3
+ Michael Kerrisk
+ New link to qsort.3
+ Overlooked to add this link in 3.38, when documentation of
+ qsort_r() was added to the qsort.3 page.
+
+
+Global changes
+--------------
+
+faccessat.2
+fchmodat.2
+fchownat.2
+fstatat.2
+futimesat.2
+inotify_init.2
+linkat.2
+mkdirat.2
+mknodat.2
+openat.2
+readlinkat.2
+renameat.2
+setns.2
+splice.2
+symlinkat.2
+sync.2
+tee.2
+unlinkat.2
+vmsplice.2
+ Michael Kerrisk [Lauri Kasanen]
+ Global fix: note glibc version that added library support
+
+confstr.3
+strcasecmp.3
+strcat.3
+strcmp.3
+strcpy.3
+strdup.3
+strftime.3
+strlen.3
+strnlen.3
+strpbrk.3
+strspn.3
+strtok.3
+strxfrm.3
+ Michael Kerrisk [Andries E. Brouwer]
+ Clarify that these functions operate on bytes, not (wide) characters
+ Change 'character(s)' to 'byte(s)' to make clear that these
+ functions operate on bytes, not wide / UTF8 characters.
+ (POSIX uses 'byte(s)' similarly, to make this point.)
+
+icmp.7
+ipv6.7
+packet.7
+raw.7
+rtnetlink.7
+unix.7
+x25.7
+ Michael Kerrisk
+ Remove names of constants from NAME line
+ Some of the sockets/network protocol pages included names of
+ the corresponding address family constants in the NAME line,
+ but this wasn't done consistently across all pages, and probably
+ it adds little value in those pages that did do this. So, remove
+ these constants from those pages that have them in the NAME
+ section.
+
+
+Changes to individual pages
+---------------------------
+
+clock_getres.2
+ Michael Kerrisk [Josh Triplett]
+ Expand description of CLOCK_REALTIME
+ Make it clear that this clock may be discontinuous, and is
+ affected my incremental NTP and clock-adjtime(2) adjustments.
+
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=540872
+
+epoll_wait.2
+ Michael Kerrisk
+ Clarify that 'timeout' is a *minimum* interval
+ Make it clear that 'timeout' is a minimum interval; the actual
+ interval will be rounded up to the system clock granularity,
+ and may overrun because of kernel scheduling delays.
+
+execve.2
+ Michael Kerrisk
+ Rewording to deemphasize libc5 details
+
+fork.2
+ Mike Frysinger
+ ERRORS: add ENOSYS
+ Can occur on, for example, non-MMU hardware.
+
+getcpu.2
+ Mike Frysinger
+ Add RETURN VALUE and ERRORS sections
+ Michael Kerrisk
+ Refer reader to NOTES for more info about 'tcache'
+ Michael Kerrisk
+ DESCRIPTION: reword a sentence to be clearer
+
+io_cancel.2
+io_destroy.2
+io_getevents.2
+io_setup.2
+io_submit.2
+ Michael Kerrisk
+ Rewrite to focus on system call API
+ Rewrite to focus on the system call interface, adding
+ some notes on the libaio wrapper differences.
+ See the following mail:
+ 2012-05-07 "aio manuals", linux-man@vger.kernel.org
+ http://thread.gmane.org/gmane.linux.man/1935/focus=2910
+
+ Other minor rewrites.
+
+mount.2
+ Michael Kerrisk
+ Comment out an old Linux libc detail
+
+open.2
+ Nick Piggin [KOSAKI Motohiro, Jan Kara, Hugh Dickins]
+ Describe race of direct I/O and fork()
+ Rework 04cd7f64, which didn't capture the details correctly.
+ See the April/May 2012 linux-man@ mail thread "[PATCH]
+ Describe race of direct read and fork for unaligned buffers"
+ http://thread.gmane.org/gmane.linux.kernel.mm/77571
+
+poll.2
+ Michael Kerrisk
+ Clarify that 'timeout' is a *minimum* interval
+ Make it clear that 'timeout' is a minimum interval; the actual
+ interval will be rounded up to the system clock granularity,
+ and may overrun because of kernel scheduling delays.
+ Michael Kerrisk
+ Clarify discussion of wrapper function emulation
+ Clarify that glibc (as well as old libc) provides emulation
+ using select(2) on older kernels that don't have a poll()
+ system call.
+ Michael Kerrisk
+ Make the meaning of a zero timeout explicit
+ Clarify that timeout==0 causes an immediate return, even if
+ no file descriptors are ready.
+
+pread.2
+ Michael Kerrisk [Kasper Dupont]
+ BUGS: Note O_APPEND + pwrite() does the wrong thing
+ See https://bugzilla.kernel.org/show_bug.cgi?id=43178
+
+recvmmsg.2
+ Michael Kerrisk
+ Clarify that 'timeout' is a *minimum* interval
+ Make it clear that 'timeout' interval will be rounded up to the
+ system clock granularity, and may overrun because of kernel
+ scheduling delays.
+
+select.2
+ Michael Kerrisk
+ Clarify that 'timeout' is a *minimum* interval
+ Make it clear that 'timeout' is a minimum interval; the actual
+ interval will be rounded up to the system clock granularity,
+ and may overrun because of kernel scheduling delays.
+ Michael Kerrisk
+ Expand description of the self-pipe trick
+ Michael Kerrisk
+ Add further details on pselect6() system call that underlies pselect()
+
+semop.2
+ Michael Kerrisk
+ Clarify that 'timeout' of semtimedop() is a *minimum* interval
+ Make it clear that 'timeout' interval will be rounded up to the
+ system clock granularity, and may overrun because of kernel
+ scheduling delays.
+
+signal.2
+ Michael Kerrisk
+ Note that 'sig_t' requires _BSD_SOURCE
+ Also remove some old Linux libc details
+
+sigwaitinfo.2
+ Michael Kerrisk
+ Clarify that 'timeout' of sigtimedwait() is a *minimum* interval
+ Make it clear that 'timeout' is a minimum interval; the actual
+ interval will be rounded up to the system clock granularity,
+ and may overrun because of kernel scheduling delays.
+
+stat.2
+ Bjarni Ingi Gislason
+ Formatting fixes
+ From "groff -ww" (or "man --warnings=w ..."):
+
+ warning: around line 442: table wider than line width
+
+ GNU man uses line length of 78.
+
+ Use text blocks. Two spaces between sentences or better: start
+ each sentence in a new line.
+
+syscalls.2
+ Bjarni Ingi Gislason
+ Formatting fixes
+ From "groff -ww ..." (or "man --warnings=w ..."):
+
+ warning: around line 157: table wider than line width
+
+ Have to use text blocks. Move some text to its correct column.
+ Split text to two columns to avoid hyphenation.
+
+sysinfo.2
+ Michael Kerrisk
+ Remove reference to obsolete libc5
+
+syslog.2
+ Michael Kerrisk
+ Remove some details about obsolete Linux libc
+
+aio_cancel.3
+aio_error.3
+aio_fsync.3
+aio_read.3
+aio_return.3
+aio_suspend.3
+aio_write.3
+ Michael Kerrisk
+ ERRORS: Add/update ENOSYS error
+
+aio_cancel.3
+ Michael Kerrisk
+ Clarify what happens when a request isn't successfully canceled
+ Michael Kerrisk
+ Add pointers to aio(7) and sigevent(7)
+
+dbopen.3
+ Michael Kerrisk
+ SYNOPSIS: Add header file <fcntl.h>
+ Upstreamed from Debian, and consistent with FreeBSD
+ dbopen(3) man page.
+
+fmemopen.3
+ Michael Kerrisk
+ Note details of POSIX.1-2008 specification of 'b' in 'mode'
+ Michael Kerrisk [Rich Felker]
+ BUGS: fmemopen() doesn't correctly set file position in some cases
+ If 'mode' is append, but 'size' does not cover a null byte
+ in 'buf', then fmemopen() incorrectly sets the initial file
+ position to -1, rather than the next byte after the end of
+ the buffer.
+
+ See http://sourceware.org/bugzilla/show_bug.cgi?id=13151
+ Michael Kerrisk
+ BUGS: fmemopen() incorrectly handles size==0 case
+ If size is zero, fmemopen() fails, This is surprising behavior,
+ and not specified in POSIX.1-2008.
+
+ See http://sourceware.org/bugzilla/show_bug.cgi?id=11216
+
+ Reported-by; Alex Shinn <alexshinn@gmail.com>
+ Michael Kerrisk
+ BUGS: Note silent ABI change for fmemopen() in glibc 2.9
+ Michael Kerrisk [Rich Felker]
+ BUGS: Append mode does not force writes to append
+ Append mode correctly sets the initial offset but does
+ not force subsequent writes to append at end of stream.
+
+ See http://sourceware.org/bugzilla/show_bug.cgi?id=13152
+ Michael Kerrisk [Eric Blake]
+ BUGS: Note inconsistent treatment of 'b' in 'mode'
+ fopen() permits, for example, both "w+b" and "wb+",
+ but only the latter is meaningful to fmemopen().
+
+ See http://sourceware.org/bugzilla/show_bug.cgi?id=12836
+
+fopencookie.3
+ Michael Kerrisk [Petr Baudis]
+ Correct description of return for user-supplied 'write' function
+ See http://sourceware.org/bugzilla/show_bug.cgi?id=2074
+
+getaddrinfo.3
+ Jean-Michel Vourgère
+ Note that AI_ADDRCONFIG is not affected by loopback addresses
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=660479
+
+iconv.3
+ Michael Kerrisk
+ Upstream useful NOTE from Debian
+ Warn the reader that the pointer arguments can't be
+ interpreted as C style strings. Also, note possible
+ alignment requirements for the referenced bytes sequences,
+ Michael Kerrisk
+ Write a better paragraph introducing iconv() and its arguments
+
+isgreater.3
+ Michael Kerrisk [Vincent Lefevre]
+ Clarify that the arguments to these macros must be real-floating
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609033
+
+lio_listio.3
+ Michael Kerrisk
+ Clarify that async notification occurs when *all* I/Os complete
+
+makedev.3
+ Michael Kerrisk
+ SYNOPSIS: Correct return types of major() and minor()
+ See https://bugzilla.redhat.com/show_bug.cgi?id=754188
+
+ Reported-by; Zdenek Kabelac <zkabelac@redhat.com>
+
+malloc.3
+ Michael Kerrisk
+ SEE ALSO: Add malloc_info(3)
+
+malloc_get_state.3
+ Michael Kerrisk
+ Fix wordos in function names in NAME line
+
+mallopt.3
+ Michael Kerrisk
+ Fix example program
+ The example code was a version that was not consistent with
+ the shell output shown on the page.
+
+ Reported-bY: Simon Paillard <spaillard@debian.org>
+ Michael Kerrisk
+ Restore accidentally omitted line in shell session
+ Michael Kerrisk
+ SEE ALSO: Add malloc_stats(3)
+
+mmap64.3
+ Michael Kerrisk
+ Change target of link to mmap.2 (was mmap2.2)
+ Upstreamed from Red Hat / Fedora
+
+realpath.3
+ Michael Kerrisk [Casper.Dik@oracle.com]
+ Remove note about Solaris possibly returning a relative path
+
+syslog.3
+ Michael Kerrisk [Ralph Corderoy]
+ Document behavior when 'ident' argument to openlog() is NULL
+ See https://bugs.launchpad.net/ubuntu/+source/manpages/+bug/382096
+ Michael Kerrisk
+ Update CONFORMING TO for POSIX.1-2008
+ POSIX.1-2008 doesn't change any details, but make
+ that more explicit.
+
+undocumented.3
+ Michael Kerrisk
+ Remove some functions that have been documented
+
+sd.4
+ Michael Kerrisk
+ Remove reference to nonexistent scsi(4) page
+ Upstreamed from RedHat / Fedora
+
+sk98lin.4
+ Michael Kerrisk [Stephen Hemminger]
+ Note that this driver was removed in 2.6.28
+ See https://bugs.launchpad.net/ubuntu/+source/manpages/+bug/528020
+
+passwd.5
+ Michael Kerrisk
+ Upstream pieces from Red Hat/Fedora
+ Note mention of empty password field.
+ Add description of "*NP*" in password field.
+ Michael Kerrisk
+ Various minor fixes and improvements
+
+proc.5
+ Michael Kerrisk
+ Note that CAP_SYS_ADMIN processes can override file-max
+ Upstreamed from red Hat / Fedora
+ Michael Kerrisk
+ Document /proc/[pid]/cgroup
+ Upstreamed from Red Hat / Fedora
+
+resolv.conf.5
+ Michael Kerrisk
+ Take a Debian improvement into upstream
+
+tzfile.5
+ Michael Kerrisk
+ Mention timezone directories in DESCRIPTION
+ Note that timezone files are usually in /usr/lib/zoneinfo
+ or /usr/share/zoneinfo.
+ Michael Kerrisk
+ Drop SYNOPSIS
+ The SYNOPSIS doesn't correspond to a user-visible file.
+ Michael Kerrisk
+ SEE ALSO: Add pointer to glibc source file timezone/tzfile.h
+ Michael Kerrisk
+ SEE ALSO: add tzset(3) and tzselect(8)
+
+ascii.7
+ Bjarni Ingi Gislason
+ Indent for "troff" makes table too wide
+ Fix following from "groff -t -ww ...":
+
+ warning: around line 53: table wider than line width
+
+ Extra indent for "troff" makes the table look misplaced
+ (default "ps" output).
+
+cp1251.7
+ Bjarni Ingi Gislason
+ table too wide
+ From "nroff -ww -t ...":
+
+ warning: around line 44: table wider than line width
+
+ Columns are made narrower (column gutter decreased).
+
+ipv6.7
+ Stefan Puiu
+ Add ENODEV error for bind() to link-local IPv6 address
+
+signal.7
+ Michael Kerrisk [Simone Piccardi]
+ Clarify that SIGLOST is unused
+ Michael Kerrisk
+ Comment out crufty BUGS text on SIGLOST
+ It must be a very long time since the statement there
+ about SIGLOST was true. (The text seems to date back to
+ 1996.)
+ Michael Kerrisk
+ Update architectures for tables of signal numbers
+
+utf-8.7
+ Brian M. Carlson
+ Two clarifications
+ This patch clarifies that 0xc0 and 0xc1 are not valid in any UTF-8
+ encoding[0], and it also references RFC 3629 instead of RFC 2279.
+
+ [0] In order to have 0xc0, you'd have to have a two-byte encoding
+ with all the data bits zero in the first byte (and thus only six
+ bits of data), which would be an ASCII character encoded in the
+ non-shortest form. Similarly with 0xc1.
+
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538641
+
+ldconfig.8
+nscd.8
+ Michael Kerrisk
+ Remove path prefix from NAME line
+ Command names shown in NAME are normally just the basename,
+ not the full pathname of the command.
+
+
+==================== Changes in man-pages-3.42 ====================
+
+Released: 2012-08-14, Konolfingen
+
+
+Contributors
+------------
+
+The following people contributed patches/fixes or (noted in brackets
+in the changelog below) reports, notes, and ideas that have been
+incorporated in changes in this release:
+
+Aaron Peschel <aaron.peschel@gmail.com>
+Adrian Dabrowski <atrox@seclab.tuwien.ac.at>
+Akihiro MOTOKI <amotoki@gmail.com>
+Alan Curry <pacman@kosh.dhis.org>
+Bjarni Ingi Gislason <bjarniig@rhi.hi.is>
+Christoph Lameter <cl@linux.com>
+Colin McCabe <cmccabe@alumni.cmu.edu>
+Daniel Zingaro <daniel.zingaro@utoronto.ca>
+David Prévot <taffit@debian.org>
+Denys Vlasenko <vda.linux@gmail.com>
+Henry Hu <henry.hu.sh@gmail.com>
+Herbert Xu <herbert@gondor.apana.org.au>
+Jan Engelhardt <jengelh@medozas.de>
+Jim Hill <gjthill@gmail.com>
+JoonSoo Kim <js1304@gmail.com>
+Kalle Olavi Niemitalo <kon@iki.fi>
+Martin H <textshell-tSIEzQ@neutronstar.dyndns.org>
+Michael Kerrisk <mtk.manpages@gmail.com>
+Michael S. Tsirkin <mst@redhat.com>
+Rasmus Villemoes <Rasmus.Villemoes@decode.is>
+Sami Kerola <kerolasa@iki.fi>
+Sam Varshavchik <mrsam@courier-mta.com>
+Shawn Landden <shawnlandden@gmail.com>
+Simon Paillard <spaillard@debian.org>
+Tolga Dalman <tolga.dalman@googlemail.com>
+Ulrich Drepper <drepper@gmail.com>
+Марк Коренберг <socketpair@gmail.com>
+
+Apologies if I missed anyone!
+
+
+Global changes
+--------------
+
+Various pages
+ Sami Kerola
+ Global fix: use UR macro where applicable
+ The syntax .UR http://example.com paired with .UE will create
+ links which one can interact, if the pager allows that. One
+ way to see the effect is ask the man(1) command to use browser
+ display, e.g.:
+
+ man -H man7/uri.7
+
+ ("\:" is optional groff syntax to permit hyphenless line breaks.)
+
+
+Changes to individual pages
+---------------------------
+
+ldd.1
+ Michael Kerrisk
+ Add security note on untrusted executables
+ See also http://www.catonmat.net/blog/ldd-arbitrary-code-execution/
+ and
+ http://tldp.org/HOWTO/Program-Library-HOWTO/shared-libraries.html
+
+clone.2
+ Michael Kerrisk
+ Rewrite discussion of sys_clone
+
+futex.2
+ Марк Коренберг
+ Consolidate error descriptions to ERRORS
+ Michael Kerrisk
+ Various wording fix-ups
+ Michael Kerrisk
+ Fix description of EINVAL error
+ The current text seems incorrect. Replace with a more general
+ description.
+
+getdents.2
+select_tut.2
+atof.3
+atoi.3
+pthread_create.3
+pthread_sigmask.3
+rtime.3
+setbuf.3
+tsearch.3
+netlink.7
+ Michael Kerrisk [Jan Engelhardt]
+ Remove unneeded casts
+
+get_robust_list.2
+get_thread_area.2
+getcpu.2
+getdents.2
+gettid.2
+io_cancel.2
+io_destroy.2
+io_getevents.2
+io_setup.2
+io_submit.2
+ioprio_set.2
+kexec_load.2
+llseek.2
+modify_ldt.2
+mq_getsetattr.2
+pivot_root.2
+readdir.2
+rt_sigqueueinfo.2
+set_thread_area.2
+sgetmask.2
+spu_create.2
+spu_run.2
+subpage_prot.2
+sysctl.2
+tkill.2
+ Michael Kerrisk
+ Add note to SYNOPSIS that there is no glibc wrapper for system call
+ Reduce the chance that the reader may be misled into thinking
+ that there is a wrapper function for this system call by noting
+ explicitly in the SYNOPSIS that there is no glibc wrapper and
+ pointing the reader to NOTES for further details.
+
+ioprio_set.2
+ Colin McCabe
+ Clarify the multithreaded behavior of ioprio_set(2)
+ Michael Kerrisk [Марк Коренберг, Kalle Olavi Niemitalo]
+ Document who==0 for IOPRIO_WHO_PROCESS and IOPRIO_WHO_PGRP
+ For IOPRIO_WHO_PROCESS, who==0 means operate on the caller.
+ For IOPRIO_WHO_PGRP, who==0 means operate on the caller's
+ process group.
+
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652443
+
+migrate_pages.2
+ Michael Kerrisk [Christoph Lameter, JoonSoo Kim]
+ Fix description of return value
+
+mount.2
+ Michael Kerrisk
+ For MS_REMOUNT, source is ignored
+
+mprotect.2
+ Michael Kerrisk [Rasmus Villemoes]
+ 'addr' argument is not const
+ As reported by Rasmus:
+
+ Both my system's man-pages (3.22) and the latest online
+ (3.41) show:
+
+ int mprotect(const void *addr, size_t len, int prot);
+
+ as the prototype for mprotect(2). However, POSIX [1] and the
+ actual sys/mman.h (on all the systems I checked) do not have
+ the const qualifier on the first argument.
+
+msgctl.2
+semctl.2
+shmctl.2
+svipc.7
+ Michael Kerrisk
+ Don't mention that ipc_perm is defined in <sys/ipc.h>
+ There's no need to mention that the 'ipc_perm' structure
+ is defined in <sys/ipc.h>. That's an implementation detail,
+ and furthermore <sys/ipc.h> is itself included by the other
+ System V IPC header files. The current text might lead the
+ reader to conclude that they must include <sys/ipc.h>, which
+ is not the case (it is required neither on Linux, nor by the
+ standards).
+
+msgctl.2
+msgget.2
+msgop.2
+semctl.2
+semget.2
+semop.2
+shmctl.2
+shmget.2
+ Michael Kerrisk
+ NOTES: <sys/types.h> and <sys/ipc.h> aren't strictly needed
+ Add text to NOTES to say that the <sys/types.h> and <sys/ipc.h>
+ header files aren't required by Linux or the standards, but may
+ be needed for portability to old systems.
+
+ptrace.2
+ Denys Vlasenko
+ Explain WNOHANG behavior and EINTR bug
+ I didn't like the "SIGKILL operates similarly, with exceptions"
+ phrase (if it's different, then it's not "similar", right?),
+ and now I got around to changing it. Now it says simply:
+ "SIGKILL does not generate signal-delivery-stop and therefore
+ the tracer can't suppress it."
+
+ Replaced "why WNOHANG is not reliable" example with a more
+ realistic one (the one which actually inspired to add this
+ information to man page in the first place): we got
+ ESRCH - process is gone! - but waitpid(WNOHANG) can still
+ confusingly return 0 "no processes to wait for".
+
+ Replaced "This means that unneeded trailing arguments may
+ be omitted" part with a much better recommendation
+ to never do that and to supply zero arguments instead.
+ (The part about "undocumentedness" of gcc behavior was bogus,
+ btw - deleted).
+
+ Expanded BUGS section with the explanation and an example
+ of visible strace behavior on the buggy syscalls which
+ exit with EINTR on ptrace attach. I hope this will lead
+ to people submitting better bug reports to lkml about
+ such syscalls.
+
+seteuid.2
+ Michael Kerrisk
+ Note glibc version where setegid() implementation changed
+ In glibc 2.2/2.3, setegid() switched from setregid() to setresgid().
+
+set_tid_address.2
+ Michael Kerrisk
+ Rename 'ctid' argument for consistency with clone(2) page
+ Michael Kerrisk
+ Some rewordings and minor clarifications
+
+sigwaitinfo.2
+ Michael Kerrisk [Daniel Zingaro]
+ Some wording clarifications
+ Mainly rewording things like "is delivered" to "becomes pending",
+ which is more accurate terminology.
+
+syscall.2
+ Michael Kerrisk
+ Add some more details to the description of syscall(2)
+ And add another example of using syscall() to the program example.
+
+syscalls.2
+ Michael Kerrisk
+ Add kcmp(2)
+ Michael Kerrisk
+ Move discussion of set_zone_reclaim(2) out of main table
+ This system call was never visible to user space, so it makes
+ sense to move it out of the main table of system calls into
+ the notes below the table.
+
+getifaddrs.3
+ Michael Kerrisk [Adrian Dabrowski]
+ Note that ifa_addr and ifa_netmask can be NULL
+
+readdir.3
+ Michael Kerrisk [Jan Engelhardt]
+ Handle -1 error from pathconf() in example code snippet
+ Improve the example demonstrating allocation of a buffer
+ for readdir_r() to handle -1 error return from pathconf().
+ Otherwise, naive readers may think that pathconf() return
+ value can be used without checking.
+
+realpath.3
+ Shawn Landden
+ Use past tense with ancient history (libc4, libc5)
+
+regex.3
+ Michael Kerrisk
+ Correct SEE ALSO reference to glibc manual "regex" section
+
+rtime.3
+ Michael Kerrisk [Jan Engelhardt]
+ Fix broken pointer cast in example code
+
+sem_close.3
+sem_destroy.3
+sem_getvalue.3
+sem_init.3
+sem_open.3
+sem_post.3
+sem_unlink.3
+sem_wait.3
+sem_overview.7
+ Michael Kerrisk
+ Note that "cc -pthread" is required; "-lrt" no longer works
+ See https://bugs.launchpad.net/ubuntu/+source/manpages/+bug/874418
+
+sigwait.3
+ Michael Kerrisk
+ Reword "is delivered" to "becomes pending"
+
+strcat.3
+ Michael Kerrisk
+ Add some text to emphasize the dangers of buffer overruns
+ Michael Kerrisk
+ NOTES: Add discussion of strlcat()
+
+strcpy.3
+ Michael Kerrisk
+ Note that info is lost when strncpy() doesn't null terminate
+ Michael Kerrisk
+ Add some text to emphasize possibility of buffer runs with strcpy()
+ Michael Kerrisk
+ NOTES: Add a discussion of strlcpy()
+ Inspired by https://lwn.net/Articles/506530/
+ Michael Kerrisk
+ Fix description of the null-byte padding performed by strncpy()
+
+tsearch.3
+ Michael Kerrisk
+ NOTES: remove redundant discussion of unorthodox use of term "postorder"
+ This point is already covered at greater length in the main
+ text of the page (See the piece "More commonly, ...").
+ Michael Kerrisk
+ Clarify use for first argument to the twalk() 'action' function
+ There's a number of details in POSIX that are omitted in
+ the current version of this page.
+ Michael Kerrisk
+ Some wording fixes
+
+core.5
+ Michael Kerrisk
+ Note effect of madvise(2) MADV_DONTDUMP flag
+
+capabilities.7
+ Michael Kerrisk
+ Document CAP_BLOCK_SUSPEND
+
+glob.7
+ Bjarni Ingi Gislason
+ Change 8 bit characters to 7 bit representation
+ Fixes rendering errors for accented 'a' characters.
+ Michael Kerrisk [Aaron Peschel]
+ Update bash(1) command used to obtain classical globbing behavior
+ The man page formerly noted the bash(1) v1 command to do this.
+
+iso_8859-1.7
+ Bjarni Ingi Gislason
+ Explanation of SOFT HYPHEN and the code for it
+ <groff: iso_8859-2.7>:89: warning: can't find special character `shc'
+
+ This is the only "iso_8859-*.7" file that has this (now)
+ undefined character. The code in column four in "iso_8859-1.7" is
+ "0x2D" ("HYPHEN, MINUS SIGN" or "HYPHEN-MINUS") instead of "0xAD".
+ See Debian bug 156154 (or package "manpages").
+
+ There should be an explanation for this graphic character and the
+ code should be 0xAD in iso_8859-1.7 (as in all others), even
+ though "[gn]roff" does not display a "HYPHEN" in that position of
+ the table.
+
+ The line with "SOFT HYPHEN" gets a footnote and a short
+ explanation.
+
+mdoc.7
+ Bjarni Ingi Gislason
+ Fixing a warning and a table
+ Fis warning from "groff -ww ..." (or "man --warnings=w ..."):
+
+ <groff: mdoc.7>:294: warning:
+ tab character in unquoted macro argument
+
+ In one table the distance between columns is too small in the
+ "ps" output. (Bug in the groff "doc.tmac" macro?)
+
+mdoc.samples.7
+ Bjarni Ingi Gislason
+ Fix warnings from [ng]roff, corrections
+ From "man -ww ..." (groff -ww ...):
+
+ <standard input>:541: warning:
+ tab character in unquoted macro argument
+ [+3 similar warnings]
+ <standard input>:813: warning: macro `Pu' not defined
+ Usage: .Rv -std in sections 2 and 3 only (#1669)
+ mdoc warning: A .Bl directive has no matching .El (#1821)
+
+ String "Pu" defined as a row of punctuation characters.
+ ".Bl" and ".El" fixed.
+ Some arguments, that start with a period or are the name of a
+ macro, protected with "\&".
+ Variable name for macro ".Rv" corrected.
+
+netdevice.7
+ Bjarni Ingi Gislason
+ Line in table too long
+ Fix warning from "man ..." ("nroff -ww ..."):
+
+ nroff: netdevice.7: warning: around line 98:
+ table wider than line width
+
+ Fix: No right adjustment in text blocks in tables.
+
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=673873
+
+netlink.7
+ Bjarni Ingi Gislason
+ Line in table is too long
+ Fix warning from "man ..." ("nroff -ww ..."):
+
+ nroff: netlink.7: warning: around line 195:
+ table wider than line width
+
+ Horizontal line incorporated into table.
+ No right adjustment of text blocks in tables.
+
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=673875
+ Simon Paillard [Herbert Xu]
+ Change description of "*_pid" fields to "Port ID"
+ As reported by Herbert Xu, these should not be considered as PIDs.
+
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=383296
+
+rtnetlink.7
+ Bjarni Ingi Gislason
+ Line in table too long
+ Fix warning from "man ..." ("nroff -ww ..."):
+
+ nroff: rtnetlink.7: warning: around line 415:
+ table wider than line width
+
+ Column gutter reduced to fit line length.
+ Right adjustment in text blocks removed in tables.
+ Some header made centered in tables.
+ One table put on same page.
+
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=674051
+
+socket.7
+ Martin H
+ Document SO_MARK socket option
+ Commit 4a19ec5800fc3bb64e2d87c4d9fdd9e636086fe0 in Jan 2008 added
+ the new SO_MARK socket option.
+
+ This patch is based on text from the commit message.
+
+ See https://bugzilla.kernel.org/show_bug.cgi?id=16461.
+
+svipc.7
+ Michael Kerrisk
+ SYNOPSIS: Remove include of <sys/types.h> and <sys/ipc.h>
+ Including <sys/types.h> and <sys/ipc.h> isn't needed on Linux
+ and isn't really relevant for the explanation on this page.
+
+
+==================== Changes in man-pages-3.43 ====================
+
+Released: 2012-10-05, Munich
+
+
+Contributors
+------------
+
+The following people contributed patches/fixes or (noted in brackets
+in the changelog below) reports, notes, and ideas that have been
+incorporated in changes in this release:
+
+Adrian Bunk <bunk@kernel.org>
+Anatoli Klassen <anatoli@aksoft.net>
+Andreas Schwab <schwab@linux-m68k.org>
+Bjarni Ingi Gislason <bjarniig@rhi.hi.is>
+David Prévot <taffit@debian.org>
+Eric Dumazet <edumazet@google.com>
+Florian Weimer <fweimer@redhat.com>
+Frédéric Brière <fbriere@fbriere.net>
+Fredrik Arnerup <arnerup@kth.se>
+Guillem Jover <guillem@hadrons.org>
+Jan Engelhardt <jengelh@inai.de>
+Michael Kerrisk <mtk.manpages@gmail.com>
+Simon Josefsson <simon@josefsson.org>
+Stephane Fillod <fillods@users.sf.net>
+Trevor Woerner <twoerner@gmail.com>
+Yuri Kozlov <yuray@komyakino.ru>
+
+Apologies if I missed anyone!
+
+
+Newly documented interfaces in existing pages
+---------------------------------------------
+
+getenv.3
+ Michael Kerrisk [Florian Weimer, Andreas Schwab]
+ Document secure_getenv(3)
+
+
+New and changed links
+---------------------
+
+phys.2
+ Michael Kerrisk
+ New link to unimplemented.2
+
+secure_getenv.3
+ Michael Kerrisk
+ New link to getenv.3
+
+
+Global changes
+--------------
+
+Various pages
+ Michael Kerrisk
+ Global fix: s/-/\\-/ when real hyphen is required (e.g., in code)
+
+Various pages
+ David Prévot [Michael Kerrisk]
+ Global fix: Various consistency fixes for SEE ALSO
+
+Various pages
+ Michael Kerrisk
+ Global fix: use "Linux kernel source" consistently
+ Rather than "kernel source".
+
+Various pages
+ Michael Kerrisk
+ Global fix: disable justification and hyphenation in SEE ALSO
+ For a better visual result, disable justification and hyphenation
+ in SEE ALSO where page names are long.
+
+syscalls.2
+uname.2
+boot.7
+ Michael Kerrisk
+ Global fix: s/OS/operating system/
+
+
+Changes to individual pages
+---------------------------
+
+epoll_wait.2
+ Michael Kerrisk [Fredrik Arnerup]
+ Describe timeout limitation in kernels < 2.6.37
+ As reported by Fredrik (and as far as I can tell the problem
+ went back to 2.6.0):
+
+ The timeout argument has an upper limit. Any values above that
+ limit are treated the same as -1, i.e. to wait indefinitely.
+ The limit is given by:
+
+ #define EP_MAX_MSTIMEO min(1000ULL * MAX_SCHEDULE_TIMEOUT / HZ, \
+ (LONG_MAX - 999ULL) / HZ)
+
+ That is, the limit depends on the size of a long and the timer
+ frequency. Assuming the a long is never smaller than 32 bits
+ and HZ never larger than 1000, the worst case is 35 minutes.
+ I think this should be mentioned under "BUGS".
+
+ Although this is likely to be fixed in the future
+ (http://lkml.org/lkml/2010/8/8/144), the problem exists in
+ at least 2.6.14 - 2.6.35. I don't know if select(2) and poll(2)
+ are affected.
+
+ https://bugzilla.kernel.org/show_bug.cgi?id=20762
+ Michael Kerrisk
+ Add pointer to select(2) for discussion of close in another thread
+
+getitimer.2
+ Michael Kerrisk [Trevor Woerner]
+ Note Linux's odd handling of the new_value==NULL case
+ Michael Kerrisk [Trevor Woerner]
+ Fix types used to declare fields in timeval struct
+
+keyctl.2
+ David Prévot
+ Reorder SEE ALSO, without .br
+
+poll.2
+ Michael Kerrisk
+ Add pointer to select(2) for discussion of close in another thread
+
+select.2
+ Michael Kerrisk [Stephane Fillod]
+ Note behavior if monitored file descriptor is closed in another thread
+ Executive summary: a sane application can't rely on any
+ particular behavior if another thread closes a file descriptor
+ being monitored by select().
+
+ See https://bugzilla.kernel.org/show_bug.cgi?id=40852
+ Michael Kerrisk
+ Clarify equivalent pselect() code in terms of threads
+ s/sigprogmask/pthread_sigmask/
+
+semop.2
+ Michael Kerrisk
+ Recast discussion of blocking behavior in terms of threads
+ semop() blocks the calling thread, not the process.
+ Michael Kerrisk
+ SEE ALSO: Add clone(2)
+ Give reader a clue about CLONE_SYSVSEM.
+
+shutdown.2
+ Michael Kerrisk [Eric Dumazet]
+ Document EINVAL error (and associated bug)
+ Eric Dumazet noted that EINVAL was not documented. Some further
+ digging shows that it's also not diagnosed consistently.
+ See https://bugzilla.kernel.org/show_bug.cgi?id=47111.
+
+sigaction.2
+ Michael Kerrisk
+ Tweak SA_RESETHAND description
+
+timer_settime.2
+ Michael Kerrisk
+ Small rewording around discussion of pointer arguments
+
+wait4.2
+ Adrian Bunk
+ Note that these functions are nonstandard and recommend alternatives
+ Some edits to Adrian's patch by mtk.
+ Michael Kerrisk
+ CONFORMING TO: Note SUS details for wait3()
+
+gnu_get_libc_version.3
+ Michael Kerrisk
+ Remove unneeded "#define _GNU_SOURCE" from SYNOPSIS
+
+pthread_kill.3
+pthread_sigqueue.3
+ Michael Kerrisk
+ Remove wording "another"
+ Writing "another thread" in these pages implies that these
+ functions can't be used to send a signal to the calling thread
+ itself, which is of course untrue.
+
+sigvec.3
+ Michael Kerrisk
+ Add "int" arg to sv_handler definition in sigvec structure
+ Michael Kerrisk
+ Fix small error in discussion of blocking of signals
+ The signal that causes the handler to be invoked is blocked,
+ but saying "by default" implies that this can be changed via
+ the API. It cannot. (One needs sigaction(2) for that.)
+
+syslog.3
+ Simon Josefsson
+ Remove (apparently bogus) text claiming LOG_AUTH is deprecated
+ LOG_AUTH is in POSIX, and widely available. There
+ seems to be no basis to the claim it is deprecated.
+
+ Quoting Simon:
+ I cannot find any other source that claim LOG_AUTH is
+ deprecated in any way. LOG_AUTH is distinct from
+ LOG_AUTHPRIV. The GNU C Library manual only documents
+ LOG_AUTH. The header files contains both without any
+ comment. Common systems like Debian appear to refer to
+ both auth and authpriv facilities in syslog configurations.
+ Popular daemons appear to use both facilities.
+ Both facilities are discussed in several RFCs.
+
+ See https://bugzilla.kernel.org/show_bug.cgi?id=46091
+
+ttyname.3
+ Michael Kerrisk
+ SEE ALSO: Add ctermid(3)
+
+proc.5
+ Michael Kerrisk
+ Clarify header file related to 'flags' field of /proc/PID/stat
+ Michael Kerrisk [Frédéric Brière]
+ Update description of 'starttime' field of /proc/PID/stat
+ The unit of measurement changed from jiffies to clock ticks in
+ Linux 2.6.
+
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=675891
+ Michael Kerrisk
+ Document /proc/sys/kernel/kptr_restrict
+ Michael Kerrisk [Kees Cook]
+ Document /proc/sys/fs/protected_symlinks
+ Based on text in Documentation/sysctl/fs.txt by Kees Cook
+ Michael Kerrisk [Kees Cook]
+ Document /proc/sys/fs/protected_hardlinks
+ Based on text in Documentation/sysctl/fs.txt by Kees Cook
+
+capabilities.7
+ Michael Kerrisk
+ Document interaction of CAP_SYSLOG and /proc/sys/kernel/kptr_restrict
+
+ip.7
+ Michael Kerrisk
+ SEE ALSO: Add ipv6(7)
+ SEE ALSO: Add icmp(7)
+
+man-pages.7
+ Michael Kerrisk
+ Add some advice about disabling hyphenation in SEE ALSO
+
+ld.so.8
+ Michael Kerrisk
+ Describe interpretation of slashes in dependency strings
+ Michael Kerrisk
+ Repeat note that LD_LIBRARY_PATH is ignored in privileged programs
+ This point is already noted when discussing search order for
+ libraries, but it's worth repeating under the specific discussion
+ of LD_LIBRARY_PATH further down the page.
+ Michael Kerrisk
+ Add some details for LD_PRELOAD
+ Note that LD_PRELOAD list separator can be space or colon
+
+
+==================== Changes in man-pages-3.44 ====================
+
+Released: 2012-11-07, Barcelona
+
+
+Contributors
+------------
+
+The following people contributed patches/fixes or (noted in brackets
+in the changelog below) reports, notes, and ideas that have been
+incorporated in changes in this release:
+
+Bert Hubert <bert.hubert@netherlabs.nl>
+David Prévot <taffit@debian.org>
+James Youngman <jay@gnu.org>
+Kees Cook <keescook@chromium.org>
+Lars Wirzenius <liw@iki.fi>
+Lucas De Marchi <lucas.de.marchi@gmail.com>
+Michael Kerrisk <mtk.manpages@gmail.com>
+Rusty Russell <rusty@rustcorp.com.au>
+Simon Paillard <spaillard@debian.org>
+Thomas Habets <thomas@habets.se>
+
+Apologies if I missed anyone!
+
+
+New and rewritten pages
+-----------------------
+
+delete_module.2
+ Michael Kerrisk
+ Rewrite to Linux 2.6+ reality
+ Michael Kerrisk
+ Change license and copyright
+ There is now nothing left of the original FSF-copyrighted
+ page. So, change the copyright and license.
+ Michael Kerrisk [Lucas De Marchi, Rusty Russell]
+ Substantial reorganization after comments from Rusty Russell
+ Rusty notes that O_NONBLOCK is almost always used in
+ practice. Therefore, it would be better to reorganize
+ the page to consider that "the default".
+
+init_module.2
+ Michael Kerrisk
+ Rewrite to Linux 2.6+ reality
+ Michael Kerrisk
+ Change copyright and license
+ Little of the original page now remains. Change
+ copyright and license
+ Michael Kerrisk [Rusty Russell]
+ Changes after review comments from Rusty Russell
+ Kees Cook
+ Add various pieces describing Linux 2.6+ behavior
+ Pieces take from, or inspired by, a patch sent by Kees.
+
+getauxval.3
+ Michael Kerrisk
+ Document getauxval() function added in glibc 2.16
+
+
+Global changes
+--------------
+
+Various pages
+ Michael Kerrisk
+ Global fix: Use consistent capitalization in NAME section
+ The line(s) in the NAME section should only use capitals
+ where English usage dictates that. Otherwise, use
+ lowercase throughout.
+
+Various pages
+ Michael Kerrisk
+ Global fix: "userspace" ==> "user space" or "user-space"
+ Existing pages variously use "userspace or "user space".
+ But, "userspace" is not quite an English word.
+ So change "userspace" to "user space" or, when used
+ attributively, "user-space".
+
+
+Changes to individual pages
+---------------------------
+
+clock_getres.2
+clock_nanosleep.2
+ Michael Kerrisk
+ Linking with -lrt is no longer needed from glibc 2.17 onward
+
+create_module.2
+ Michael Kerrisk
+ Note that this system call is present only in kernels before 2.6
+ Michael Kerrisk
+ Note that ENOSYS probably indicates kernel 2.6+
+
+execve.2
+ Michael Kerrisk
+ Document treatment of PR_SET_PDEATHSIG on execve()
+ Michael Kerrisk
+ Document treatment of SECBIT_KEEP_CAPS securebits flag on execve()
+
+fork.2
+ Michael Kerrisk
+ Note treatment of default timer slack value on fork()
+
+getdomainname.2
+ Simon Paillard [Lars Wirzenius]
+ Point out that these calls relate to NIS, not DNS
+ See http://bugs.debian.org/295635
+
+get_kernel_syms.2
+ Michael Kerrisk
+ Note that this system call is present only in kernels before 2.6
+
+ipc.2
+ Michael Kerrisk
+ Update note on architectures that don't have ipc()
+ Replace mention of ia64 with x86-64 and ARM.
+
+link.2
+ Michael Kerrisk
+ Add EPERM error triggered by /proc/sys/fs/protected_hardlink
+
+prctl.2
+ Michael Kerrisk
+ Mention Documentation/prctl/no_new_privs.txt for PR_SET_NO_NEW_PRIVS
+ Kees Cook
+ update seccomp sections for mode 2 (BPF)
+ This adds a short summary of the arguments used
+ for "mode 2" (BPF) seccomp.
+ Michael Kerrisk
+ Small improvements to PR_SET_SECCOMP discussion
+ Note type of 'arg3' for SECCOMP_MODE_FILTER.
+ Add pointer to Documentation/prctl/seccomp_filter.txt.
+ Michael Kerrisk
+ Note 'seccomp' semantics with respect to fork(), execve(), and prctl()
+ Michael Kerrisk
+ Document PR_SET_TIMERSLACK and PR_GET_TIMERSLACK
+ Michael Kerrisk
+ Reword PR_SET_NAME and PR_GET_NAME in terms of threads
+ Plus tfix
+ Kees Cook
+ document PR_SET_NO_NEW_PRIVS, PR_GET_NO_NEW_PRIVS
+ This adds a short description of the no_new_privs bit,
+ as described in Documentation/prctl/no_new_privs.txt.
+
+ptrace.2
+ Michael Kerrisk
+ Clarify that some operations are not present on all architectures
+ PTRACE_GETREGS, PTRACE_SETGREFS, PTRACE_GETFPREGS,
+ and PTRACE_GETSPREGS are not present on all architectures.
+ PTRACE_SYSEMU and PTRACE_SYSEMU_SINGLESTEP are present only
+ on x86.
+
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=122383
+
+query_module.2
+ Michael Kerrisk
+ Add a few words clarifying reference to /sys/module
+ Michael Kerrisk
+ Note that this system call is present only in kernels before 2.6
+ Michael Kerrisk
+ Note that ENOSYS probably indicates kernel 2.6+
+ Michael Kerrisk
+ SEE ALSO: Add modinfo(8) and lsinfo(8)
+ Michael Kerrisk
+ Move some information in NOTES to VERSIONS
+
+socketcall.2
+ Michael Kerrisk
+ Update note on architectures that don't have socketcall()
+ Replace mention of ia64 with x86-64 and ARM.
+
+times.2
+ Thomas Habets
+ Recommend clock_gettime(2) as alternative to times(2)
+
+clock_getcpuclockid.3
+ Michael Kerrisk
+ Linking with -lrt is no longer needed from glibc 2.17 onward
+
+fts.3
+ Simon Paillard [James Youngman]
+ Improve description of physical vs. logical tree walking
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=633505
+
+getenv.3
+ Michael Kerrisk
+ SEE ALSO: add getauxval(3)
+
+proc.5
+ Michael Kerrisk
+ Document /proc/meminfo
+ Info mostly taken from Documentation/filesystems/proc.txt
+ and Documentation/vm/hugetlbpage.txt.
+ Michael Kerrisk
+ Default for /proc/sys/fs/protected_{hardlinks,symlinks} is now 0
+ The default setting of 1 in/proc/sys/fs/protected_hardlinks
+ and /proc/sys/fs/protected_symlinks caused one too many
+ breakages for Linus's taste, so commit 561ec64ae67e changed
+ the default for both files to 0.
+ Note system call error yielded by /proc/sys/fs/protected_symlinks
+ Note that violating 'protected_symlinks' restrictions
+ causes system calls to fail with the error EACCES.
+ Michael Kerrisk
+ Since Linux 2.6.27, /proc/sys/kernel/modprobe depends on CONFIG_MODULES
+
+ipv6.7
+ Bert Hubert
+ Document IPV6_RECVPKTINFO
+
+man-pages.7
+ Michael Kerrisk
+ Note rules for capitalization in NAME section
+
+time.7
+ Michael Kerrisk
+ Add a subsection on timer slack
+
+ld.so.8
+ Michael Kerrisk
+ SEE ALSO: add getauxval(3)
+
+
+==================== Changes in man-pages-3.45 ====================
+
+Released: 2012-12-21, Christchurch
+
+
+Contributors
+------------
+
+The following people contributed patches/fixes or (noted in brackets
+in the changelog below) reports, notes, and ideas that have been
+incorporated in changes in this release:
+
+Andi Kleen <andi@firstfloor.org>
+Cyril Hrubis <chrubis@suse.cz>
+David Prévot <taffit@debian.org>
+Elie De Brauwer <eliedebrauwer@gmail.com>
+Eric Dumazet <eric.dumazet@gmail.com>
+Felipe Pena <felipensp@gmail.com>
+Florian Weimer <fweimer@redhat.com>
+Gao Feng <gaofeng@cn.fujitsu.com>
+Jan Glauber <jang@linux.vnet.ibm.com>
+Jim Paris <jim@jtan.com>
+Jon Grant <jg@jguk.org>
+Julien Cristau <jcristau@debian.org>
+Michael Kerrisk <mtk.manpages@gmail.com>
+Mike Frysinger <vapier@gentoo.org>
+Rens van der Heijden <rens.vanderheijden@uni-ulm.de>
+Simon Paillard <spaillard@debian.org>
+Thierry Vignaud <thierry.vignaud@gmail.com>
+Trevor Woerner <twoerner@gmail.com>
+YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
+
+Apologies if I missed anyone!
+
+
+New and rewritten pages
+-----------------------
+
+s390_runtime_instr.2
+ Jan Glauber
+ New page for s390-specific s390_runtime_instr(2)
+
+if_nameindex.3
+ YOSHIFUJI Hideaki
+ Document if_nameindex(3) and if_freenameindex(3)
+ Michael Kerrisk
+ Edits, improvements and corrections to Hideaki's page
+ Michael Kerrisk
+ Add an example program
+
+if_nametoindex.3
+ YOSHIFUJI Hideaki
+ New page documenting if_nametoindex(3) and if_indextoname(3)
+
+
+New and changed links
+---------------------
+
+if_freenameindex.3
+ Michael Kerrisk
+ New link to if_nameindex.3
+
+if_indextoname.3
+ Michael Kerrisk
+ New link to if_nametoindex.3
+
+
+Global changes
+--------------
+
+sysconf.3
+cciss.4
+ Michael Kerrisk
+ Global fix: s/runtime/run time/
+
+
+Changes to individual pages
+---------------------------
+
+clone.2
+ Michael Kerrisk
+ Since 2.6.30, CLONE_NEWIPC also supports POSIX message queues
+
+delete_module.2
+ Michael Kerrisk
+ Small rewording of description of effect of O_TRUNC
+
+getrlimit.2
+ Michael Kerrisk [Trevor Woerner]
+ Document Linux's nonstandard treatment or RLIMIT_CPU soft limit
+ Upon encountering the RLIMIT_CPU soft limit when a SIGXCPU handler
+ has been installed, Linux invokes the signal handler *and* raises
+ the soft limit by one second. This behavior repeats until the
+ limit is encountered. No other implementation that I tested
+ (Solaris 10, FreeBSD 9.0, OpenBSD 5.0) does this, and it seems
+ unlikely to be POSIX-conformant. The (Linux-specific)
+ RLIMIT_RTTIME soft limit exhibits similar behavior.
+ Michael Kerrisk
+ Point reader at discussion of /proc/[pid]/limits in proc(5)
+
+io_getevents.2
+ Michael Kerrisk
+ io_getevents() may cause segfault when called with invalid ctx_id
+ For reference see: http://marc.info/?l=linux-aio&m=130089887002435&w=2
+
+recv.2
+ Michael Kerrisk [Eric Dumazet]
+ UNIX domain sockets support MSG_TRUNC since 3.4
+
+sendmmsg.2
+ Elie De Brauwer
+ Add example program for sendmmsg()
+
+stat.2
+ Simon Paillard
+ Clarify description of EOVERFLOW error
+ The EOVERFLOW error is not only for st_size, but also
+ inode and block size fields. See glibc source file
+ sysdeps/unix/sysv/linux/xstatconv.c and kernel source
+ file fs/stat.c. Also, fix bit/byte confusion
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=604928
+
+syscalls.2
+ Michael Kerrisk
+ Update various references to "i386" to "x86"
+ Michael Kerrisk
+ Add s390_runtime_instr(2)
+
+sysctl.2
+ Michael Kerrisk
+ Mention CONFIG_SYSCTL_SYSCALL
+ Michael Kerrisk
+ Calls to sysctl() log warnings to the kernel log since 2.6.24
+
+syslog.2
+ Michael Kerrisk
+ Substantially reorganize discussion of commands
+ Make the layout of the discussion of the commands
+ more readable.
+ Michael Kerrisk
+ Add kernel symbolic 'type' names
+ Michael Kerrisk
+ Clarify SYSLOG_ACTION_SIZE_UNREAD semantics
+ SYSLOG_ACTION_SIZE_UNREAD returns the number of bytes
+ available for reading via SYSLOG_ACTION_READ.
+ Michael Kerrisk
+ Clarify where SYSLOG_ACTION_READ_ALL places data it reads
+ Michael Kerrisk
+ Clarify semantics of SYSLOG_ACTION_CLEAR
+ The SYSLOG_ACTION_CLEAR command (5) does not really clear
+ the ring buffer; rather it affects the semantics of what
+ is returned by commands 3 (SYSLOG_ACTION_READ_ALL) and
+ 4 (SYSLOG_ACTION_READ_CLEAR).
+ Michael Kerrisk
+ Clarify discussion of privileges for commands 3 and 10
+ Michael Kerrisk
+ Add mention of CONFIG_LOG_BUF_SHIFT
+
+wait.2
+ Michael Kerrisk
+ BUGS: Document odd waitid() behavior when 'infop' is NULL
+
+getifaddrs.3
+ Michael Kerrisk [Julien Cristau]
+ Update description of ifa_data to Linux 2.6+ reality
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526778
+
+memcmp.3
+ Michael Kerrisk [Jon Grant]
+ Enhance RETURN VALUE text and remove redundant text from DESCRIPTION
+ Note that sign of result equals sign of difference between
+ first two bytes that differ (treated as "unsigned char")."
+
+mkstemp.3
+ Michael Kerrisk [Florian Weimer]
+ Deemphasize discussion of mode 066 in glibc 2.0.6
+ Glibc 2.0.6 is now so ld that the discussion of details
+ of that version can be deemphasized placing just under
+ NOTES.
+
+ See https://bugzilla.kernel.org/show_bug.cgi?id=51811
+
+strcmp.3
+ Michael Kerrisk [Jon Grant]
+ Enhance RETURN VALUE text and remove redundant text from DESCRIPTION
+ Note that sign of result equals sign of difference between
+ first two bytes that differ (treated as "unsigned char")."
+
+ttyname.3
+ Michael Kerrisk
+ Fix confused text in ERRORS
+ The existing text suggested that the ERRORS applied
+ only for ttyname_r(). However, 2 of the 3 errors
+ can occur for ttyname().
+
+undocumented.3
+ Michael Kerrisk
+ Remove some now documented functions
+
+proc.5
+ Michael Kerrisk [Jim Paris]
+ Correct description of SwapFree in /proc/meminfo
+ Michael Kerrisk
+ Note change of /proc/[pid]/limits file permissions in 2.6.36
+
+resolv.conf.5
+ Simon Paillard
+ Document IPv6 format for nameserver
+ See: http://bugs.debian.org/610036
+
+capabilities.7
+ Michael Kerrisk [Rens van der Heijden]
+ Correct URL for POSIX.1e draft
+
+ipv6.7
+ Gao Feng
+ Add description of getsockopt() for IPV6_MTU
+ In IPv4,IP_MTU is only supported by getsockopt.
+ In IPv6, we can use IPV6_MTU to set socket's MTU,
+ but the return value of getsockopt() is the path MTU.
+
+rtnetlink.7
+ Michael Kerrisk [Julien Cristau]
+ Update description of IFLA_STATS to Linux 2.6+ reality
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526778
+
+socket.7
+ Michael Kerrisk [YOSHIFUJI Hideaki]
+ Document 'sockaddr' and 'sockaddr_storage' types
+ Andi Kleen
+ Explain effect of SO_SNDTIMEO for connect()
+ When SO_SNDTIMEO is set before connect(), then connect()
+ may return EWOULDBLOCK when the timeout fires.
+
+
+==================== Changes in man-pages-3.46 ====================
+
+Released: 2013-01-27, Canberra
+
+
+Contributors
+------------
+
+The following people contributed patches/fixes or (noted in brackets
+in the changelog below) reports, notes, and ideas that have been
+incorporated in changes in this release:
+
+Andrew Perepechko <andrew_perepechko@xyratex.com>
+Cédric Boutillier <cedric.boutillier@gmail.com>
+Cyrill Gorcunov <gorcunov@openvz.org>
+Daan Spitz <daan.f.spitz@gmail.com>
+David Prévot <taffit@debian.org>
+Elie De Brauwer <eliedebrauwer@gmail.com>
+Garrett Cooper <yanegomi@gmail.com>
+James Noble <James.Noble@daktronics.com>
+Justin Lebar <justin.lebar@gmail.com>
+Kees Cook <keescook@chromium.org>
+Lucas De Marchi <lucas.demarchi@profusion.mobi>
+Mark Hills <mark@pogo.org.uk>
+Maxin B. John <maxin.john@gmail.com>
+Michael Kerrisk <mtk.manpages@gmail.com>
+Michal Gorny <mgorny@gentoo.org>
+Peter Budny <bigpeteb@gmail.com>
+Peter Lekeynstein <lekensteyn@gmail.com>
+Rusty Russell <rusty@rustcorp.com.au>
+Samuel Thibault <sthibault@debian.org>
+Sam Varshavchik <mrsam@courier-mta.com>
+Shawn Landden <shawnlandden@gmail.com>
+Simon Paillard <spaillard@debian.org>
+Starlight <starlight.2013q1@binnacle.cx>
+Theodore Ts'o <tytso@mit.edu>
+Wolfgang Rohdewald <wolfgang@rohdewald.de>
+Zsbán Ambrus <ambrus@math.bme.hu>
+
+Apologies if I missed anyone!
+
+
+New and rewritten pages
+-----------------------
+
+kcmp.2
+ Cyrill Gorcunov, Michael Kerrisk
+ New page for kcmp(2)
+
+
+Newly documented interfaces in existing pages
+---------------------------------------------
+
+init_module.2
+ Michael Kerrisk [Kees Cook, Rusty Russell, Lucas De Marchi]
+ Document finit_module(2)
+ Rusty Russell [Lucas De Marchi, Kees Cook]
+ Document finit_module() 'flags' argument
+ Document MODULE_INIT_IGNORE_MODVERSIONS and
+ MODULE_INIT_IGNORE_VERMAGIC. (Some edits by mtk.)
+
+
+New and changed links
+---------------------
+
+finit_module.2
+ Michael Kerrisk
+ New link to init_module.2
+
+__after_morecore_hook.3
+__free_hook.3
+__malloc_initialize_hook.3
+__memalign_hook.3
+__realloc_hook.3
+ Michael Kerrisk
+ New link to malloc_hook.3
+
+
+Global changes
+--------------
+
+Various pages
+ Michael Kerrisk
+ Global fix: s/tty/terminal/
+
+
+Changes to individual pages
+---------------------------
+
+clone.2
+ Michael Kerrisk
+ Add kernel versions for various CLONE_* constants
+ Michael Kerrisk
+ CLONE_NEWIPC governs mechanisms that don't have filesystem pathnames
+ Michael Kerrisk
+ CLONE_NEWIPC doesn't mount the POSIX MQ file system
+ Michael Kerrisk
+ Add an example program (CLONE_NEWUTS)
+ Michael Kerrisk
+ Some reworking of CLONE_NEWIPC text
+ No substantial content changes.
+ Michael Kerrisk
+ SEE ALSO: add kcmp(2)
+ SEE ALSO: add setns(2)
+
+fallocate.2
+ Michael Kerrisk
+ FALLOC_FL_* flags are defined in glibc only since 2.18
+
+getxattr.2
+removexattr.2
+setxattr.2
+ Michael Kerrisk [Andrew Perepechko, ]
+ Note that ENOATTR is a synonym for ENODATA
+ Various people have pointed out that strace(1) shows ENODATA
+ for the case where the named attribute does not exist, or
+ the process has no access to this attribute. ENODATA
+ and ENOATTR are in fact defined as synonyms. Point this out
+ in the man page, so that people understand the strace(1) info.
+
+ See https://bugzilla.kernel.org/show_bug.cgi?id=51871
+
+getxattr.2
+listxattr.2
+removexattr.2
+setxattr.2
+ Michael Kerrisk
+ Put errors under ERRORS section
+ The errno values on these pages were listed in a nonstandard
+ way under the RETURN VALUE section. Put them in ERRORS sections.
+
+init_module.2
+ Michael Kerrisk [Rusty Russell]
+ ERRORS: Add errors for module signatures (EBADMSG, ENOKEY)
+
+link.2
+mkdir.2
+mknod.2
+open.2
+rename.2
+symlink.2
+write.2
+mkfifo.3
+ Mark Hills
+ Document EDQUOT error
+ The return error EDQUOT is not documented in open(2), write(2),
+ symlink(2) etc.
+
+ Whether inodes or disk blocks are required for each function
+ is something I based on received wisdom and BSD documentation,
+ rather than tracing the code to the kernel. For symlink(2)
+ this certainly depends on the file system type.
+
+listxattr.2
+ Michael Kerrisk [Theodore Ts'o]
+ Fix RETURN VALUE description
+ On success, 0 may be returned, so change wording from
+ "positive number" to "nonnegative number".
+
+outb.2
+ Michael Kerrisk
+ Add SYNOPSIS
+
+prctl.2
+ Kees Cook
+ Document PR_SET_PTRACER
+ Document the Yama LSM's prctl handler that allows processes to
+ declare ptrace restriction exception relationships via
+ PR_SET_PTRACER.
+ Michael Kerrisk
+ Make it explicit that PR_SET_PTRACER replaces previous setting
+ The attribute is a scalar, not a list.
+ Shawn Landden
+ Document EINVAL error for PR_SET_PTRACER
+ Michael Kerrisk
+ Document PR_GET_TID_ADDRESS
+
+ptrace.2
+ Michael Kerrisk
+ Document PTRACE_O_EXITKILL
+ Michael Kerrisk
+ Place PTRACE_SETOPTIONS list in alphabetical order
+
+query_module.2
+ Michael Kerrisk
+ Must be called using syscall(2)
+ Yes, the call is way obsolete, but add this info
+ for completeness.
+
+recvmmsg.2
+ Elie De Brauwer
+ Add/correct kernel version info for recvmmsg() and MSG_WAITFORNONE
+ This patch isolates the since/version related fixes as requested.
+ This change introduces the following delta:
+ * The page states it was added in 2.6.32 but it is only added
+ 2.6.33 (ref: http://kernelnewbies.org/Linux_2_6_33)
+ * The MSG_WAITFORONE flag was in turn only added in 2.6.34
+ (ref: http://kernelnewbies.org/Linux_2_6_34)
+ Elie De Brauwer
+ Add an example program
+
+setns.2
+ Michael Kerrisk
+ Add example program
+
+sigaction.2
+ Michael Kerrisk [Zsbán Ambrus]
+ Note feature test macro requirements for 'siginfo_t'
+ See https://bugzilla.kernel.org/show_bug.cgi?id=52931
+
+syscalls.2
+ Michael Kerrisk
+ Add kern_features(2)
+ Michael Kerrisk
+ Add utrap_install(2)
+ Sparc-specific, present since ancient times
+ Michael Kerrisk
+ Add finit_module(2)
+
+sysctl.2
+ Michael Kerrisk [Garrett Cooper]
+ ERRORS: EACCES as a synonym for EPRM
+ See https://bugzilla.kernel.org/show_bug.cgi?id=46731
+ and http://thread.gmane.org/gmane.linux.ltp/11413/focus=957635
+ From: Garrett Cooper <yanegomi <at> gmail.com>
+ Subject: Re: [LTP] [PATCH] sysctl03: sysctl returns EACCES after 2.6.33-rc1
+ Newsgroups: gmane.linux.kernel, gmane.linux.ltp
+ Date: 2010-03-04 18:35:33 GMT
+
+unshare.2
+ Michael Kerrisk
+ Update NOTES on unimplemented flags
+ Michael Kerrisk
+ Fix text problems in description of CLONE_FS
+ Michael Kerrisk
+ SEE ALSO: add kcmp(2)
+ SEE ALSO: add setns(2)
+ Michael Kerrisk
+ Reorder CLONE_NEWUTS entry in list
+
+difftime.3
+ Michael Kerrisk [Michal Gorny]
+ Remove crufty text about 'time_t' on "other systems"
+ Back in 2006, some text came in via Debian patches that seems
+ crufty. Remove it.
+
+ See https://bugzilla.kernel.org/show_bug.cgi?id=46731
+
+getaddrinfo.3
+getnameinfo.3
+ Michael Kerrisk [Peter Budny]
+ Fix some confused references to function names
+ See https://bugzilla.kernel.org/show_bug.cgi?id=52741
+
+getspnam.3
+ Michael Kerrisk [Wolfgang Rohdewald]
+ ERRORS: Add EACCES
+ See https://bugzilla.kernel.org/show_bug.cgi?id=52681
+
+__setfpucw.3
+ Michael Kerrisk
+ Add proper page cross refs for alternate functions
+
+core.5
+proc.5
+ Kees Cook
+ Clarify suid_dumpable versus core_pattern
+ In Linux 3.6, additional requirements were placed on core_pattern
+ when suid_dumpable is set to 2. Document this and include commit
+ references.
+ Justin Lebar
+ statm's "shared" field refers to pages backed by files
+ I noticed that statm's "shared" field doesn't match the sum of
+ all the "shared" entries in smaps [1].
+
+ The kernel docs explain that statm's "shared" field is "number of
+ pages that are shared (i.e. backed by a file)" [2]. smaps appears
+ to call a page shared if it's mapped by at least two processes,
+ which explains this discrepancy.
+
+ I'm not a kernel hacker, but it appears to me they do mean "i.e."
+ and not "e.g." in the statm description: In
+ fs/proc/task_mmu.c::task_statm, I see
+
+ *shared = get_mm_counter(mm, MM_FILEPAGES);
+
+ Here's a patch which updates the man page to match the (hopefully
+ correct) kernel docs.
+
+ [1] https://bugzilla.mozilla.org/show_bug.cgi?id=807181
+ [2] http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=blob;f=Documentation/filesystems/proc.txt;h=a1793d670cd01bd374eddf54ffdfc768504291ff;hb=HEAD
+
+proc.5
+ Kees Cook
+ Put /proc/sys/kernel/hotplug in alphabetical order
+ Kees Cook
+ Document /proc/sys/kernel/dmesg_restrict
+ Kees Cook
+ Linux 3.4 changed permissions needed to change kptr_restrict
+ Michael Kerrisk [Samuel Thibault, Simon Paillard]
+ Add field numbers for /proc/PID/stat
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=553413
+ Add numbering to /proc/stat "cpu" fields
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=553413
+ Michael Kerrisk
+ Reorganize text describing /proc/stat "cpu" fields
+ Michael Kerrisk
+ Rewording of suid_dumpable text after comments from Kees Cook
+ Michael Kerrisk [Samuel Thibault, Simon Paillard]
+ Add field numbers for /proc/[pid]/statm
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=553413
+ Michael Kerrisk
+ Document /proc/stat "cpu" "nice_guest" field
+ Info taken from commit ce0e7b28fb75cb003cfc8d0238613aaf1c55e797
+ Michael Kerrisk [Peter Lekeynstein]
+ Document /prod/[pid]/oom_score_adj
+ Text taken directly from Documentation/filesystems/proc.txt,
+ with some light editing.
+
+ See https://bugzilla.kernel.org/show_bug.cgi?id=50421
+
+shells.5
+ Michael Kerrisk
+ Add /etc/bash to list of example shells
+
+ttytype.5
+ Michael Kerrisk
+ Add proper xref for termcap and terminfo pages
+
+capabilities.7
+ Michael Kerrisk
+ Add kcmp(2) under CAP_SYS_PTRACE
+
+man-pages.7
+ Michael Kerrisk
+ Update description of Section 7
+
+
+==================== Changes in man-pages-3.47 ====================
+
+Released: 2013-02-12, Christchurch
+
+
+Contributors
+------------
+
+The following people contributed patches/fixes or (noted in brackets
+in the changelog below) reports, notes, and ideas that have been
+incorporated in changes in this release:
+
+David Prévot <taffit@debian.org>
+D. Barbier <bouzim@gmail.com>
+Lennart Poettering <lennart@poettering.net>
+Michael Kerrisk <mtk.manpages@gmail.com>
+Mike Frysinger <vapier@gentoo.org>
+Peter Schiffer <pschiffe@redhat.com>
+Radek Pazdera <rpazdera@redhat.com>
+Reuben Thomas <rrt@sc3d.org>
+Shawn Landden <shawnlandden@gmail.com>
+Simon Paillard <spaillard@debian.org>
+Vince Weaver <vweaver1@eecs.utk.edu>
+
+Apologies if I missed anyone!
+
+
+New and rewritten pages
+-----------------------
+
+perf_event_open.2
+ Vincent Weaver
+ New page documenting perf_event_open(2)
+
+pthread_setname_np.3
+ Chandan Apsangi, Michael Kerrisk
+ New page for pthread_setname_np(3) and pthread_getname_np(3)
+
+sln.8
+ Michael Kerrisk [Peter Schiffer]
+ New page documenting the 'sln' command provided by glibc
+ Inspired by a Red Hat downstream page, but with rather
+ more detail.
+
+
+Newly documented interfaces in existing pages
+---------------------------------------------
+
+prctl.2
+ Michael Kerrisk [Shawn Landden, Lennart Poettering]
+ Document PR_SET_CHILD_SUBREAPER and PR_GET_CHILD_SUBREAPER
+
+ip.7
+ Radek Pazdera
+ Add source-specific multicast sockopts
+ This patch adds documentation of several source-specific multicast
+ socket options that were added to kernel with implementation
+ of IGMPv3 in 2.5.68.
+
+ The following socket options were added:
+ IP_ADD_SOURCE_MEMBERSHIP
+ IP_DROP_SOURCE_MEMBERSHIP
+ IP_BLOCK_SOURCE
+ IP_UNBLOCK_SOURCE
+ IP_MSFILTER
+
+
+Pages moved across sections
+---------------------------
+
+getcontext.3
+ Michael Kerrisk
+ This page really belongs in Section 3 (moved from Section 2)
+
+getdtablesize.3
+ Michael Kerrisk
+ Move from Section 2
+
+
+New and changed links
+---------------------
+
+getcontext.2
+ Michael Kerrisk
+ Make link to page moved into Section 3
+
+getdtablesize.2
+ Michael Kerrisk
+ Link to renamed getdtablesize.3
+
+setcontext.2
+ Michael Kerrisk
+ Modify link to point to Section 3
+
+pthread_getname_np.3
+ Michael Kerrisk
+ New link to new pthread_setname_np.3
+
+setcontext.3
+ Michael Kerrisk
+ Link to getcontext page renamed into Section 3
+
+
+Changes to individual pages
+---------------------------
+
+fallocate.2
+ Michael Kerrisk
+ SEE ALSO: add fallocate(1)
+
+flock.2
+ Michael Kerrisk
+ SEE ALSO: add flock(1)
+
+fork.2
+ Michael Kerrisk
+ SEE ALSO: add exit(2)
+
+getpriority.2
+ Michael Kerrisk
+ BUGS: note that nice value is per-thread on Linux
+
+getrlimit.2
+ Michael Kerrisk
+ SEE ALSO: add prlimit(1)
+
+gettid.2
+ Michael Kerrisk
+ SEE ALSO: add various system calls that use thread IDs
+
+ioprio_set.2
+ Michael Kerrisk
+ SEE ALSO: add ionice(1)
+
+sched_setaffinity.2
+ Michael Kerrisk
+ SEE ALSO: add taskset(1)
+
+sched_setparam.2
+ Michael Kerrisk
+ Scheduling policy and parameters are per-thread on Linux
+ Direct the reader to the discussion in sched_setscheduler(2).
+
+sched_setscheduler.2
+ Michael Kerrisk
+ Scheduling policy and parameters are per-thread on Linux
+ Michael Kerrisk
+ SEE ALSO: add chrt(1)
+
+setsid.2
+ Michael Kerrisk
+ SEE ALSO: add setsid(1)
+
+shmop.2
+ Michael Kerrisk [Peter Schiffer]
+ ERRORS: Add EIDRM
+ Taken from Red Hat downstream patch
+
+sigaction.2
+makecontext.3
+ Michael Kerrisk
+ Change getcontext/setcontext page ref to Section 3
+
+signal.2
+ Michael Kerrisk [Reuben Thomas]
+ Clarify System V vs BSD semantics for signal()
+
+syscalls.2
+ Michael Kerrisk
+ The list on this page is not just syscalls common to all platforms
+ Michael Kerrisk
+ Add perfctr(2)
+ Add ppc_rtas(2)
+ Michael Kerrisk
+ Add kernel version number of utrap_install(2)
+
+unimplemented.2
+ Michael Kerrisk [Peter Schiffer]
+ Remove mention of kernel version number in DESCRIPTION
+
+inet.3
+ Michael Kerrisk [Peter Schiffer]
+ Fix error in EXAMPLE using inet_aton()
+ See https://bugzilla.redhat.com/show_bug.cgi?id=837090
+ Patch taken from Red Hat downstream.
+
+posix_fallocate.3
+ Michael Kerrisk
+ SEE ALSO: add fallocate(1)
+
+regex.3
+ Reuben Thomas
+ Clarify details of matching
+ The first is that it's far from clear that the end points of the
+ complete string match are stored in the zero'th element of the
+ regmatch_t array; secondly, the phrase "next largest substring
+ match" is positively misleading, implying some sort of size
+ ordering, whereas in fact they are ordered according to their
+ appearance in the regex pattern.
+
+scanf.3
+ Michael Kerrisk
+ Clarify meaning of "string conversions" for 'm' modifier
+ Mike Frysinger
+ Update %a vs %m documentation
+ POSIX.1-2008 adopted the 'm' flag for dynamic allocation. Update
+ page to cover it and relegate the glibc-specific 'a' flag to
+ NOTES.
+
+strtol.3
+ Michael Kerrisk [Peter Schiffer]
+ Replace some bogus text about "thousands separator"
+ See https://bugzilla.redhat.com/show_bug.cgi?id=652870
+
+sysconf.3
+ Michael Kerrisk [Peter Schiffer]
+ Use "_SC_PAGESIZE" consistently on page
+ s/_SC_PAGE_SIZE/_SC_PAGESIZE/ in one instance.
+ From Red Hat downstream patch.
+
+nscd.conf.5
+ Peter Schiffer
+ Add max-db-size and auto-propagate descriptions, default values, + misc
+ * added missing valid services (services and netgroup)
+ * added many default values for options
+ * reordered options according to the nscd.conf file
+ (logical order)
+ * added 2 missing options: max-db-size and auto-propagate
+
+nsswitch.conf.5
+ Peter Schiffer
+ Mention initgroups db
+
+proc.5
+ Michael Kerrisk
+ Document /proc/profile
+ Michael Kerrisk [Peter Schiffer]
+ Update /proc/sys/fs/file-nr to include Linux 2.6 details
+ Michael Kerrisk
+ Clarify relationship between file-max and file-nr
+ The third value in /proc/sys/fs/file-nr is the same as
+ the value in /proc/sys/fs/file-max.
+ Michael Kerrisk
+ Note message written to kernel log when file-max limit is hit
+ Info from Documentation/sysctl/fs.txt.
+ Michael Kerrisk
+ Mention lscpu(1) under discussion of /proc/cpuinfo
+
+resolv.conf.5
+ Michael Kerrisk [Peter Schiffer]
+ Document "single-request-reopen" option
+ Taken from Red Hat downstream patch
+
+ See https://bugzilla.redhat.com/show_bug.cgi?id=717770
+ See http://thread.gmane.org/gmane.linux.man/3161
+
+utmp.5
+ Michael Kerrisk
+ SEE ALSO: add utmpdump(1)
+
+cpuset.7
+ Simon Paillard
+ Add missing 'cpuset.' prefix for some flags
+ See kernel commit e21a05cb408bb9f244f11a0813d4b355dad0822e
+
+svipc.7
+ Michael Kerrisk
+ SEE ALSO: add ipcmk(1), ipcrm(1), ipcs(1)
+
+termio.7
+ Michael Kerrisk
+ SEE ALSO: add reset(1), setterm(1), stty(1), tty(4)
+
+ld.so.8
+ Michael Kerrisk [Peter Schiffer]
+ LD_VERBOSE does not work with ld.so --list and --verify
+ From Red Hat downstream patch
+
+ See https://bugzilla.redhat.com/show_bug.cgi?id=532629
+ Michael Kerrisk
+ SEE ALSO: add sln(8)
+
+zdump.8
+ Michael Kerrisk [Peter Schiffer]
+ Bring up to date with zdump --help
+ Patch taken from Red Hat downstream.
+
+
+==================== Changes in man-pages-3.48 ====================
+
+Released: 2013-03-05, Munich
+
+
+Contributors
+------------
+
+The following people contributed patches/fixes or (noted in brackets
+in the changelog below) reports, notes, and ideas that have been
+incorporated in changes in this release:
+
+Andrey Vagin <avagin@openvz.org>
+Aristeu Rozanski <aris@ruivo.org>
+Colin Walters <walters@verbum.org>
+Cyril Hrubis <chrubis@suse.cz>
+Cyrill Gorcunov <gorcunov@openvz.org>
+Daniel P. Berrange <berrange@redhat.com>
+David Prévot <taffit@debian.org>
+D. Barbier <bouzim@gmail.com>
+Denys Vlasenko <vda.linux@googlemail.com>
+Flavio Leitner <fbl@redhat.com>
+Graham Gower <graham.gower@gmail.com>
+Ivana Varekova <varekova@redhat.com>
+Kai Kunschke <kai@kunfoo.org>
+Marcela Maslanova <mmaslano@redhat.com>
+Marc Lehmann <debian-reportbug@plan9.de>
+Marshel Abraham <Marshel.Abraham@in.bosch.com>
+Michael Kerrisk <mtk.manpages@gmail.com>
+Nathan Stratton Treadway <kernelbugs@nathanst.com>
+Pavel Emelyanov <xemul@parallels.com>
+Peter Schiffer <pschiffe@redhat.com>
+Simon Heimberg <simohe@besonet.ch>
+Simon Paillard <spaillard@debian.org>
+Török Edwin <edwintorok@gmail.com>
+Ulrich Drepper <drepper@redhat.com>
+Zack Weinberg <zackw@panix.com>
+
+Apologies if I missed anyone!
+
+
+New and rewritten pages
+-----------------------
+
+getunwind.2
+ Marcela Maslanova
+ New page documenting getunwind(2)
+ Taken from Red Hat downstream man pages set
+ Michael Kerrisk
+ Much rewriting
+ Some text taken from arch/ia64/kernel/unwind.c.
+
+perfmonctl.2
+ Ivana Varekova
+ New page documenting IA-64-specific perfmonctl(2)
+ Taken from Red Hat downstream man pages
+ Michael Kerrisk
+ Rework discussion of PFM_CREATE_CONTEXT
+ Add VERSIONS and CONFORMING TO
+ Note that there is no glibc wrapper
+ Remove PFM_CREATE_EVTSETS, PFM_DELETE_EVTSETS, PFM_GETINFO_EVTSETS
+ These don't exist, and it appears they never have.
+ Fix argument types for PFM_WRITE_PMCS, PFM_WRITE_PMDS, PFM_READ_PMDS
+ The types that were being used don't exist!
+ Briefly document PFM_GET_FEATURES, PFM_DEBUG, PFM_GET_PMC_RESET_VAL
+
+gai.conf.5
+ Ulrich Drepper
+ New page documenting gai.conf
+ Taken from Red Hat downstream pages
+
+nss.5
+ Ulrich Drepper
+ New page describing nss.conf
+
+
+Newly documented interfaces in existing pages
+---------------------------------------------
+
+clock_getres.2
+ Cyril Hrubis
+ Document CLOCK_REALTIME_COARSE and CLOCK_MONOTONIC_COARSE
+ Cyril Hrubis
+ Document CLOCK_BOOTTIME
+ Michael Kerrisk
+ Some improvements to CLOCK_BOOTTIME description
+
+ptrace.2
+ Denys Vlasenko
+ Document PTRACE_GETREGSET, PTRACE_SETREGSET, PTRACE_SEIZE, and friends
+ Document PTRACE_GETREGSET, PTRACE_SETREGSET,
+ PTRACE_SEIZE, PTRACE_INTERRUPT, and PTRACE_LISTEN.
+
+
+New and changed links
+---------------------
+
+fattach.2
+fdetach.2
+getmsg.2
+isastream.2
+putmsg.2
+ Michael Kerrisk [Peter Schiffer]
+ New link to unimplemented.2
+ Taken from Red Hat downstream.
+
+ See https://bugzilla.redhat.com/show_bug.cgi?id=436407
+
+
+Global changes
+--------------
+
+Many pages
+ Michael Kerrisk
+ Global fix: remove unneeded double quotes in .SH headings
+
+Many pages
+ Michael Kerrisk
+ Global fix: remove unneeded double quotes in .SS headings
+
+Many pages
+ Michael Kerrisk
+ Global fix: use consistent capitalization in .SS headings
+ Capitalization in .SS sections across pages (and sometimes even
+ within a single page) is wildly inconsistent. Make it consistent.
+ Capitalize first word in heading, but otherwise use lower case,
+ except where English usage (e.g., proper nouns) or programming
+ language requirements (e.g., identifier names) dictate otherwise.
+Many pages
+ Michael Kerrisk [Denys Vlasenko]
+ Remove double blank lines in output
+
+Various pages
+ Michael Kerrisk
+ Fix order of SH sections
+
+
+Changes to individual pages
+---------------------------
+
+accept.2
+ Michael Kerrisk
+ NAME: Add "accept4"
+
+access.2
+ Colin Walters
+ Note that access() may also fail for FUSE
+ Since in some cases (e.g. libguestfs's guestmount) it also has the
+ semantics where files can appear owned by root, but are actually
+ mutable by the user, despite what one might infer from the Unix
+ permissions.
+
+getpeername.2
+ Michael Kerrisk [Kai Kunschke]
+ Clarify semantics of getpeername() for datagram sockets
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=674034
+
+getuid.2
+ Michael Kerrisk
+ Remove duplicate section heading
+
+mmap.2
+ Cyril Hrubis
+ Add note about partial page in BUGS section
+ This adds a note about Linux behavior with partial page at the end
+ of the object. The problem here is that a page that contains only
+ part of a file (because the file size is not multiple of PAGE_SIZE)
+ stays in page cache even after the mapping is unmapped and the file
+ is closed. So if some process dirties such page, other mappings
+ will see the changes rather than zeroes.
+ Michael Kerrisk [Török Edwin]
+ Some 'flags' values require a feature test macro to be defined
+ Add text to NOTES noting that some MAP_* constants are
+ defined only if a suitable feature test macro is defined.
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=542601
+ Cyril Hrubis
+ Document EOVERFLOW error
+
+open.2
+ Michael Kerrisk
+ Clarify list of file creation flags
+ POSIX.1-2008 TC1 clarified this, so that O_CLOEXEC,
+ O_DIRECTORY, and O_NOFOLLOW are also in this list.
+
+prctl.2
+ Cyrill Gorcunov
+ Add some details for PR_GET_TID_ADDRESS
+
+read.2
+ Michael Kerrisk [Zack Weinberg]
+ Clarify interaction of count==0 and error checking
+ POSIX deliberately leaves this case open, so the man
+ page should be less specific about what happens.
+
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=533232
+ Michael Kerrisk [Marc Lehmann]
+ Remove crufty text about O_NONBLOCK on files
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700529
+ Michael Kerrisk
+ Clarify details for seekable files
+
+unimplemented.2
+ Michael Kerrisk [Peter Schiffer]
+ Add various STREAMS interfaces to NAME
+ Taken from Red Hat downstream.
+
+ See https://bugzilla.redhat.com/show_bug.cgi?id=436407
+
+cexp2.3
+ Michael Kerrisk
+ Still does not exist in glibc 2.17
+
+exit.3
+ Michael Kerrisk
+ Note that a call to execve() clears exit handler registrations
+
+getaddrinfo.3
+ Michael Kerrisk
+ SEE ALSO: Add gai.conf(5)
+
+malloc_trim.3
+ Michael Kerrisk
+ Remove duplicate section title
+
+printf.3
+ Marshel Abraham [Graham Gower, Graham Gower]
+ Fix error handling in example code
+ See https://bugzilla.kernel.org/show_bug.cgi?id=23282
+
+pthread_yield.3
+ Michael Kerrisk [Aristeu Rozanski]
+ Add _GNU_SOURCE feature test macro to SYNOPSIS
+
+resolver.3
+resolv.conf.5
+ Michael Kerrisk [Nathan Stratton Treadway, Simon Heimberg]
+ RES_DEBUG is only available if glibc is compiled with debug support
+ See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692136
+ and https://bugzilla.kernel.org/show_bug.cgi?id=43061
+
+strtol.3
+ Michael Kerrisk [Peter Schiffer]
+ Remove crufty text from previous fix
+
+core.5
+ Michael Kerrisk
+ Document CONFIG_COREDUMP
+
+capabilities.7
+ Andrey Vagin
+ Nonexistent bits are no longer shown as set in /proc/PID/status Cap*
+
+inotify.7
+ Michael Kerrisk
+ A monitoring process can't easily distinguish events triggered by itself
+
+ip.7
+ Flavio Leitner [Peter Schiffer]
+ Improve explanation about calling listen() or connect()
+
+man-pages.7
+ Michael Kerrisk
+ Describe rules for capitalization in .SS headings
+
+rtnetlink.7
+ Pavel Emelyanov
+ Add info about ability to create links with given index
+ Since kernel v3.7 the RTM_NEWLINK message now accepts nonzero
+ values in ifi_index field. Mention this fact in the respective
+ rtnetlink.7 section.
+
+socket.7
+ Pavel Emelyanov
+ SO_BINDTODEVICE is now readable
+ SO_BINDTODEVICE is readable since since kernel 3.8.
+
+
+==================== Changes in man-pages-3.49 ====================
+
+Released: 2013-03-10, Munich
+
+
+Contributors
+------------
+
+The following people contributed patches/fixes or (noted in brackets
+in the changelog below) reports, notes, and ideas that have been
+incorporated in changes in this release:
+
+Michael Kerrisk <mtk.manpages@gmail.com>
+
+
+Global changes
+--------------
+
+The goal of the changes below to consistently format copyright
+and license information in the comments in the page source
+at the top of each page. This allows for easy scripting to
+extract that information. Following these changes the comments
+the top of the page source should now consistently have the form:
+
+ .\" <copyright info, possibly spread over several lines>
+ .\"
+ .\" %%%LICENSE_START(<license-type>)
+ .\" <license text>
+ .\" %%%LICENSE_END
+ .\" <other comments>
+
+Note that the 'license-type' is merely descriptive. Its purpose is
+to simplify scripting for the purpose of gathering statistics on
+types of licenses used in man-pages. It is NOT a statement about
+the actual licensing of the page; that license is contain INSIDE the
+LICENSE_START...LICENSE_END clause.
+
+
+All pages
+ Michael Kerrisk
+ Add a LICENSE_START()...LICENSE_END clause in source at
+ top of each page that encapsulates the license text.
+ Michael Kerrisk
+ Put copyright info at top of page, followed by blank line and LICENSE
+
+Various pages
+ Michael Kerrisk
+ Update info in source comments on where to get a copy of the GPL
+
+Various pages
+ Michael Kerrisk
+ Remove "Hey Emacs" comment in page source
+ Only certain pages have this; there is no consistency, so
+ remove it from all pages
+ Michael Kerrisk
+ Remove "-*- nroff -*-" comment at top of source
RELEASE
The Linux man page maintainer proudly announces. . .
- man-pages-3.41.tar.gz - man pages for Linux
+ man-pages-3.50.tar.gz - man pages for Linux
Differences from the previous manual pages release are listed in
the file "Changes".
Begin3
Title: Section 2, 3, 4, 5 and 7 man pages for Linux
-Version: 3.41
-Entered-date: 2011-05-11
+Version: 3.50
+Entered-date: 2013-03-15
Description: Linux manual pages
Keywords: man pages
Author: several
Maintained-by: Michael Kerrisk <mtk.manpages@gmail.com>
Primary-site: ftp://ftp.kernel.org/pub/linux/docs/man-pages
- 1750k man-pages-3.41.tar.gz
+ 1831k man-pages-3.50.tar.gz
Alternate-site: ftp://ftp.win.tue.nl/pub/linux-local/manpages
Copying-policy: several; the pages are all freely distributable as long as
nroff source is provided
.\" Copyright (c) 2011, Mark R. Bannister <cambridge@users.sourceforge.net>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
-.TH GETENT 1 2011-10-31 "Linux" "User Commands"
+.TH GETENT 1 2013-03-15 "Linux" "User Commands"
.SH NAME
getent \- get entries from Name Service Switch libraries
.SH SYNOPSIS
to match to a netgroup name via
.BR innetgr (3).
Enumeration is not supported on
-.BR initgroups ,
+.BR netgroup ,
so either one or three
.I keys
must be provided.
.BR getspnam (3)
and display the result.
.RE
-.SH "EXIT STATUS"
+.SH EXIT STATUS
One of the following exit values can be returned by
.BR getent :
.RS 3
Enumeration not supported on this
.IR database .
.RE
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR nsswitch.conf (5)
.\" Copyright (c) 2002 Andries Brouwer <aeb@cwi.nl>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 2007-10-23 mtk Added intro paragraph about section, plus a paragraph
.\" about exit status values.
.\"
.TH INTRO 1 2007-11-15 "Linux" "Linux User's Manual"
.SH NAME
-intro \- Introduction to user commands
+intro \- introduction to user commands
.SH DESCRIPTION
Section 1 of the manual describes user commands and tools,
for example, file manipulation tools, shells, compilers,
That is faster and more powerful,
but requires finding out what the commands are.
Below a bare minimum, to get started.
-.SS "Login"
+.SS Login
In order to start working, you probably first have to login,
that is, give your username and password.
See also
and a mouse click will start a shell in a window.
See also
.BR xterm (1).
-.SS "The shell"
+.SS The shell
One types commands to the
.IR shell ,
the command interpreter.
.I grep
(from "g/re/p") finds occurrences of a string in one or more files.
Here it finds Maja's telephone number.
-.SS "Pathnames and the current directory"
+.SS Pathnames and the current directory
Files live in a large tree, the file hierarchy.
Each has a
.I "pathname"
.I cd
changes the current directory.
Try "cd /" and "pwd" and "cd" and "pwd".
-.SS "Directories"
+.SS Directories
The command
.I mkdir
makes a new directory.
Large searches on a multi-GB disk will be time-consuming,
and it may be better to use
.BR locate (1).
-.SS "Disks and Filesystems"
+.SS Disks and filesystems
The command
.I mount
will attach the file system found on some disk (or floppy, or CDROM or so)
The command
.I df
will tell you how much of your disk is still free.
-.SS "Processes"
+.SS Processes
On a UNIX system many user and system processes run simultaneously.
The one you are talking to runs in the
.IR foreground ,
And "kill \-9" followed by the number
of the process is an immediate kill.
Foreground processes can often be killed by typing Control-C.
-.SS "Getting information"
+.SS Getting information
There are thousands of commands, each with many options.
Traditionally commands are documented on
.IR "man pages" ,
.\"
.\" Actual examples? Separate section for each of cat, cp, ...?
.\" gzip, bzip2, tar, rpm
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR standards (7)
.\" Copyright 2000 Jakub Jelinek (jakub@redhat.com)
.\" Corrected.
.\" Most of this was copied from the README file.
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Do not restrict distribution.
.\" May be distributed under the GNU General Public License
-.TH LDD 1 2000-10-30 "" "Linux Programmer's Manual"
+.\" %%%LICENSE_END
+.\"
+.TH LDD 1 2012-07-16 "" "Linux Programmer's Manual"
.SH NAME
ldd \- print shared library dependencies
.SH SYNOPSIS
.B ldd
prints the shared libraries required by each program or shared library
specified on the command line.
+.SS Security
+In the usual case,
+.B ldd
+invokes the standard dynamic linker (see
+.BR ld.so (8))
+with the
+.B LD_TRACE_LOADED_OBJECTS
+environment variable set to 1,
+which causes the linker to display the library dependencies.
+Be aware,
+however,
+that in some circumstances, some versions of
+.BR ldd
+may attempt to obtain the dependency information
+by directly executing the program.
+.\" Mainline glibc's ldd allows this possibility (the line
+.\" try_trace "$file"
+.\" in glibc 2.15, for example), but many distro versions of
+.\" ldd seem to remove that code path from the script.
+Thus, you should
+.I never
+employ
+.B ldd
+on an untrusted executable,
+since this may result in the execution of arbitrary code.
+A safer alternative when dealing with untrusted executables is:
+
+ $ objdump \-p /path/to/program | grep NEEDED
.SH OPTIONS
.TP
.B \-\-version
.\" Copyright Andries Brouwer, 2000
-.\"
-.\" This page is distributed under GPL.
.\" Some fragments of text came from the time-1.7 info file.
.\" Inspired by kromJx@crosswinds.net.
.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
+.\" This page is distributed under GPL.
+.\" %%%LICENSE_END
+.\"
.TH TIME 1 2008-11-14 "" "Linux User's Manual"
.SH NAME
time \- time a simple command or give resource usage
(with numbers in seconds)
where the number of decimals in the output for %f is unspecified
but is sufficient to express the clock tick accuracy, and at least one.
-.SH "EXIT STATUS"
+.SH EXIT STATUS
If
.I command
was invoked, the exit status is that of
The last one to search for
.IR command .
The remaining ones for the text and formatting of the output.
-.SH "GNU VERSION"
+.SH GNU VERSION
Below a description of the GNU 1.7 version of
.BR time .
Disregarding the name of the utility, GNU makes it output lots of
.in
.PP
is used.
-.SS "The format string"
+.SS The format string
The format is interpreted in the usual printf-like way.
Ordinary characters are directly copied, tab, newline
and backslash are escaped using \et, \en and \e\e,
.TP
.B %x
(Not in tcsh.) Exit status of the command.
-.SS "GNU Options"
+.SS GNU options
.TP
.BI "\-f " FORMAT ", \-\-format=" FORMAT
Specify output format, possibly overriding the format specified
.TP
.B "\-v, \-\-verbose"
Give very verbose output about all the program knows about.
-.SS "GNU Standard Options"
+.SS GNU standard options
.TP
.B "\-\-help"
Print a usage message on standard output and exit successfully.
.\" Helped with portability
.\" .IP "Francois Pinard"
.\" Helped with portability
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR tcsh (1),
.BR times (2),
.BR wait3 (2)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 1992 Drew Eckhardt;
.\" 1993 Michael Haardt, Ian Jackson.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified Wed Jul 21 23:02:38 1993 by Rik Faith <faith@cs.unc.edu>
.\" Modified 2001-11-17, aeb
.BR _Exit ()
is equivalent to
.BR _exit ().
-.SH "RETURN VALUE"
+.SH RETURN VALUE
These functions do not return.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001, 4.3BSD.
The function
.BR _Exit ()
Since glibc 2.3, the wrapper function invokes
.BR exit_group (2),
in order to terminate all of the threads in a process.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR execve (2),
.BR exit_group (2),
.BR fork (2),
-.\"
.\" Copyright (c) 1993 Michael Haardt (michael@moria.de),
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Tue Jul 6 12:42:46 MDT 1993 <dminer@nyx.cs.du.edu>
.\" Added "Calling Directly" and supporting paragraphs
.TH _SYSCALL 2 2007-12-19 "Linux" "Linux Programmer's Manual"
.SH NAME
_syscall \- invoking a system call without library support (OBSOLETE)
-.SH "SYNOPSIS"
+.SH SYNOPSIS
.B #include <linux/unistd.h>
A _syscall macro
you call the system call by \fIname\fP.
.SH FILES
.I /usr/include/linux/unistd.h
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The use of these macros is Linux-specific, and deprecated.
.SH NOTES
Starting around kernel 2.6.18, the _syscall macros were removed
exit(EXIT_SUCCESS);
}
.fi
-.SS "Sample Output"
+.SS Sample output
.nf
code error = 0
uptime = 502034s
Swap: total 27881472 / free 24698880
Number of processes = 40
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR intro (2),
.BR syscall (2),
.BR errno (3)
.\" Copyright (c) 1983, 1990, 1991 The Regents of the University of California.
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" Modified 1993-07-24 by Rik Faith <faith@cs.unc.edu>
.\" Modified 1996-10-21 by Eric S. Raymond <esr@thyrsus.com>
.\"
.TH ACCEPT 2 2010-09-10 "Linux" "Linux Programmer's Manual"
.SH NAME
-accept \- accept a connection on a socket
+accept, accept4 \- accept a connection on a socket
.SH SYNOPSIS
.nf
.BR "#include <sys/types.h>" " /* See NOTES */"
flag in
.BR open (2)
for reasons why this may be useful.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
these system calls return a nonnegative integer that is a descriptor
for the accepted socket.
On error, \-1 is returned, and
.I errno
is set appropriately.
-.SS "Error Handling"
+.SS Error handling
Linux
.BR accept ()
(and
.BR accept4 ()
system call is available starting with Linux 2.6.28;
support in glibc is available starting with version 2.10.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR accept ():
POSIX.1-2001,
SVr4, 4.4BSD,
.SH EXAMPLE
See
.BR bind (2).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR bind (2),
.BR connect (2),
.BR listen (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 1992 Drew Eckhardt;
.\" 1993 Michael Haardt, Ian Jackson.
.\" and Copyright (C) 2007 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified 1993-07-21 Rik Faith (faith@cs.unc.edu)
.\" Modified 1994-08-21 by Michael Chastain (mec@shell.portal.com):
.\" Modified 2004-06-23 by Michael Kerrisk
.\" 2007-06-10, mtk, various parts rewritten, and added BUGS section.
.\"
-.TH ACCESS 2 2010-10-24 "Linux" "Linux Programmer's Manual"
+.TH ACCESS 2 2013-02-28 "Linux" "Linux Programmer's Manual"
.SH NAME
access \- check real user's permissions for a file
.SH SYNOPSIS
.BR access ()
always dereferences symbolic links.
If you need to check the permissions on a symbolic link, use
-.BR faccessat(2)
+.BR faccessat (2)
with the flag
.BR AT_SYMLINK_NOFOLLOW .
.PP
may not work correctly on NFS file systems with UID mapping enabled,
because UID mapping is done on the server and hidden from the client,
which checks permissions.
+Similar problems can occur to FUSE mounts.
.SH BUGS
In kernel 2.4 (and earlier) there is some strangeness in the handling of
.B X_OK
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1993 Michael Haardt
.\" (michael@moria.de),
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified 1993-07-22 by Rik Faith <faith@cs.unc.edu>
.\" Modified 1993-08-10 by Alan Cox <iiitac@pyramid.swansea.ac.uk>
and records for each terminating process are appended to
\fIfilename\fP as it terminates.
An argument of NULL causes accounting to be turned off.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.TP
.B EUSERS
There are no more free file structures or we ran out of memory.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD (but not POSIX).
.\" SVr4 documents an EBUSY error condition, but no EISDIR or ENOSYS.
.\" Also AIX and HP-UX document EBUSY (attempt is made
The structure of the records written to the accounting file is described in
.BR acct (5).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR acct (5)
-.\"
.\" Copyright (C) 2006 Red Hat, Inc. All Rights Reserved.
.\" Written by David Howells (dhowells@redhat.com)
.\"
+.\" %%%LICENSE_START(GPLv2+_SW_ONEPARA)
.\" This program is free software; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License
.\" as published by the Free Software Foundation; either version
.\" 2 of the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.TH ADD_KEY 2 2010-02-25 Linux "Linux Key Management Calls"
.SH NAME
-add_key \- Add a key to the kernel's key management facility
+add_key \- add a key to the kernel's key management facility
.SH SYNOPSIS
.nf
.B #include <keyutils.h>
.RB \*(lq afs:mykey \*(rq).
The
.I payload
-may be empty or
-.B NULL
-for keys of this type.
+may be empty or NULL for keys of this type.
.TP
.B \*(lqkeyring\*(rq
Keyrings are special key types that may contain links to sequences of other
keys of any type.
-If this interface is used to create a keyring, then a
-.B NULL
+If this interface is used to create a keyring, then a NULL
.I payload
should be specified, and
.I plen
On success
.BR add_key ()
returns the serial number of the key it created or updated.
-On error, the value
-.B -1
+On error, the value \-1
will be returned and errno will have been set to an appropriate error.
.SH ERRORS
.TP
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1995 Michael Chastain (mec@shell.portal.com), 15 April 1995.
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified 1997-01-31 by Eric S. Raymond <esr@thyrsus.com>
.\" Modified 1997-07-30 by Paul Slootman <paul@wurtel.demon.nl>
.\" Modified 2004-05-27 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" FIXME 2.6.29 added ADJ_SETOFFSET
+.\"
.TH ADJTIMEX 2 2004-05-27 "Linux" "Linux Programmer's Manual"
.SH NAME
adjtimex \- tune kernel clock
Only the superuser may set any parameters.
.br
.ne 12v
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR adjtimex ()
returns the clock state:
Under Linux the
.B CAP_SYS_TIME
capability is required.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR adjtimex ()
is Linux-specific and should not be used in programs
intended to be portable.
.BR adjtime (3)
for a more portable, but less flexible,
method of adjusting the system clock.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR settimeofday (2),
.BR adjtime (3),
.BR capabilities (7),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 1992 Drew Eckhardt;
.\" 1993 Michael Haardt, Ian Jackson.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified Wed Jul 21 19:42:57 1993 by Rik Faith <faith@cs.unc.edu>
.\" Modified Sun Jul 21 21:25:26 1996 by Andries Brouwer <aeb@cwi.nl>
In any event any previously set
.BR alarm ()
is canceled.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR alarm ()
returns the number of seconds remaining until any previously scheduled
alarm was due to be delivered, or zero if there was no previously
scheduled alarm.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001, 4.3BSD.
.SH NOTES
.BR alarm ()
Scheduling delays can, as ever, cause the execution of the process to
be delayed by an arbitrary amount of time.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR gettimeofday (2),
.BR pause (2),
.BR select (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 2003 Andries E. Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH ALLOC_HUGEPAGES 2 2007-05-31 "Linux" "Linux Programmer's Manual"
.SH NAME
If this flag is not set, then
.B ENOENT
is returned when no segment with the given key exists.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR alloc_hugepages ()
returns the allocated virtual address, and
.I /proc/meminfo
Gives info on the number of configured hugetlb pages and on their size
in the three variables HugePages_Total, HugePages_Free, Hugepagesize.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These calls are specific to Linux on Intel processors, and should not be
used in programs intended to be portable.
.SH NOTES
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2003 Andi Kleen
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
+.\"
.TH ARCH_PRCTL 2 2007-12-26 "Linux" "Linux Programmer's Manual"
.SH NAME
arch_prctl \- set architecture-specific thread state
is outside the process address space.
.\" .SH AUTHOR
.\" Man page written by Andi Kleen.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR arch_prctl ()
is a Linux/x86-64 extension and should not be used in programs intended
to be portable.
.I FS
may be already used by the threading library.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mmap (2),
.BR modify_ldt (2),
.BR prctl (2),
.BR set_thread_area (2)
-.sp
+
AMD X86-64 Programmer's manual
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1995 Michael Chastain (mec@shell.portal.com), 15 April 1995.
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified 1997-01-31 by Eric S. Raymond <esr@thyrsus.com>
.\" Modified 2004-06-17 by Michael Kerrisk <mtk.manpages@gmail.com>
to that value.
.PP
The set of parameters, their values, and their valid ranges
-are defined in the kernel source file
+are defined in the Linux kernel source file
.IR fs/buffer.c .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
If
.I func
is negative or 0 and the daemon successfully starts,
Caller does not have the
.B CAP_SYS_ADMIN
capability.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR bdflush ()
is Linux-specific and should not be used in programs
intended to be portable.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fsync (2),
.BR sync (2),
.BR sync (8),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 1993 Rickard E. Faith (faith@cs.unc.edu)
.\" Portions extracted from /usr/include/sys/socket.h, which does not have
.\" any authorship information in it. It is probably available under the GPL.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\"
.\" Other portions are from the 6.9 (Berkeley) 3/10/91 man page:
.\" Copyright (c) 1983 The Regents of the University of California.
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" Modified Mon Oct 21 23:05:29 EDT 1996 by Eric S. Raymond <esr@thyrsus.com>
.\" Modified 1998 by Andi Kleen
.I addr
in order to avoid compiler warnings.
See EXAMPLE below.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.TP
.B EROFS
The socket inode would reside on a read-only file system.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.4BSD, POSIX.1-2001
.RB ( bind ()
first appeared in 4.2BSD).
should be deleted using unlink(2) or remove(3) */
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR accept (2),
.BR connect (2),
.BR getsockname (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1993 Michael Haardt
.\" (michael@moria.de),
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Wed Jul 21 19:52:58 1993 by Rik Faith <faith@cs.unc.edu>
.\" Modified Sun Aug 21 17:40:38 1994 by Rik Faith <faith@cs.unc.edu>
with an
.I increment
of 0 can be used to find the current location of the program break.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR brk ()
returns zero.
.I errno
is set to
.BR ENOMEM .
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD; SUSv1, marked LEGACY in SUSv2, removed in POSIX.1-2001.
.\"
.\" .BR brk ()
.\" \fIptrdiff_t\fP (libc4, libc5, ulibc, glibc 2.0, 2.1),
.\" \fIintptr_t\fP (e.g., XPGv5, AIX, SunOS 5.8, 5.9, FreeBSD 4.7, NetBSD 1.6,
.\" Tru64 5.1, glibc2.2).
-.SS Linux Notes
+.SS Linux notes
The return value described above for
.BR brk ()
is the behavior provided by the glibc wrapper function for the Linux
.BR brk ()
system call, and does some internal bookkeeping so that it can
return the old break value.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR execve (2),
.BR getrlimit (2),
.BR end (3),
.\" Written by Ralf Baechle (ralf@waldorf-gmbh.de),
.\" Copyright (c) 1994, 1995 Waldorf GMBH
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.TH CACHEFLUSH 2 2007-05-26 "Linux" "Linux Programmer's Manual"
.SH NAME
.B BCACHE
Same as
.BR (ICACHE|DCACHE) .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR cacheflush ()
returns 0 on success or \-1 on error.
If errors are detected,
.\" written by Andrew Morgan <morgan@kernel.org>
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" may be distributed as per GPL
+.\" %%%LICENSE_END
+.\"
.\" Modified by David A. Wheeler <dwheeler@ida.org>
.\" Modified 2004-05-27, mtk
.\" Modified 2004-06-21, aeb
.\" 64-bit capability sets in kernel 2.6.2[45].
.\" Modified 2009-01-26, andi kleen
.\"
-.TH CAPGET 2 2010-09-20 "Linux" "Linux Programmer's Manual"
+.TH CAPGET 2 2013-03-11 "Linux" "Linux Programmer's Manual"
.SH NAME
capget, capset \- set/get capabilities of thread(s)
.SH SYNOPSIS
call, and a set of permitted capabilities
that it can make effective or inheritable.
.PP
-These two functions are the raw kernel interface for getting and
+These two system calls are the raw kernel interface for getting and
setting thread capabilities.
Not only are these system calls specific to Linux,
but the kernel API is likely to change and use of
-these functions (in particular the format of the
+these system calls (in particular the format of the
.I cap_user_*_t
types) is subject to extension with each kernel revision,
but old programs will keep working.
.BR capsetp (3)
and
.BR capgetp (3).
-.SS "Current details"
+.SS Current details
Now that you have been warned, some current kernel details.
The structures are defined as follows.
.sp
.fi
.in -4n
.sp
-.I effective, permitted, inheritable
-are bitmasks of the capabilities defined in
+The
+.IR effective ,
+.IR permitted ,
+and
+.I inheritable
+fields are bit masks of the capabilities defined in
.I capability(7).
Note the
-.I CAP_*
+.B CAP_*
values are bit indexes and need to be bit-shifted before ORing into
the bit fields.
To define the structures for passing to the system call you have to use the
process ID with the
.I hdrp->pid
field value.
-.SS With VFS Capability Support
+.SS With VFS capability support
VFS Capability support creates a file-attribute method for adding
capabilities to privileged executables.
This privilege model obsoletes kernel support for one process
are 0 or
.BR getpid (2),
which are equivalent.
-.SS Without VFS Capability Support
+.SS Without VFS capability support
When the kernel does not support VFS capabilities,
.BR capset ()
calls can operate on the capabilities of the thread specified by the
For details on the data, see
.BR capabilities (7).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.TP
.B ESRCH
No such thread.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These system calls are Linux-specific.
.SH NOTES
The portable interface to the capability querying and setting
.I libcap
library and is available here:
.br
-http://www.kernel.org/pub/linux/libs/security/linux-privs
-.SH "SEE ALSO"
+.UR http://git.kernel.org/cgit\:/linux\:/kernel\:/git\:/morgan\:\:/libcap.git
+.UE
+.SH SEE ALSO
.BR clone (2),
.BR gettid (2),
.BR capabilities (7)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1992 Drew Eckhardt (drew@cs.colorado.edu), March 28, 1992
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified by Michael Haardt <michael@moria.de>
.\" Modified 1993-07-21 by Rik Faith <faith@cs.unc.edu>
.BR chdir ();
the only difference is that the directory is given as an
open file descriptor.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.B EBADF
.I fd
is not a valid file descriptor.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.4BSD, POSIX.1-2001.
.SH NOTES
The current working directory is the starting point for interpreting
inherits its parent's current working directory.
The current working directory is left unchanged by
.BR execve (2).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR chroot (2),
.BR getcwd (3),
.BR path_resolution (7)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1992 Drew Eckhardt (drew@cs.colorado.edu), March 28, 1992
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified by Michael Haardt <michael@moria.de>
.\" Modified 1993-07-21 by Rik Faith <faith@cs.unc.edu>
open files are maintained by the client.
Widening the permissions may be
delayed for other clients if attribute caching is enabled on them.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.TP
.B EROFS
See above.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.4BSD, SVr4, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR chown (2),
.BR execve (2),
.BR fchmodat (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1992 Drew Eckhardt (drew@cs.colorado.edu), March 28, 1992
.\" and Copyright (c) 1998 Andries Brouwer (aeb@cwi.nl)
.\" and Copyright (c) 2007, 2008 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified by Michael Haardt <michael@moria.de>
.\" Modified 1993-07-21 by Rik Faith <faith@cs.unc.edu>
.PD
.SH DESCRIPTION
These system calls change the owner and group of a file.
-The differ only in how the file is specified:
+They differ only in how the file is specified:
.IP * 2
.BR chown ()
changes the ownership of the file specified by
.B S_ISGID
bit indicates mandatory locking, and is not cleared by a
.BR chown ().
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.TP
.B EROFS
See above.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.4BSD, SVr4, POSIX.1-2001.
The 4.4BSD version can only be
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR chmod (2),
.BR fchownat (2),
.BR flock (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1992 Drew Eckhardt (drew@cs.colorado.edu), March 28, 1992
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified by Michael Haardt <michael@moria.de>
.\" Modified 1993-07-21 by Rik Faith <faith@cs.unc.edu>
This call does not close open file descriptors, and such file
descriptors may allow access to files outside the chroot tree.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.TP
.B EPERM
The caller has insufficient privilege.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.4BSD, SUSv2 (marked LEGACY).
This function is not part of POSIX.1-2001.
.\" SVr4 documents additional EINTR, ENOLINK and EMULTIHOP error conditions.
system call.
.\" FIXME . eventually say something about containers,
.\" virtual servers, etc.?
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR chdir (2),
.BR path_resolution (7)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 2003 Nick Clifford (zaf@nrc.co.nz), Jan 25, 2003
.\" Copyright (c) 2003 Andries Brouwer (aeb@cwi.nl), Aug 24, 2003
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 2003-08-23 Martin Schulze <joey@infodrom.org> improvements
.\" 2003-08-24 aeb, large parts rewritten
.\" 2004-08-06 Christoph Lameter <clameter@sgi.com>, SMP note
.\"
-.\" FIXME: Linux 2.6.39 adds CLOCK_BOOTTIME
-.\"
-.TH CLOCK_GETRES 2 2012-04-30 "" "Linux Programmer's Manual"
+.TH CLOCK_GETRES 2 2013-02-25 "" "Linux Programmer's Manual"
.SH NAME
clock_getres, clock_gettime, clock_settime \- clock and time functions
.SH SYNOPSIS
.BI "int clock_settime(clockid_t " clk_id ", const struct timespec *" tp );
.sp
-Link with \fI\-lrt\fP.
+Link with \fI\-lrt\fP (only for glibc versions before 2.17).
.sp
.in -4n
Feature Test Macro Requirements for glibc (see
.BR adjtime (3)
and NTP.
.TP
+.BR CLOCK_REALTIME_COARSE " (since Linux 2.6.32; Linux-specific)"
+.\" Added in commit da15cfdae03351c689736f8d142618592e3cebc3
+A faster but less precise version of
+.BR CLOCK_REALTIME .
+Use when you need very fast, but not fine-grained timestamps.
+.TP
+.TP
.B CLOCK_MONOTONIC
Clock that cannot be set and represents monotonic time since
some unspecified starting point.
.BR adjtime (3)
and NTP.
.TP
+.BR CLOCK_MONOTONIC_COARSE " (since Linux 2.6.32; Linux-specific)"
+.\" Added in commit da15cfdae03351c689736f8d142618592e3cebc3
+A faster but less precise version of
+.BR CLOCK_MONOTONIC .
+Use when you need very fast, but not fine-grained timestamps.
+.TP
.BR CLOCK_MONOTONIC_RAW " (since Linux 2.6.28; Linux-specific)"
.\" Added in commit 2d42244ae71d6c7b0884b5664cf2eda30fb2ae68, John Stultz
Similar to
the incremental adjustments performed by
.BR adjtime (3).
.TP
+.BR CLOCK_BOOTTIME " (since Linux 2.6.39; Linux-specific)"
+.\" commit 7fdd7f89006dd5a4c702fa0ce0c272345fa44ae0
+.\" commit 70a08cca1227dc31c784ec930099a4417a06e7d0
+Identical to
+.BR CLOCK_MONOTONIC ,
+except it also includes any time that the system is suspended.
+This allows applications to get a suspend-aware monotonic clock
+without having to deal with the complications of
+.BR CLOCK_REALTIME ,
+which may have discontinuities if the time is changed using
+.BR settimeofday (2).
+.TP
.B CLOCK_PROCESS_CPUTIME_ID
High-resolution per-process timer from the CPU.
.TP
.B CLOCK_THREAD_CPUTIME_ID
Thread-specific CPU-time clock.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR clock_gettime (),
.BR clock_settime ()
and
.B EPERM
.BR clock_settime ()
does not have permission to set the clock indicated.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SUSv2, POSIX.1-2001.
.SH AVAILABILITY
On POSIX systems on which these functions are available, the symbol
On Linux, these clocks are not settable
(i.e., no process has "appropriate privileges").
.\" See http://bugzilla.kernel.org/show_bug.cgi?id=11972
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR date (1),
.BR gettimeofday (2),
.BR settimeofday (2),
.\" Copyright (c) 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH CLOCK_NANOSLEEP 2 2010-12-03 "Linux" "Linux Programmer's Manual"
+.TH CLOCK_NANOSLEEP 2 2012-11-07 "Linux" "Linux Programmer's Manual"
.SH NAME
clock_nanosleep \- high-resolution sleep with specifiable clock
.SH SYNOPSIS
.BI " struct timespec *" remain );
.fi
.sp
-Link with \fI\-lrt\fP.
+Link with \fI\-lrt\fP (only for glibc versions before 2.17).
.sp
.ad l
.in -4n
This value can then be used to call
.BR clock_nanosleep ()
again and complete a (relative) sleep.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On successfully sleeping for the requested interval,
.BR clock_nanosleep ()
returns 0.
.BR clock_nanosleep ()
system call first appeared in Linux 2.6.
Support is available in glibc since version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
If the interval specified in
is never restarted after being interrupted by a signal handler,
regardless of the use of the
.BR sigaction (2)
-.B SA_SIGACTION
+.B SA_RESTART
flag.
The
.BR clock_settime (2)
shall have no effect on a thread that is blocked on a relative
.BR clock_nanosleep ().
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR clock_getres (2),
.BR nanosleep (2),
.BR timer_create (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1992 Drew Eckhardt <drew@cs.colorado.edu>, March 28, 1992
-.\" and Copyright (c) Michael Kerrisk, 2001, 2002, 2005
+.\" and Copyright (c) Michael Kerrisk, 2001, 2002, 2005, 2013
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" May be distributed under the GNU General Public License.
+.\" %%%LICENSE_END
+.\"
.\" Modified by Michael Haardt <michael@moria.de>
.\" Modified 24 Jul 1993 by Rik Faith <faith@cs.unc.edu>
.\" Modified 21 Aug 1994 by Michael Chastain <mec@shell.portal.com>:
.\" FIXME Document CLONE_NEWUSER, which is new in 2.6.23
.\" (also supported for unshare()?)
.\"
-.TH CLONE 2 2011-09-08 "Linux" "Linux Programmer's Manual"
+.TH CLONE 2 2013-01-01 "Linux" "Linux Programmer's Manual"
.SH NAME
clone, __clone2 \- create a child process
.SH SYNOPSIS
When the child process is created with
.BR clone (),
it executes the function
-application
.IR fn ( arg ).
(This differs from
.BR fork (2),
.I ctid
in child memory.
.TP
-.B CLONE_FILES
+.BR CLONE_FILES " (since Linux 2.0)"
If
.B CLONE_FILES
is set, the calling process and the child process share the same file
performed by either the calling
process or the child process do not affect the other process.
.TP
-.B CLONE_FS
+.BR CLONE_FS " (since Linux 2.0)"
If
.B CLONE_FS
is set, the caller and the child process share the same file system
the calling process.
This flag is intended for the implementation of containers.
-An IPC namespace consists of the set of identifiers for
-System V IPC objects.
-(These objects are created using
-.BR msgctl (2),
-.BR semctl (2),
-and
-.BR shmctl (2)).
+An IPC namespace provides an isolated view of System V IPC objects (see
+.BR svipc (7))
+and (since Linux 2.6.30)
+.\" commit 7eafd7c74c3f2e67c27621b987b28397110d643f
+.\" https://lwn.net/Articles/312232/
+POSIX message queues
+(see
+.BR mq_overview (7)).
+The common characteristic of these IPC mechanisms is that IPC
+objects are identified by mechanisms other than filesystem
+pathnames.
+
Objects created in an IPC namespace are visible to all other processes
that are members of that namespace,
but are not visible to processes in other IPC namespaces.
When an IPC namespace is destroyed
-(i.e, when the last process that is a member of the namespace terminates),
+(i.e., when the last process that is a member of the namespace terminates),
all IPC objects in the namespace are automatically destroyed.
Use of this flag requires: a kernel configured with the
A physical network device can live in exactly one
network namespace.
A virtual network device ("veth") pair provides a pipe-like abstraction
+.\" FIXME Add pointer to veth(4) page when it is eventually completed
that can be used to create tunnels between network namespaces,
and can be used to create a bridge to a physical network device
in another namespace.
specified only by the system boot process (PID 0).
It disappeared in Linux 2.5.16.
.TP
-.B CLONE_PTRACE
+.BR CLONE_PTRACE " (since Linux 2.2)"
If
.B CLONE_PTRACE
is specified, and the calling process is being traced,
(See
.BR set_thread_area (2).)
.TP
-.B CLONE_SIGHAND
+.BR CLONE_SIGHAND " (since Linux 2.0)"
If
.B CLONE_SIGHAND
is set, the calling process and the child process share the same table of
.B CLONE_PTRACE
on this child process.
.TP
-.B CLONE_VFORK
+.BR CLONE_VFORK " (since Linux 2.2)"
If
.B CLONE_VFORK
is set, the execution of the calling process is suspended
after the call, and an application should not rely on execution occurring
in any particular order.
.TP
-.B CLONE_VM
+.BR CLONE_VM " (since Linux 2.0)"
If
.B CLONE_VM
is set, the calling process and the child process run in the same memory
Memory writes or file mappings/unmappings performed by one of the
processes do not affect the other, as with
.BR fork (2).
-.SS "sys_clone"
+.SS sys_clone
The
.B sys_clone
system call corresponds more closely to
.BR fork (2)
in that execution in the child continues from the point of the
call.
-Thus,
-.B sys_clone
-only requires the
-.I flags
+As such, the
+.I fn
and
-.I child_stack
-arguments, which have the same meaning as for
-.BR clone ().
-(Note that the order of these arguments differs from
-.BR clone ().)
+.I arg
+arguments of the
+.BR clone ()
+wrapper function are omitted.
+Furthermore, the argument order changes.
+The raw system call interface is roughly:
+.in +4
+.nf
+
+.BI "long clone(unsigned long " flags ", void *" child_stack ,
+.BI " void *" ptid ", void *" ctid ,
+.BI " struct pt_regs *" regs );
+.fi
+.in
Another difference for
.B sys_clone
is that the
In this case, for correct operation, the
.B CLONE_VM
option should not be specified.
-
+.SS Linux 2.4 and earlier
In Linux 2.4 and earlier,
.BR clone ()
does not take arguments
.IR tls ,
and
.IR ctid .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.\" gettid(2) returns current->pid;
.\" getpid(2) returns current->tgid;
On success, the thread ID of the child process is returned
glibc2 provides
.BR clone ()
as described in this manual page.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The
.BR clone ()
and
.\" See also the following bug reports
.\" https://bugzilla.redhat.com/show_bug.cgi?id=417521
.\" http://sourceware.org/bugzilla/show_bug.cgi?id=6910
-.SH "SEE ALSO"
+.SH EXAMPLE
+.SS Create a child that executes in a separate UTS namespace
+The following program demonstrates the use of
+.BR clone ()
+to create a child process that executes in a separate UTS namespace.
+The child changes the hostname in its UTS namespace.
+Both parent and child then display the system hostname,
+making it possible to see that the hostname
+differs in the UTS namespaces of the parent and child.
+For an example of the use of this program, see
+.BR setns (2).
+
+.nf
+#define _GNU_SOURCE
+#include <sys/wait.h>
+#include <sys/utsname.h>
+#include <sched.h>
+#include <string.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <unistd.h>
+
+#define errExit(msg) do { perror(msg); exit(EXIT_FAILURE); \\
+ } while (0)
+
+static int /* Start function for cloned child */
+childFunc(void *arg)
+{
+ struct utsname uts;
+
+ /* Change hostname in UTS namespace of child */
+
+ if (sethostname(arg, strlen(arg)) == \-1)
+ errExit("sethostname");
+
+ /* Retrieve and display hostname */
+
+ if (uname(&uts) == \-1)
+ errExit("uname");
+ printf("uts.nodename in child: %s\\n", uts.nodename);
+
+ /* Keep the namespace open for a while, by sleeping.
+ This allows some experimentation\-\-for example, another
+ process might join the namespace. */
+
+ sleep(200);
+
+ return 0; /* Child terminates now */
+}
+
+#define STACK_SIZE (1024 * 1024) /* Stack size for cloned child */
+
+int
+main(int argc, char *argv[])
+{
+ char *stack; /* Start of stack buffer */
+ char *stackTop; /* End of stack buffer */
+ pid_t pid;
+ struct utsname uts;
+
+ if (argc < 2) {
+ fprintf(stderr, "Usage: %s <child\-hostname>\\n", argv[0]);
+ exit(EXIT_SUCCESS);
+ }
+
+ /* Allocate stack for child */
+
+ stack = malloc(STACK_SIZE);
+ if (stack == NULL)
+ errExit("malloc");
+ stackTop = stack + STACK_SIZE; /* Assume stack grows downward */
+
+ /* Create child that has its own UTS namespace;
+ child commences execution in childFunc() */
+
+ pid = clone(childFunc, stackTop, CLONE_NEWUTS | SIGCHLD, argv[1]);
+ if (pid == \-1)
+ errExit("clone");
+ printf("clone() returned %ld\\n", (long) pid);
+
+ /* Parent falls through to here */
+
+ sleep(1); /* Give child time to change its hostname */
+
+ /* Display hostname in parent\(aqs UTS namespace. This will be
+ different from hostname in child\(aqs UTS namespace. */
+
+ if (uname(&uts) == \-1)
+ errExit("uname");
+ printf("uts.nodename in parent: %s\\n", uts.nodename);
+
+ if (waitpid(pid, NULL, 0) == \-1) /* Wait for child */
+ errExit("waitpid");
+ printf("child has terminated\\n");
+
+ exit(EXIT_SUCCESS);
+}
+.fi
+.SH SEE ALSO
.BR fork (2),
.BR futex (2),
.BR getpid (2),
.BR gettid (2),
+.BR kcmp (2),
.BR set_thread_area (2),
.BR set_tid_address (2),
+.BR setns (2),
.BR tkill (2),
.BR unshare (2),
.BR wait (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 1992 Drew Eckhardt;
.\" 1993 Michael Haardt, Ian Jackson.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified Wed Jul 21 22:40:25 1993 by Rik Faith <faith@cs.unc.edu>
.\" Modified Sat Feb 18 15:27:48 1995 by Michael Haardt
removed using
.BR unlink (2)
the file is deleted.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR close ()
returns zero on success.
On error, \-1 is returned, and
.TP
.B EIO
An I/O error occurred.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
.\" SVr4 documents an additional ENOLINK error condition.
.SH NOTES
.\" call has restared after ERESTARTSYS, the original system call will
.\" later restart with the reused file descriptor. This is most likely a
.\" serious programming error.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fcntl (2),
.BR fsync (2),
.BR open (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 1993 Rickard E. Faith (faith@cs.unc.edu)
.\" Portions extracted from /usr/include/sys/socket.h, which does not have
.\" any authorship information in it. It is probably available under the GPL.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\"
.\" Other portions are from the 6.9 (Berkeley) 3/10/91 man page:
.\" Copyright (c) 1983 The Regents of the University of California.
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" Modified 1997-01-31 by Eric S. Raymond <esr@thyrsus.com>
.\" Modified 1998, 1999 by Andi Kleen
set to
.BR AF_UNSPEC
(supported on Linux since kernel 2.2).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
If the connection or binding succeeds, zero is returned.
On error, \-1 is returned, and
.I errno
busy to accept new connections.
Note that for IP sockets the timeout may
be very long when syncookies are enabled on the server.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.4BSD, (the
.BR connect ()
function first appeared in 4.2BSD), POSIX.1-2001.
.BR connect ()
is shown in
.BR getaddrinfo (3).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR accept (2),
.BR bind (2),
.BR getsockname (2),
.\" Copyright (C) 1996 Free Software Foundation, Inc.
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" This file is distributed according to the GNU General Public License.
-.\" See the file COPYING in the top level source directory for details.
+.\" %%%LICENSE_END
.\"
.\" 2006-02-09, some reformatting by Luc Van Oostenryck; some
.\" reformatting and rewordings by mtk
.\"
-.TH CREATE_MODULE 2 2007-06-03 "Linux" "Linux Programmer's Manual"
+.TH CREATE_MODULE 2 2012-10-18 "Linux" "Linux Programmer's Manual"
.SH NAME
create_module \- create a loadable module entry
.SH SYNOPSIS
.BI "caddr_t create_module(const char *" name ", size_t " size );
.fi
.SH DESCRIPTION
+.BR Note :
+This system call is present only in kernels before Linux 2.6.
+
.BR create_module ()
attempts to create a loadable module entry and reserve the kernel memory
that will be needed to hold the module.
This system call requires privilege.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, returns the kernel address at which the module will reside.
On error \-1 is returned and
.I errno
.TP
.B ENOSYS
.BR create_module ()
-is not supported in this version of the kernel.
+is not supported in this version of the kernel
+(e.g., the kernel is version 2.6 or later).
.TP
.B EPERM
The caller was not privileged
This system call is only present on Linux up until kernel 2.4;
it was removed in Linux 2.6.
.\" Removed in Linux 2.5.48
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR create_module ()
is Linux-specific.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR delete_module (2),
.BR init_module (2),
.BR query_module (2)
-.\" Copyright (C) 1996 Free Software Foundation, Inc.
-.\" This file is distributed according to the GNU General Public License.
-.\" See the file COPYING in the top level source directory for details.
+.\" Copyright (C) 2012 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
-.\" 2006-02-09, some reformatting by Luc Van Oostenryck; some
-.\" reformatting and rewordings by mtk
+.\" %%%LICENSE_START(VERBATIM)
+.\" Permission is granted to make and distribute verbatim copies of this
+.\" manual provided the copyright notice and this permission notice are
+.\" preserved on all copies.
.\"
-.TH DELETE_MODULE 2 2006-02-09 "Linux" "Linux Programmer's Manual"
+.\" Permission is granted to copy and distribute modified versions of this
+.\" manual under the conditions for verbatim copying, provided that the
+.\" entire resulting derived work is distributed under the terms of a
+.\" permission notice identical to this one.
+.\"
+.\" Since the Linux kernel and libraries are constantly changing, this
+.\" manual page may be incorrect or out-of-date. The author(s) assume no
+.\" responsibility for errors or omissions, or for damages resulting from
+.\" the use of the information contained herein. The author(s) may not
+.\" have taken the same level of care in the production of this manual,
+.\" which is licensed free of charge, as they might when working
+.\" professionally.
+.\"
+.\" Formatted or processed versions of this manual, if unaccompanied by
+.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
+.\"
+.TH DELETE_MODULE 2 2012-11-08 "Linux" "Linux Programmer's Manual"
.SH NAME
-delete_module \- delete a loadable module entry
+delete_module \- unload a kernel module
.SH SYNOPSIS
.nf
-.B #include <linux/module.h>
-.sp
-.BI "int delete_module(const char *" name );
+.BI "int delete_module(const char *" name ", int " flags );
.fi
+
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
.SH DESCRIPTION
+The
.BR delete_module ()
-attempts to remove an unused loadable module entry.
-If
-.I name
-is NULL,
-all unused modules marked auto-clean will be removed.
+system call attempts to remove the unused loadable module entry
+identified by
+.IR name .
+If the module has an
+.I exit
+function, then that function is executed before unloading the module.
+The
+.IR flags
+argument is used to modify the behavior of the system call,
+as described below.
This system call requires privilege.
-.SH "RETURN VALUE"
+
+Module removal is attempted according to the following rules:
+.IP 1. 4
+If there are other loaded modules that depend on
+(i.e., refer to symbols defined in) this module,
+then the call fails.
+.IP 2.
+Otherwise, if the reference count for the module
+(i.e., the number of processes currently using the module)
+is zero, then the module is immediately unloaded.
+.IP 3.
+If a module has a nonzero reference count,
+then the behavior depends on the bits set in
+.IR flags .
+In normal usage (see NOTES), the
+.BR O_NONBLOCK
+flag is always specified, and the
+.BR O_TRUNC
+flag may additionally be specified.
+.\" O_TRUNC == KMOD_REMOVE_FORCE in kmod library
+.\" O_NONBLOCK == KMOD_REMOVE_NOWAIT in kmod library
+
+The various combinations for
+.I flags
+have the following effect:
+.RS 4
+.TP
+.B flags == O_NONBLOCK
+The call returns immediately, with an error.
+.TP
+.B flags == (O_NONBLOCK | O_TRUNC)
+The module is unloaded immediately,
+regardless of whether it has a nonzero reference count.
+.TP
+.B (flags & O_NONBLOCK) == 0
+If
+.I flags
+does not specify
+.BR O_NONBLOCK ,
+the following steps occur:
+.RS
+.IP * 3
+The module is marked so that no new references are permitted.
+.IP *
+If the module's reference count is nonzero,
+the caller is placed in an uninterruptible sleep state
+.RB ( TASK_UNINTERRUPTIBLE )
+until the reference count is zero, at which point the call unblocks.
+.IP *
+The module is unloaded in the usual way.
+.RE
+.RE
+.PP
+The
+.B O_TRUNC
+flag has one further effect on the rules described above.
+By default, if a module has an
+.I init
+function but no
+.I exit
+function, then an attempt to remove the module will fail.
+However, if
+.BR O_TRUNC
+was specified, this requirement is bypassed.
+.PP
+Using the
+.B O_TRUNC
+flag is dangerous!
+If the kernel was not built with
+.BR CONFIG_MODULE_FORCE_UNLOAD ,
+this flag is silently ignored.
+(Normally,
+.BR CONFIG_MODULE_FORCE_UNLOAD
+is enabled.)
+Using this flag taints the kernel (TAINT_FORCED_RMMOD).
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned and
.I errno
.SH ERRORS
.TP
.B EBUSY
-The module is in use.
+The module is not "live"
+(i.e., it is still being initialized or is already marked for removal);
+or, the module has
+an
+.I init
+function but has no
+.I exit
+function, and
+.B O_TRUNC
+was not specified in
+.IR flags .
.TP
.B EFAULT
.I name
-is outside the program's accessible address space.
-.TP
-.B EINVAL
-.I name
-was an empty string.
+refers to a location outside the process's accessible address space.
.TP
.B ENOENT
No module by that name exists.
The caller was not privileged
(did not have the
.B CAP_SYS_MODULE
-capability).
-.SH "CONFORMING TO"
+capability),
+or module unloading is disabled
+(see
+.IR /proc/sys/kernel/modules_disabled
+in
+.BR proc (5)).
+.TP
+.B EWOULDBLOCK
+Other modules depend on this module;
+or,
+.BR O_NONBLOCK
+was specified in
+.IR flags ,
+but the reference count of this module is nonzero and
+.B O_TRUNC
+was not specified in
+.IR flags .
+.SH CONFORMING TO
.BR delete_module ()
is Linux-specific.
-.SH "SEE ALSO"
+.SH NOTES
+Glibc does not provide a wrapper for this system call; call it using
+.BR syscall (2).
+
+The uninterruptible sleep that may occur if
+.BR O_NONBLOCK
+is omitted from
+.IR flags
+is considered undesirable, because the sleeping process is left
+in an unkillable state.
+As at Linux 3.7, specifying
+.BR O_NONBLOCK
+is optional, but in future kernels it is likely to become mandatory.
+.SS Linux 2.4 and earlier
+In Linux 2.4 and earlier, the system call took only one argument:
+
+.BI " int delete_module(const char *" name );
+
+If
+.I name
+is NULL, all unused modules marked auto-clean are removed.
+
+Some further details of differences in the behavior of
+.BR delete_module ()
+in Linux 2.4 and earlier are
+.I not
+currently explained in this manual page.
+.SH SEE ALSO
.BR create_module (2),
.BR init_module (2),
-.BR query_module (2)
+.BR query_module (2),
+.BR lsmod (8),
+.BR modprobe (8),
+.BR rmmod (8)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 1992 Drew Eckhardt;
.\" and Copyright (C) 1993 Michael Haardt, Ian Jackson.
.\" and Copyright (C) 2005, 2008 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified 1993-07-21, Rik Faith <faith@cs.unc.edu>
.\" Modified 1994-08-21, Michael Chastain <mec@shell.portal.com>:
.BR dup3 ()
fails with the error
.BR EINVAL .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these system calls
return the new descriptor.
On error, \-1 is returned, and
was added to Linux in version 2.6.27;
glibc support is available starting with
version 2.9.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR dup (),
.BR dup2 ():
SVr4, 4.3BSD, POSIX.1-2001.
without closing
.I newfd
first.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR close (2),
.BR fcntl (2),
.BR open (2)
-.\"
-.\" epoll by Davide Libenzi ( efficient event notification retrieval )
.\" Copyright (C) 2003 Davide Libenzi
+.\" Davide Libenzi <davidel@xmailserver.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_SW_3_PARA)
.\" This program is free software; you can redistribute it and/or modify
.\" it under the terms of the GNU General Public License as published by
.\" the Free Software Foundation; either version 2 of the License, or
.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
.\" GNU General Public License for more details.
.\"
-.\" You should have received a copy of the GNU General Public License
-.\" along with this program; if not, write to the Free Software
-.\" Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
-.\"
-.\" Davide Libenzi <davidel@xmailserver.org>
+.\" You should have received a copy of the GNU General Public
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified 2004-06-17 by Michael Kerrisk <mtk.manpages@gmail.com>
.\" Modified 2005-04-04 by Marko Kohtala <marko.kohtala@gmail.com>
When all file descriptors referring to an epoll instance have been closed,
the kernel destroys the instance
and releases the associated resources for reuse.
-
.SS epoll_create1()
If
.I flags
flag in
.BR open (2)
for reasons why this may be useful.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
these system calls
return a nonnegative file descriptor.
in order to ensure backward compatibility when new
.B epoll
applications are run on older kernels.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR close (2),
.BR epoll_ctl (2),
.BR epoll_wait (2),
-.\"
-.\" epoll by Davide Libenzi ( efficient event notification retrieval )
.\" Copyright (C) 2003 Davide Libenzi
+.\" Davide Libenzi <davidel@xmailserver.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_SW_3_PARA)
.\" This program is free software; you can redistribute it and/or modify
.\" it under the terms of the GNU General Public License as published by
.\" the Free Software Foundation; either version 2 of the License, or
.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
.\" GNU General Public License for more details.
.\"
-.\" You should have received a copy of the GNU General Public License
-.\" along with this program; if not, write to the Free Software
-.\" Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
-.\"
-.\" Davide Libenzi <davidel@xmailserver.org>
+.\" You should have received a copy of the GNU General Public
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.TH EPOLL_CTL 2 2012-04-15 "Linux" "Linux Programmer's Manual"
.SH NAME
with
.B EPOLL_CTL_MOD
to rearm the file descriptor with a new event mask.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
When successful,
.BR epoll_ctl ()
returns zero.
Applications that need to be portable to kernels before 2.6.9
should specify a non-NULL pointer in
.IR event .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR epoll_create (2),
.BR epoll_wait (2),
.BR poll (2),
-.\"
-.\" epoll by Davide Libenzi ( efficient event notification retrieval )
.\" Copyright (C) 2003 Davide Libenzi
+.\" Davide Libenzi <davidel@xmailserver.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_SW_3_PARA)
.\" This program is free software; you can redistribute it and/or modify
.\" it under the terms of the GNU General Public License as published by
.\" the Free Software Foundation; either version 2 of the License, or
.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
.\" GNU General Public License for more details.
.\"
-.\" You should have received a copy of the GNU General Public License
-.\" along with this program; if not, write to the Free Software
-.\" Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
-.\"
-.\" Davide Libenzi <davidel@xmailserver.org>
+.\" You should have received a copy of the GNU General Public
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 2007-04-30: mtk, Added description of epoll_pwait()
.\"
-.TH EPOLL_WAIT 2 2012-05-02 "Linux" "Linux Programmer's Manual"
+.TH EPOLL_WAIT 2 2012-08-17 "Linux" "Linux Programmer's Manual"
.SH NAME
epoll_wait, epoll_pwait \- wait for an I/O event on an epoll file descriptor
.SH SYNOPSIS
.BR epoll_pwait ()
is equivalent to
.BR epoll_wait ().
-.SH "RETURN VALUE"
+.SH RETURN VALUE
When successful,
.BR epoll_wait ()
returns the number of file descriptors ready for the requested I/O, or zero
it will cause the
.BR epoll_wait ()
call to unblock.
-.SH "SEE ALSO"
+
+For a discussion of what may happen if a file descriptor in an
+.B epoll
+instance being monitored by
+.BR epoll_wait ()
+is closed in another thread, see
+.BR select (2).
+.SH BUGS
+In kernels before 2.6.37, a
+.I timeout
+value larger than approximately
+.I LONG_MAX / HZ
+milliseconds is treated as \-1 (i.e., infinity).
+Thus, for example, on a system where the
+.I sizeof(long)
+is 4 and the kernel
+.I HZ
+value is 1000,
+this means that timeouts greater than 35.79 minutes are treated as infinity.
+.SH SEE ALSO
.BR epoll_create (2),
.BR epoll_ctl (2),
.BR epoll (7)
.\" Copyright (C) 2008 Michael Kerrisk <mtk.manpages@gmail.com>
.\" starting from a version by Davide Libenzi <davidel@xmailserver.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_SW_3_PARA)
.\" This program is free software; you can redistribute it and/or modify
.\" it under the terms of the GNU General Public License as published by
.\" the Free Software Foundation; either version 2 of the License, or
.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
.\" GNU General Public License for more details.
.\"
-.\" You should have received a copy of the GNU General Public License
-.\" along with this program; if not, write to the Free Software
-.\" Foundation, Inc., 59 Temple Place, Suite 330, Boston,
-.\" MA 02111-1307 USA
+.\" You should have received a copy of the GNU General Public
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 2008-10-10, mtk: describe eventfd2(), and EFD_NONBLOCK and EFD_CLOEXEC
.\"
.SH DESCRIPTION
.BR eventfd ()
creates an "eventfd object" that can be used as
-an event wait/notify mechanism by userspace applications,
-and by the kernel to notify userspace applications of events.
+an event wait/notify mechanism by user-space applications,
+and by the kernel to notify user-space applications of events.
The object contains an unsigned 64-bit integer
.RI ( uint64_t )
counter that is maintained by the kernel.
.IP
The eventfd file descriptor also supports the other file-descriptor
multiplexing APIs:
-.BR pselect (2),
-.BR ppoll (2),
+.BR pselect (2)
and
-.BR epoll (7).
+.BR ppoll (2).
.TP
.BR close (2)
When the file descriptor is no longer required it should be closed.
are preserved across
.BR execve (2),
unless the close-on-exec flag has been set.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR eventfd ()
returns a new eventfd file descriptor.
required (versus the two required for a pipe).
When used in the kernel, an eventfd
-file descriptor can provide a kernel-userspace bridge allowing,
+file descriptor can provide a bridge from kernel to user space, allowing,
for example, functionalities like KAIO (kernel AIO)
.\" or eventually syslets/threadlets
to signal to a file descriptor that some operation is complete.
}
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR futex (2),
.BR pipe (2),
.BR poll (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1992 Drew Eckhardt (drew@cs.colorado.edu), March 28, 1992
.\" and Copyright (c) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified by Michael Haardt <michael@moria.de>
.\" Modified 1993-07-21 by Rik Faith <faith@cs.unc.edu>
.\" 2007-09-14 Ollie Wild <aaw@google.com>, mtk
.\" Add text describing limits on command-line arguments + environment
.\"
-.TH EXECVE 2 2012-05-04 "Linux" "Linux Programmer's Manual"
+.TH EXECVE 2 2012-10-27 "Linux" "Linux Programmer's Manual"
.SH NAME
execve \- execute program
.SH SYNOPSIS
.B PR_SET_KEEPCAPS
flag is cleared.
.IP *
+(Since Linux 2.4.36 / 2.6.23)
+If a set-user-ID or set-group-ID program is being executed,
+then the parent death signal set by
+.BR prctl (2)
+.B PR_SET_PDEATHSIG
+flag is cleared.
+.IP *
The process name, as set by
.BR prctl (2)
.B PR_SET_NAME
.IR "ps\ \-o comm" ),
is reset to the name of the new executable file.
.IP *
+The
+.B SECBIT_KEEP_CAPS
+.I securebits
+flag is cleared.
+See
+.BR capabilities (7).
+.IP *
The termination signal is reset to
.B SIGCHLD
(see
.I optional-arg
should either be absent, or be specified as a single word (i.e., it
should not contain white space); see NOTES below.
-.SS "Limits on size of arguments and environment"
+.SS Limits on size of arguments and environment
Most UNIX implementations impose some limit on the total size
of the command-line argument
.RI ( argv )
Additionally, the limit per string is 32 pages (the kernel constant
.BR MAX_ARG_STRLEN ),
and the maximum number of strings is 0x7FFFFFFF.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR execve ()
does not return, on error \-1 is returned, and
.TP
.B ETXTBSY
Executable was open for writing by one or more processes.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
POSIX.1-2001 does not document the #! behavior
but is otherwise compatible.
char *newenviron[] = { NULL };
if (argc != 2) {
- fprintf(stderr, "Usage: %s <file-to-exec>\\n", argv[0]);
+ fprintf(stderr, "Usage: %s <file\-to\-exec>\\n", argv[0]);
exit(EXIT_FAILURE);
}
argv[4]: world
.fi
.in
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR chmod (2),
.BR fork (2),
.BR ptrace (2),
.\" Copyright (C) 2004 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH EXIT_GROUP 2 2008-11-27 "Linux" "Linux Programmer's Manual"
.SH NAME
.BR exit (2)
except that it terminates not only the calling thread, but all threads
in the calling process's thread group.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
This system call does not return.
.SH VERSIONS
This call is present since Linux 2.5.35.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This call is Linux-specific.
.SH NOTES
Since glibc 2.3, this is the system call invoked when the
.BR exit (2)
wrapper function is called.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR exit (2)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 2006, Michael Kerrisk
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\"
+.\" %%%LICENSE_END
.\"
.TH FACCESSAT 2 2012-05-04 "Linux" "Linux Programmer's Manual"
.SH NAME
.I pathname
is a symbolic link, do not dereference it:
instead return information about the link itself.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, (all requested permissions granted)
.BR faccessat ()
returns 0.
.BR faccessat ()
was added to Linux in kernel 2.6.16;
library support was added to glibc in version 2.4.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
.SH NOTES
See
.BR access (2)
and
.BR euidaccess (3).
-.SS Glibc Notes
+.SS Glibc notes
The
.B AT_EACCESS
and
If either of these flags are specified, then the wrapper function employs
.BR fstatat (2)
to determine access permissions.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR access (2),
.BR openat (2),
.BR euidaccess (3),
.\" Copyright (c) 2007 Silicon Graphics, Inc. All Rights Reserved
.\" Written by Dave Chinner <dgc@sgi.com>
+.\"
+.\" %%%LICENSE_START(GPLv2_ONELINE)
.\" May be distributed as per GNU General Public License version 2.
+.\" %%%LICENSE_END
.\"
.\" 2011-09-19: Added FALLOC_FL_PUNCH_HOLE
.\" 2011-09-19: Substantial restructuring of the page
.\"
-.TH FALLOCATE 2 2012-04-23 "Linux" "Linux Programmer's Manual"
+.TH FALLOCATE 2 2013-02-12 "Linux" "Linux Programmer's Manual"
.SH NAME
fallocate \- manipulate file space
.SH SYNOPSIS
.BR fallocate ()
is available on Linux since kernel 2.6.23.
Support is provided by glibc since version 2.10.
+The
+.BR FALLOC_FL_*
+flags are defined in glibc headers only since version 2.18.
+.\" See http://sourceware.org/bugzilla/show_bug.cgi?id=14964
.SH CONFORMING TO
.BR fallocate ()
is Linux-specific.
.SH SEE ALSO
+.BR fallocate (1),
.BR ftruncate (2),
.BR posix_fadvise (3),
.BR posix_fallocate (3)
--- /dev/null
+.so man2/unimplemented.2
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 2006, Michael Kerrisk
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\"
+.\" %%%LICENSE_END
.\"
.TH FCHMODAT 2 2012-05-22 "Linux" "Linux Programmer's Manual"
.SH NAME
is a symbolic link, do not dereference it:
instead operate on the link itself.
This flag is not currently implemented.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR fchmodat ()
returns 0.
.BR fchmodat ()
was added to Linux in kernel 2.6.16;
library support was added to glibc in version 2.4.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
.SH NOTES
See
have a
.I flags
argument.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR chmod (2),
.BR openat (2),
.BR path_resolution (7),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 2006, Michael Kerrisk
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\"
+.\" %%%LICENSE_END
.\"
.TH FCHOWNAT 2 2012-05-04 "Linux" "Linux Programmer's Manual"
.SH NAME
.BR fchownat ()
dereferences symbolic links, like
.BR chown (2).)
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR fchownat ()
returns 0.
.BR fchownat ()
was added to Linux in kernel 2.6.16;
library support was added to glibc in version 2.4.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
A similar system call exists on Solaris.
.SH NOTES
.BR openat (2)
for an explanation of the need for
.BR fchownat ().
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR chown (2),
.BR openat (2),
.BR path_resolution (7),
'\" t
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 1992 Drew Eckhardt;
.\" and Copyright (C) 1993 Michael Haardt, Ian Jackson;
.\" and Copyright (C) 1998 Jamie Lokier;
.\" and Copyright (C) 2002-2010 Michael Kerrisk.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified 1993-07-24 by Rik Faith <faith@cs.unc.edu>
.\" Modified 1995-09-26 by Andries Brouwer <aeb@cwi.nl>
or
.I void
is specified if the argument is not required.
-.SS "Duplicating a file descriptor"
+.SS Duplicating a file descriptor
.TP
.BR F_DUPFD " (\fIint\fP)"
Find the lowest numbered available file descriptor
.B O_CLOEXEC
in
.BR open (2).
-.SS "File descriptor flags"
+.SS File descriptor flags
The following commands manipulate the flags associated with
a file descriptor.
Currently, only one such flag is defined:
.BR F_SETFD " (\fIint\fP)"
Set the file descriptor flags to the value specified by
.IR arg .
-.SS "File status flags"
+.SS File status flags
Each open file description has certain associated status flags,
initialized by
.BR open (2)
.\" FIXME . According to POSIX.1-2001, O_SYNC should also be modifiable
.\" via fcntl(2), but currently Linux does not permit this
.\" See http://bugzilla.kernel.org/show_bug.cgi?id=5994
-.SS "Advisory locking"
+.SS Advisory locking
.BR F_GETLK ", " F_SETLK " and " F_SETLKW
are used to acquire, release, and test for the existence of record
locks (also known as file-segment or file-region locks).
and
.BR write (2)
instead.
-.SS "Mandatory locking"
+.SS Mandatory locking
(Non-POSIX.)
The above record locks may be either advisory or mandatory,
and are advisory by default.
The Linux implementation of mandatory locking is unreliable.
See BUGS below.
-.SS "Managing signals"
+.SS Managing signals
.BR F_GETOWN ,
.BR F_SETOWN ,
.BR F_GETOWN_EX ,
field of this argument will hold the descriptor of the leased file
that has been accessed by another process.
(This is useful if the caller holds leases against multiple files).
-.SS "File and directory change notification (dnotify)"
+.SS File and directory change notification (dnotify)
.TP
.BR F_NOTIFY " (\fIint\fP)"
(Linux 2.4 onward)
file system events.
See
.BR inotify (7).
-.SS "Changing the capacity of a pipe"
+.SS Changing the capacity of a pipe
.TP
.BR F_SETPIPE_SZ " (\fIint\fP; since Linux 2.6.35)"
Change the capacity of the pipe referred to by
.BR F_GETPIPE_SZ " (\fIvoid\fP; since Linux 2.6.35)"
Return (as the function result) the capacity of the pipe referred to by
.IR fd .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
For a successful call, the return value depends on the operation:
.TP 0.9i
.B F_DUPFD
Attempted to clear the
.B O_APPEND
flag on a file that has the append-only attribute set.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
Only the operations
.BR F_DUPFD ,
Similar races exist between mandatory locks and
.BR mmap (2).
It is therefore inadvisable to rely on mandatory locking.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR dup2 (2),
.BR flock (2),
.BR open (2),
.BR lockf (3),
.BR capabilities (7),
.BR feature_test_macros (7)
-.P
-See also
+
.IR locks.txt ,
.IR mandatory-locking.txt ,
and
.I dnotify.txt
-in the kernel source directory
-.IR Documentation/filesystems/ .
-(On older kernels, these files are directly under the
+in the Linux kernel source directory
+.IR Documentation/filesystems/
+(on older kernels, these files are directly under the
.I Documentation/
directory, and
.I mandatory-locking.txt
is called
-.IR mandatory.txt .)
+.IR mandatory.txt )
--- /dev/null
+.so man2/unimplemented.2
--- /dev/null
+.so man2/init_module.2
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 1993 Rickard E. Faith (faith@cs.unc.edu) and
.\" and Copyright 2002 Michael Kerrisk
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\" the use of the information contained herein. The author(s) may not
.\" have taken the same level of care in the production of this manual,
.\" which is licensed free of charge, as they might when working
-
+.\" professionally.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified Fri Jan 31 16:26:07 1997 by Eric S. Raymond <esr@thyrsus.com>
.\" Modified Fri Dec 11 17:57:27 1998 by Jamie Lokier <jamie@imbolc.ucc.ie>
.\"
.\" FIXME: Maybe document LOCK_MAND, LOCK_RW, LOCK_READ, LOCK_WRITE
.\" which only have effect for SAMBA.
-.TH FLOCK 2 2009-07-25 "Linux" "Linux Programmer's Manual"
+.\"
+.TH FLOCK 2 2013-02-11 "Linux" "Linux Programmer's Manual"
.SH NAME
flock \- apply or remove an advisory lock on an open file
.SH SYNOPSIS
A shared or exclusive lock can be placed on a file regardless of the
mode in which the file was opened.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
The file is locked and the
.B LOCK_NB
flag was selected.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.4BSD (the
.BR flock ()
call first appeared in 4.2BSD).
and occurs on many other implementations.)
.\" Kernel 2.5.21 changed things a little: during lock conversion
.\" it is now the highest priority process that will get the lock -- mtk
-.SH "SEE ALSO"
+.SH SEE ALSO
+.BR flock (1),
.BR close (2),
.BR dup (2),
.BR execve (2),
.BR open (2),
.BR lockf (3)
-See also
.I Documentation/filesystem/locks.txt
-in the kernel source
+in the Linux kernel source tree
.RI ( Documentation/locks.txt
-in older kernels).
+in older kernels)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\" A few fragments remain from an earlier (1992) page by
.\" Drew Eckhardt (drew@cs.colorado.edu),
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified by Michael Haardt (michael@moria.de)
.\" Modified Sat Jul 24 13:22:07 1993 by Rik Faith (faith@cs.unc.edu)
.\" Greatly expanded, to describe all attributes that differ
.\" parent and child.
.\"
-.TH FORK 2 2012-05-01 "Linux" "Linux Programmer's Manual"
+.TH FORK 2 2013-03-12 "Linux" "Linux Programmer's Manual"
.SH NAME
fork \- create a child process
.SH SYNOPSIS
setting is reset so that the child does not receive a signal
when its parent terminates.
.IP *
+The default timer slack value is set to the parent's
+current timer slack value.
+See the description of
+.BR PR_SET_TIMERSLACK
+in
+.BR prctl (2).
+.IP *
Memory mappings that have been marked with the
.BR madvise (2)
.B MADV_DONTFORK
.B SIGCHLD
(see
.BR clone (2)).
+.IP *
+The port access permission bits set by
+.BR ioperm (2)
+are not inherited by the child;
+the child must turn on any bits that it requires using
+.BR ioperm (2).
.PP
Note the following further points:
.IP * 3
.I may
share the directory stream positioning;
on Linux/glibc they do not.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, the PID of the child process is returned in the parent,
and 0 is returned in the child.
On failure, \-1 is returned in the parent,
is not supported on this platform (for example,
.\" e.g., arm (optionally), blackfin, c6x, frv, h8300, microblaze, xtensa
hardware without a Memory-Management Unit).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
.SH NOTES
.PP
.BR pipe (2)
and
.BR wait (2).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR clone (2),
.BR execve (2),
+.BR exit (2),
.BR setrlimit (2),
.BR unshare (2),
.BR vfork (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 2006, Michael Kerrisk
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH FSTATAT 2 2012-05-04 "Linux" "Linux Programmer's Manual"
.SH NAME
.BR fstatat ()
dereferences symbolic links, like
.BR stat (2).)
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR fstatat ()
returns 0.
.BR fstatat ()
was added to Linux in kernel 2.6.16;
library support was added to glibc in version 2.4.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
A similar system call exists on Solaris.
.SH NOTES
.BR fstatat ()
wrapper function is actually called
.BR fstatat64 ().
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR openat (2),
.BR stat (2),
.BR path_resolution (7),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 1993 Rickard E. Faith (faith@cs.unc.edu) and
.\" and Copyright 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified 21 Aug 1994 by Michael Chastain <mec@shell.portal.com>:
.\" Removed note about old libc (pre-4.5.26) translating to 'sync'.
It also flushes metadata information associated with the file (see
.BR stat (2)).
-
Calling
.BR fsync ()
does not necessarily ensure
.BR fdatasync ()
is to reduce disk activity for applications that do not
require all metadata to be synchronized with the disk.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these system calls return zero.
On error, \-1 is returned, and
.I errno
.BR EROFS ", " EINVAL
.I fd
is bound to a special file which does not support synchronization.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD, POSIX.1-2001.
.SH AVAILABILITY
On POSIX systems on which
or
.BR sdparm (8)
to guarantee safe operation.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR bdflush (2),
.BR open (2),
.BR sync (2),
-.\" Page by b.hubert - may be freely modified and distributed
+.\" Page by b.hubert
+.\"
+.\" %%%LICENSE_START(FREELY_REDISTRIBUTABLE)
+.\" may be freely modified and distributed
+.\" %%%LICENSE_END
.\"
.\" Niki A. Rahimi (LTC Security Development, narahimi@us.ibm.com)
.\" added ERRORS section.
.\" Modified 2004-06-17 mtk
.\" Modified 2004-10-07 aeb, added FUTEX_REQUEUE, FUTEX_CMP_REQUEUE
.\"
-.\" FIXME See also https://bugzilla.kernel.org/show_bug.cgi?id=14303
+.\" FIXME
+.\" See also https://bugzilla.kernel.org/show_bug.cgi?id=14303
.\" 2.6.14 adds FUTEX_WAKE_OP
+.\" commit 4732efbeb997189d9f9b04708dc26bf8613ed721
+.\" Author: Jakub Jelinek <jakub@redhat.com>
+.\" Date: Tue Sep 6 15:16:25 2005 -0700
+.\"
+.\" FIXME
.\" 2.6.18 adds (Ingo Molnar) priority inheritance support:
.\" FUTEX_LOCK_PI, FUTEX_UNLOCK_PI, and FUTEX_TRYLOCK_PI. These need
.\" to be documented in the manual page. Probably there is sufficient
.\" material in the kernel source file Documentation/pi-futex.txt.
+.\" commit c87e2837be82df479a6bae9f155c43516d2feebc
+.\" Author: Ingo Molnar <mingo@elte.hu>
+.\" Date: Tue Jun 27 02:54:58 2006 -0700
+.\"
+.\" commit e2970f2fb6950183a34e8545faa093eb49d186e1
+.\" Author: Ingo Molnar <mingo@elte.hu>
+.\" Date: Tue Jun 27 02:54:47 2006 -0700
+.\"
+.\" See Documentation/futex-requeue-pi.txt
+.\"
+.\" FIXME
.\" 2.6.25 adds FUTEX_WAKE_BITSET, FUTEX_WAIT_BITSET
+.\" commit cd689985cf49f6ff5c8eddc48d98b9d581d9475d
+.\" Author: Thomas Gleixner <tglx@linutronix.de>
+.\" Date: Fri Feb 1 17:45:14 2008 +0100
+.\"
+.\" FIXME
+.\" 2.6.31 adds FUTEX_WAIT_REQUEUE_PI, FUTEX_CMP_REQUEUE_PI
+.\" commit 52400ba946759af28442dee6265c5c0180ac7122
+.\" Author: Darren Hart <dvhltc@us.ibm.com>
+.\" Date: Fri Apr 3 13:40:49 2009 -0700
+.\"
+.\" commit ba9c22f2c01cf5c88beed5a6b9e07d42e10bd358
+.\" Author: Darren Hart <dvhltc@us.ibm.com>
+.\" Date: Mon Apr 20 22:22:22 2009 -0700
+.\"
+.\" See Documentation/futex-requeue-pi.txt
.\"
-.TH FUTEX 2 2010-08-29 "Linux" "Linux Programmer's Manual"
+.TH FUTEX 2 2013-03-15 "Linux" "Linux Programmer's Manual"
.SH NAME
-futex \- Fast Userspace Locking system call
+futex \- fast user-space locking
.SH SYNOPSIS
.nf
.sp
.BI " int *" uaddr2 ", int " val3 );
.\" int *? void *? u32 *?
.fi
-.SH "DESCRIPTION"
+.SH DESCRIPTION
.PP
The
.BR futex ()
.PP
When a
.BR futex (7)
-operation did not finish uncontended in userspace, a call needs to be made
+operation did not finish uncontended in user space, a call needs to be made
to the kernel to arbitrate.
Arbitration can either mean putting the calling
process to sleep or, conversely, waking a waiting process.
on this futex address.
If the
.I timeout
-argument is non-NULL, its contents describe the maximum
+argument is non-NULL, its contents describe the minimum
duration of the wait, which is infinite otherwise.
The arguments
.I uaddr2
The argument
.I timeout
is ignored.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.PP
-Depending on which operation was executed,
-the returned value for a successful call can have differing meanings.
+In the event of an error, all operations return \-1, and set
+.I errno
+to indicate the error.
+The return value on success depends on the operation,
+as described in the following list:
.TP
.B FUTEX_WAIT
Returns 0 if the process was woken by a
.B FUTEX_WAKE
call.
-In case of timeout,
-the operation fails with the error
-.BR ETIMEDOUT .
-If the futex was not equal to the expected value,
-the operation fails with the error
-.BR EWOULDBLOCK .
-Signals (see
-.BR signal (7))
-or other spurious wakeups cause
-.B FUTEX_WAIT
-to fail with the error
-.BR EINTR .
+See ERRORS for the various possible error returns.
.TP
.B FUTEX_WAKE
Returns the number of processes woken up.
.TP
.B FUTEX_CMP_REQUEUE
Returns the number of processes woken up.
-.PP
-In the event of an error, all operations return \-1, and set
-.I errno
-to indicate the error.
.SH ERRORS
.TP
.B EACCES
.TP
.B EAGAIN
.B FUTEX_CMP_REQUEUE
-found an unexpected futex value.
+detected that the value pointed to by
+.I uaddr
+is not equal to the expected value
+.IR val3 .
(This probably indicates a race;
use the safe
.B FUTEX_WAKE
now.)
.TP
.B EFAULT
-Error in getting
+Error retrieving
.I timeout
-information from userspace.
+information from user space.
+.TP
+.B EINTR
+A
+.B FUTEX_WAIT
+operation was interrupted by a signal (see
+.BR signal (7))
+or a spurious wakeup.
.TP
.B EINVAL
-An operation was not defined or error in page alignment.
+Invalid argument.
.TP
.B ENFILE
The system limit on the total number of open files has been reached.
.B ENOSYS
Invalid operation specified in
.IR op .
-.SH "VERSIONS"
+.TP
+.B ETIMEDOUT
+Timeout during the
+.B FUTEX_WAIT
+operation.
+.TP
+.B EWOULDBLOCK
+.I op
+was
+.BR FUTEX_WAIT
+and the value pointed to by
+.I uaddr
+was not equal to the expected value
+.I val
+at the time of the call.
+.SH VERSIONS
.PP
Initial futex support was merged in Linux 2.5.7 but with different semantics
from what was described above.
was added.
In Linux 2.6.7 a sixth argument was added\(emmessy, especially
on the s390 architecture.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This system call is Linux-specific.
-.SH "NOTES"
+.SH NOTES
.PP
To reiterate, bare futexes are not intended as an easy-to-use abstraction
for end-users.
(There is no wrapper function for this system call in glibc.)
Implementors are expected to be assembly literate and to have
-read the sources of the futex userspace library referenced below.
+read the sources of the futex user-space library referenced below.
.\" .SH "AUTHORS"
.\" .PP
.\" Futexes were designed and worked on by
.\" Matthew Kirkwood, Ingo Molnar (Red Hat)
.\" and Rusty Russell (IBM Linux Technology Center).
.\" This page written by bert hubert.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR futex (7)
.PP
\fIFuss, Futexes and Furwocks: Fast Userlevel Locking in Linux\fP
(proceedings of the Ottawa Linux Symposium 2002), online at
.br
-http://kernel.org/doc/ols/2002/ols2002-pages-479-495.pdf
+.UR http://kernel.org\:/doc\:/ols\:/2002\:/ols2002-pages-479-495.pdf
+.UE
.PP
Futex example library, futex-*.tar.bz2 at
.br
-ftp://ftp.nl.kernel.org/pub/linux/kernel/people/rusty/.
+.UR ftp://ftp.nl.kernel.org\:/pub\:/linux\:/kernel\:/people\:/rusty/
+.UE
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 2006, Michael Kerrisk
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\"
+.\" %%%LICENSE_END
.\"
.TH FUTIMESAT 2 2012-05-10 "Linux" "Linux Programmer's Manual"
.SH NAME
is absolute, then
.I dirfd
is ignored.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR futimesat ()
returns a 0.
.BR futimesat ()
was added to Linux in kernel 2.6.16;
library support was added to glibc in version 2.4.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This system call is nonstandard.
It was implemented from a specification that was proposed for POSIX.1,
but that specification was replaced by the one for
A similar system call exists on Solaris.
.SH NOTES
-.SS Glibc Notes
+.SS Glibc notes
If
.I pathname
is NULL, then the glibc
wrapper function updates the times for the file referred to by
.IR dirfd .
.\" The Solaris futimesat() also has this strangeness.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR stat (2),
.BR utimensat (2),
.BR utimes (2),
.\" Copyright (C) 1996 Free Software Foundation, Inc.
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" This file is distributed according to the GNU General Public License.
-.\" See the file COPYING in the top level source directory for details.
+.\" %%%LICENSE_END
.\"
.\" 2006-02-09, some reformatting by Luc Van Oostenryck; some
.\" reformatting and rewordings by mtk
.\"
-.TH GET_KERNEL_SYMS 2 2007-06-03 "Linux" "Linux Programmer's Manual"
+.TH GET_KERNEL_SYMS 2 2012-10-18 "Linux" "Linux Programmer's Manual"
.SH NAME
get_kernel_syms \- retrieve exported kernel and module symbols
.SH SYNOPSIS
.BI "int get_kernel_syms(struct kernel_sym *" table );
.fi
.SH DESCRIPTION
+.BR Note :
+This system call is present only in kernels before Linux 2.6.
+
If
.I table
is NULL,
The symbols exported from each module follow their magic module tag
and the modules are returned in the reverse of the
order in which they were loaded.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, returns the number of symbols copied to
.IR table .
On error, \-1 is returned and
This system call is only present on Linux up until kernel 2.4;
it was removed in Linux 2.6.
.\" Removed in Linux 2.5.48
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR get_kernel_syms ()
is Linux-specific.
.SH BUGS
.BR query_module (2)
(which is itself nowadays deprecated
in favor of other interfaces described on its manual page).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR create_module (2),
.BR delete_module (2),
.BR init_module (2),
.\" Copyright 2003,2004 Andi Kleen, SuSE Labs.
.\" and Copyright 2007 Lee Schermerhorn, Hewlett Packard
.\"
+.\" %%%LICENSE_START(VERBATIM_PROF)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 2006-02-03, mtk, substantial wording changes and other improvements
.\" 2007-08-27, Lee Schermerhorn <Lee.Schermerhorn@hp.com>
.\"
.TH GET_MEMPOLICY 2 2008-08-15 Linux "Linux Programmer's Manual"
.SH NAME
-get_mempolicy \- Retrieve NUMA memory policy for a process
+get_mempolicy \- retrieve NUMA memory policy for a process
.SH SYNOPSIS
.B "#include <numaif.h>"
.nf
.\" Copyright (C) 2006 Red Hat, Inc. All Rights Reserved.
.\" Written by Ivana Varekova <varekova@redhat.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" FIXME Something could be added to this page (or exit(2))
.\" about exit_robust_list processing
.\"
-.TH GET_ROBUST_LIST 2 2012-05-03 Linux "Linux System Calls"
+.TH GET_ROBUST_LIST 2 2012-07-13 Linux "Linux System Calls"
.SH NAME
get_robust_list, set_robust_list \- get/set list of robust futexes
.SH SYNOPSIS
.BI " size_t *" len_ptr );
.BI "long set_robust_list(struct robust_list_head *" head ", size_t " len );
.fi
+
+.IR Note :
+There are no glibc wrappers for these system calls; see NOTES.
.SH DESCRIPTION
The robust futex implementation needs to maintain per-thread lists of robust
futexes which are unlocked when the thread exits.
.I len
argument should be
.IR sizeof(*head) .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR set_robust_list ()
and
.SH NOTES
These system calls are not needed by normal applications.
No support for them is provided in glibc.
+In the unlikely event that you want to call them directly, use
+.BR syscall (2).
A thread can have only one robust futex list;
therefore applications that wish
to use this functionality should use the robust mutexes provided by glibc.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR futex (2)
.\" .BR pthread_mutexattr_setrobust_np (3)
-.br
-The kernel source files
+
.IR Documentation/robust-futexes.txt
and
-.IR Documentation/robust-futex-ABI.txt .
+.IR Documentation/robust-futex-ABI.txt
+in the Linux kernel source tree
.\" http://lwn.net/Articles/172149/
.\" Copyright (C) 2003 Free Software Foundation, Inc.
+.\" Written by Kent Yoder.
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" This file is distributed according to the GNU General Public License.
-.\" See the file COPYING in the top level source directory for details.
+.\" %%%LICENSE_END
.\"
-.\" Written by Kent Yoder.
-.TH GET_THREAD_AREA 2 2008-11-27 "Linux" "Linux Programmer's Manual"
+.TH GET_THREAD_AREA 2 2012-07-13 "Linux" "Linux Programmer's Manual"
.SH NAME
-get_thread_area \- Get a Thread Local Storage (TLS) area
-.SH "SYNOPSIS"
+get_thread_area \- get a thread-local storage (TLS) area
+.SH SYNOPSIS
.B #include <linux/unistd.h>
.br
.B #include <asm/ldt.h>
.sp
.BI "int get_thread_area(struct user_desc *" u_info );
-.SH "DESCRIPTION"
+
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
+.SH DESCRIPTION
.BR get_thread_area ()
-returns an entry in the current thread's Thread Local Storage (TLS) array.
+returns an entry in the current thread's thread-local storage (TLS) array.
The index of the entry corresponds to the value
of \fIu_info\->entry_number\fP, passed in by the user.
If the value is in bounds,
.BR get_thread_area ()
copies the corresponding
TLS entry into the area pointed to by \fIu_info\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR get_thread_area ()
returns 0 on success.
Otherwise, it returns \-1 and sets
A version of
.BR get_thread_area ()
first appeared in Linux 2.5.32.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR get_thread_area ()
is Linux-specific and should not be used in programs
that are intended to be portable.
.SH NOTES
-Glibc does not provide a wrapper for this system call;
-call it using
+Glibc does not provide a wrapper for this system call,
+since it is generally intended only for use by threading libraries.
+In the unlikely event that you want to call it directly, use
.BR syscall (2).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR modify_ldt (2),
.BR set_thread_area (2)
-.\" Copyright (C) 2001 Andries Brouwer (aeb@cwi.nl)
-.\"
-.\" Permission is granted to make and distribute verbatim copies of this
-.\" manual provided the copyright notice and this permission notice are
-.\" preserved on all copies.
-.\"
-.\" Permission is granted to copy and distribute modified versions of this
-.\" manual under the conditions for verbatim copying, provided that the
-.\" entire resulting derived work is distributed under the terms of a
-.\" permission notice identical to this one.
-.\"
-.\" Since the Linux kernel and libraries are constantly changing, this
-.\" manual page may be incorrect or out-of-date. The author(s) assume no
-.\" responsibility for errors or omissions, or for damages resulting from
-.\" the use of the information contained herein. The author(s) may not
-.\" have taken the same level of care in the production of this manual,
-.\" which is licensed free of charge, as they might when working
-.\" professionally.
-.\"
-.\" Formatted or processed versions of this manual, if unaccompanied by
-.\" the source, must acknowledge the copyright and authors of this work.
-.\"
-.TH GETCONTEXT 2 2009-03-15 "Linux" "Linux Programmer's Manual"
-.SH NAME
-getcontext, setcontext \- get or set the user context
-.SH SYNOPSIS
-.B #include <ucontext.h>
-.sp
-.BI "int getcontext(ucontext_t *" ucp );
-.br
-.BI "int setcontext(const ucontext_t *" ucp );
-.SH DESCRIPTION
-In a System V-like environment, one has the two types
-\fImcontext_t\fP and \fIucontext_t\fP defined in
-.I <ucontext.h>
-and the four functions
-.BR getcontext (),
-.BR setcontext (),
-.BR makecontext (3)
-and
-.BR swapcontext (3)
-that allow user-level context switching between multiple
-threads of control within a process.
-.LP
-The \fImcontext_t\fP type is machine-dependent and opaque.
-The \fIucontext_t\fP type is a structure that has at least
-the following fields:
-.in +4
-.nf
-
-typedef struct ucontext {
- struct ucontext *uc_link;
- sigset_t uc_sigmask;
- stack_t uc_stack;
- mcontext_t uc_mcontext;
- ...
-} ucontext_t;
-
-.fi
-.in
-with \fIsigset_t\fP and \fIstack_t\fP defined in
-.IR <signal.h> .
-Here \fIuc_link\fP points to the context that will be resumed
-when the current context terminates (in case the current context
-was created using
-.BR makecontext (3)),
-\fIuc_sigmask\fP is the
-set of signals blocked in this context (see
-.BR sigprocmask (2)),
-\fIuc_stack\fP is the stack used by this context (see
-.BR sigaltstack (2)),
-and \fIuc_mcontext\fP is the
-machine-specific representation of the saved context,
-that includes the calling thread's machine registers.
-.LP
-The function
-.BR getcontext ()
-initializes the structure
-pointed at by \fIucp\fP to the currently active context.
-.LP
-The function
-.BR setcontext ()
-restores the user context
-pointed at by \fIucp\fP.
-A successful call does not return.
-The context should have been obtained by a call of
-.BR getcontext (),
-or
-.BR makecontext (3),
-or passed as third argument to a signal
-handler.
-.LP
-If the context was obtained by a call of
-.BR getcontext (),
-program execution continues as if this call just returned.
-.LP
-If the context was obtained by a call of
-.BR makecontext (3),
-program execution continues by a call to the function \fIfunc\fP
-specified as the second argument of that call to
-.BR makecontext (3).
-When the function \fIfunc\fP returns, we continue with the
-\fIuc_link\fP member of the structure \fIucp\fP specified as the
-first argument of that call to
-.BR makecontext (3).
-When this member is NULL, the thread exits.
-.LP
-If the context was obtained by a call to a signal handler,
-then old standard text says that "program execution continues with the
-program instruction following the instruction interrupted
-by the signal".
-However, this sentence was removed in SUSv2,
-and the present verdict is "the result is unspecified".
-.SH "RETURN VALUE"
-When successful,
-.BR getcontext ()
-returns 0 and
-.BR setcontext ()
-does not return.
-On error, both return \-1 and set \fIerrno\fP
-appropriately.
-.SH ERRORS
-None defined.
-.SH "CONFORMING TO"
-SUSv2, POSIX.1-2001.
-POSIX.1-2008 removes the specification of
-.BR getcontext (),
-citing portability issues, and
-recommending that applications be rewritten to use POSIX threads instead.
-.SH NOTES
-The earliest incarnation of this mechanism was the
-.BR setjmp (3)/ longjmp (3)
-mechanism.
-Since that does not define
-the handling of the signal context, the next stage was the
-.BR sigsetjmp (3)/ siglongjmp (3)
-pair.
-The present mechanism gives much more control.
-On the other hand,
-there is no easy way to detect whether a return from
-.BR getcontext ()
-is from the first call, or via a
-.BR setcontext ()
-call.
-The user has to invent her own bookkeeping device, and a register
-variable won't do since registers are restored.
-.LP
-When a signal occurs, the current user context is saved and
-a new context is created by the kernel for the signal handler.
-Do not leave the handler using
-.BR longjmp (3):
-it is undefined what would happen with contexts.
-Use
-.BR siglongjmp (3)
-or
-.BR setcontext ()
-instead.
-.SH "SEE ALSO"
-.BR sigaction (2),
-.BR sigaltstack (2),
-.BR sigprocmask (2),
-.BR longjmp (3),
-.BR makecontext (3),
-.BR sigsetjmp (3)
+.so man3/getcontext.3
.\" This man page is Copyright (C) 2006 Andi Kleen <ak@muc.de>.
+.\"
+.\" %%%LICENSE_START(VERBATIM_ONE_PARA)
.\" Permission is granted to distribute possibly modified copies
.\" of this page provided the header is included verbatim,
.\" and in case of nontrivial modification author and date
.\" of the modification is added to the header.
+.\" %%%LICENSE_END
+.\"
.\" 2008, mtk, various edits
-.TH GETCPU 2 2012-05-09 "Linux" "Linux Programmer's Manual"
+.\"
+.TH GETCPU 2 2012-07-13 "Linux" "Linux Programmer's Manual"
.SH NAME
getcpu \- determine CPU and NUMA node on which the calling thread is running
.SH SYNOPSIS
.BI "int getcpu(unsigned *" cpu ", unsigned *" node \
", struct getcpu_cache *" tcache );
.fi
+
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
.SH DESCRIPTION
The
.BR getcpu ()
and
.I node
is no longer current by the time the call returns.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, 0 is returned.
On error, \-1 is returned, and
.I errno
.\" Copyright (C) 1995 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Written 11 June 1995 by Andries Brouwer <aeb@cwi.nl>
.\" Modified 22 July 1995 by Michael Chastain <mec@duracef.shout.net>:
.\" Derived from 'readdir.2'.
.\" Modified Tue Oct 22 08:11:14 EDT 1996 by Eric S. Raymond <esr@thyrsus.com>
-.TH GETDENTS 2 2010-11-21 "Linux" "Linux Programmer's Manual"
+.\"
+.TH GETDENTS 2 2012-08-03 "Linux" "Linux Programmer's Manual"
.SH NAME
getdents \- get directory entries
.SH SYNOPSIS
.BI "int getdents(unsigned int " fd ", struct linux_dirent *" dirp ,
.BI " unsigned int " count );
.fi
+
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
.SH DESCRIPTION
This is not the function you are interested in.
Look at
.IR d_type .
All applications must properly handle a return of
.BR DT_UNKNOWN .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, the number of bytes read is returned.
On end of directory, 0 is returned.
On error, \-1 is returned, and
.TP
.B ENOTDIR
File descriptor does not refer to a directory.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4.
.\" SVr4 documents additional ENOLINK, EIO error conditions.
.SH NOTES
You will need to define the
.I linux_dirent
structure yourself.
+However, you probably want to use
+.BR readdir (3)
+instead.
This call supersedes
.BR readdir (2).
if (nread == 0)
break;
- printf("\--------------- nread=%d ---------------\\n", nread);
+ printf("\-\-\-\-\-\-\-\-\-\-\-\-\-\-\- nread=%d \-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\\n", nread);
printf("i\-node# file type d_reclen d_off d_name\\n");
for (bpos = 0; bpos < nread;) {
d = (struct linux_dirent *) (buf + bpos);
printf("%8ld ", d\->d_ino);
- d_type = *(buf + bpos + d\->d_reclen - 1);
+ d_type = *(buf + bpos + d\->d_reclen \- 1);
printf("%\-10s ", (d_type == DT_REG) ? "regular" :
(d_type == DT_DIR) ? "directory" :
(d_type == DT_FIFO) ? "FIFO" :
(d_type == DT_BLK) ? "block dev" :
(d_type == DT_CHR) ? "char dev" : "???");
printf("%4d %10lld %s\\n", d\->d_reclen,
- (long long) d\->d_off, (char *) d->d_name);
+ (long long) d\->d_off, d\->d_name);
bpos += d\->d_reclen;
}
}
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR readdir (2),
.BR readdir (3)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 1993 Rickard E. Faith (faith@cs.unc.edu)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified 1997-08-25 by Nicolás Lichtmaier <nick@debian.org>
.\" Modified 2004-06-17 by Michael Kerrisk <mtk.manpages@gmail.com>
.\" Modified 2008-11-27 by mtk
.\"
-.TH GETDOMAINNAME 2 2009-09-27 "Linux" "Linux Programmer's Manual"
+.TH GETDOMAINNAME 2 2012-10-25 "Linux" "Linux Programmer's Manual"
.SH NAME
-getdomainname, setdomainname \- get/set domain name
+getdomainname, setdomainname \- get/set NIS domain name
.SH SYNOPSIS
.B #include <unistd.h>
.sp
.RE
.ad
.SH DESCRIPTION
-These functions are used to access or to change the domain name of the
+These functions are used to access or to change the NIS domain name of the
host system.
.BR setdomainname ()
If the null-terminated domain name requires more than \fIlen\fP bytes,
.BR getdomainname ()
returns the first \fIlen\fP bytes (glibc) or gives an error (libc).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
is longer than
.I len
bytes.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX does not specify these calls.
.\" But they appear on most systems...
.SH NOTES
.I domainname
field returned from a call to
.BR uname (2).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR gethostname (2),
.BR sethostname (2),
.BR uname (2)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
-.\" Copyright 1993 Rickard E. Faith (faith@cs.unc.edu)
-.\"
-.\" Permission is granted to make and distribute verbatim copies of this
-.\" manual provided the copyright notice and this permission notice are
-.\" preserved on all copies.
-.\"
-.\" Permission is granted to copy and distribute modified versions of this
-.\" manual under the conditions for verbatim copying, provided that the
-.\" entire resulting derived work is distributed under the terms of a
-.\" permission notice identical to this one.
-.\"
-.\" Since the Linux kernel and libraries are constantly changing, this
-.\" manual page may be incorrect or out-of-date. The author(s) assume no
-.\" responsibility for errors or omissions, or for damages resulting from
-.\" the use of the information contained herein. The author(s) may not
-.\" have taken the same level of care in the production of this manual,
-.\" which is licensed free of charge, as they might when working
-.\" professionally.
-.\"
-.\" Formatted or processed versions of this manual, if unaccompanied by
-.\" the source, must acknowledge the copyright and authors of this work.
-.\"
-.\" Modified 2002-04-15 by Roger Luethi <rl@hellgate.ch> and aeb
-.\"
-.TH GETDTABLESIZE 2 2010-09-20 "Linux" "Linux Programmer's Manual"
-.SH NAME
-getdtablesize \- get descriptor table size
-.SH SYNOPSIS
-.B #include <unistd.h>
-.sp
-.B int getdtablesize(void);
-.sp
-.in -4n
-Feature Test Macro Requirements for glibc (see
-.BR feature_test_macros (7)):
-.in
-.sp
-.BR getdtablesize ():
-.ad l
-.RS 4
-.PD 0
-.TP 4
-Since glibc 2.12:
-.nf
-_BSD_SOURCE ||
- !(_POSIX_C_SOURCE\ >=\ 200112L || _XOPEN_SOURCE\ >=\ 600)
-.TP 4
-.fi
-Before glibc 2.12:
-_BSD_SOURCE || _XOPEN_SOURCE\ >=\ 500 ||
-_XOPEN_SOURCE\ &&\ _XOPEN_SOURCE_EXTENDED
-.PD
-.RE
-.ad b
-.SH DESCRIPTION
-.BR getdtablesize ()
-returns the maximum number of files a process can have open,
-one more than the largest possible value for a file descriptor.
-.SH "RETURN VALUE"
-The current limit on the number of open files per process.
-.SH ERRORS
-On Linux,
-.BR getdtablesize ()
-can return any of the errors described for
-.BR getrlimit (2);
-see NOTES below.
-.SH "CONFORMING TO"
-SVr4, 4.4BSD (the
-.BR getdtablesize ()
-function first appeared in 4.2BSD).
-It is not specified in POSIX.1-2001;
-portable applications should employ
-.I sysconf(_SC_OPEN_MAX)
-instead of this call.
-.SH NOTES
-.BR getdtablesize ()
-is implemented as a libc library function.
-The glibc version calls
-.BR getrlimit (2)
-and returns the current
-.B RLIMIT_NOFILE
-limit, or
-.B OPEN_MAX
-when that fails.
-The libc4 and libc5 versions return
-.B OPEN_MAX
-(set to 256 since Linux 0.98.4).
-.SH "SEE ALSO"
-.BR close (2),
-.BR dup (2),
-.BR getrlimit (2),
-.BR open (2)
+.\" Created 2013-02-05; will eventually be removed
+.so man3/getdtablesize.3
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 1993 Rickard E. Faith (faith@cs.unc.edu)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH GETGID 2 2010-11-22 "Linux" "Linux Programmer's Manual"
.SH NAME
returns the effective group ID of the calling process.
.SH ERRORS
These functions are always successful.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001, 4.3BSD.
.SH NOTES
The original Linux
and
.BR getegid ()
wrapper functions transparently deal with the variations across kernel versions.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getresgid (2),
.BR setgid (2),
.BR setregid (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 1993 Rickard E. Faith (faith@cs.unc.edu)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified Thu Oct 31 12:04:29 1996 by Eric S. Raymond <esr@thyrsus.com>
.\" Modified, 27 May 2004, Michael Kerrisk <mtk.manpages@gmail.com>
argument specifies the number of supplementary group IDs
in the buffer pointed to by
.IR list .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR getgroups ()
returns the number of supplementary group IDs.
.TP
.B EPERM
The calling process has insufficient privilege.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD.
The
.BR getgroups ()
The glibc
.BR getgroups ()
wrapper function transparently deals with the variation across kernel versions.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getgid (2),
.BR setgid (2),
.BR getgrouplist (3),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 1993 Rickard E. Faith (faith@cs.unc.edu)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified 1995-07-22 by Michael Chastain <mec@duracef.shout.net>:
.\" 'gethostname' is real system call on Linux/Alpha.
POSIX.1-2001 says that if such truncation occurs,
then it is unspecified whether the returned buffer
includes a terminating null byte.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
the caller did not have the
.B CAP_SYS_ADMIN
capability.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.4BSD (these interfaces first appeared in 4.2BSD).
POSIX.1-2001 specifies
.BR gethostname ()
.B HOST_NAME_MAX
is defined with the value 64, which has been the limit since Linux 1.0
(earlier kernels imposed a limit of 8 bytes).
-.SS Glibc Notes
+.SS Glibc notes
The GNU C library does not employ the
.BR gethostname ()
system call; instead, it implements
.I errno
set to
.BR ENAMETOOLONG .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getdomainname (2),
.BR setdomainname (2),
.BR uname (2)
.\" Copyright 7/93 by Darren Senn <sinster@scintilla.santa-clara.ca.us>
.\" Based on a similar page Copyright 1992 by Rick Faith
+.\"
+.\" %%%LICENSE_START(FREELY_REDISTRIBUTABLE)
.\" May be freely distributed
+.\" %%%LICENSE_END
+.\"
.\" Modified Tue Oct 22 00:22:35 EDT 1996 by Eric S. Raymond <esr@thyrsus.com>
.\" 2005-04-06 mtk, Matthias Lang <matthias@corelatus.se>
.\" Noted MAX_SEC_IN_JIFFIES ceiling
-.TH GETITIMER 2 2009-03-15 "Linux" "Linux Programmer's Manual"
+.\"
+.TH GETITIMER 2 2012-10-01 "Linux" "Linux Programmer's Manual"
.SH NAME
getitimer, setitimer \- get or set value of an interval timer
.SH SYNOPSIS
};
struct timeval {
- long tv_sec; /* seconds */
- long tv_usec; /* microseconds */
+ time_t tv_sec; /* seconds */
+ suseconds_t tv_usec; /* microseconds */
};
.fi
.in
the signal will be delivered immediately when generated.
Otherwise the
delivery will be offset by a small time dependent on the system loading.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
fields in the structure pointed to by
.I new_value
contains a value outside the range 0 to 999999.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001, SVr4, 4.4BSD (this call first appeared in 4.2BSD).
POSIX.1-2008 marks
.BR getitimer ()
and
.BR usleep (3)
unspecified.
+
+The standards are silent on the meaning of the call:
+
+ setitimer(which, NULL, &old_value);
+
+Many systems (Solaris, the BSDs, and perhaps others)
+treat this as equivalent to:
+
+ getitimer(which, &old_value);
+
+In Linux, this is treated as being equivalent to a call in which the
+.I new_value
+fields are zero; that is, the timer is disabled.
+.IR "Don't use this Linux misfeature" :
+it is nonportable and unnecessary.
.SH BUGS
The generation and delivery of a signal are distinct, and
only one instance of each of the signals listed above may be pending
.\" Bugzilla report 25 Apr 2006:
.\" http://bugzilla.kernel.org/show_bug.cgi?id=6443
.\" "setitimer() should reject noncanonical arguments"
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR gettimeofday (2),
.BR sigaction (2),
.BR signal (2),
--- /dev/null
+.so man2/unimplemented.2
.\" Copyright (C) 2001 Andries Brouwer <aeb@cwi.nl>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH GETPAGESIZE 2 2010-11-16 "Linux" "Linux Programmer's Manual"
.SH NAME
.BR getpagesize ()
returns a statically derived value, and does not use a system call.
Things are OK in glibc 2.1.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mmap (2),
.BR sysconf (3)
.\" Copyright (c) 1983, 1991 The Regents of the University of California.
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)getpeername.2 6.5 (Berkeley) 3/10/91
.\"
.\" Modified 17 Jul 2002, Michael Kerrisk <mtk.manpages@gmail.com>
.\" Added 'socket' to NAME, so that "man -k socket" will show this page.
.\"
-.TH GETPEERNAME 2 2008-12-03 "Linux" "Linux Programmer's Manual"
+.TH GETPEERNAME 2 2013-02-12 "Linux" "Linux Programmer's Manual"
.SH NAME
getpeername \- get name of connected peer socket
.SH SYNOPSIS
in this case,
.I addrlen
will return a value greater than was supplied to the call.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
The argument
.I sockfd
is a file, not a socket.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.4BSD (the
.BR getpeername ()
function call first appeared in 4.2BSD), POSIX.1-2001.
also used by glibc.
See also
.BR accept (2).
-.SH "SEE ALSO"
+
+For stream sockets, once a
+.BR connect (2)
+has been performed, either socket can call
+.BR getpeername ()
+to obtain the address of the peer socket.
+On the other hand, datagram sockets are connectionless.
+Calling
+.BR connect (2)
+on a datagram socket merely sets the peer address for outgoing
+datagrams sent with
+.BR write (2)
+or
+.BR recv (2).
+The caller of
+.BR connect (2)
+can use
+.BR getpeername ()
+to obtain the peer address that it earlier set for the socket.
+However, the peer socket is unaware of this information, and calling
+.BR getpeername ()
+on the peer socket will return no useful information (unless a
+.BR connect (2)
+call was also executed on the peer).
+Note also that the receiver of a datagram can obtain
+the address of the sender when using
+.BR recvfrom (2).
+.SH SEE ALSO
.BR accept (2),
.BR bind (2),
.BR getsockname (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 1993 Rickard E. Faith (faith@cs.unc.edu)
+.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
+.\"
.TH GETPID 2 2008-09-23 "Linux" "Linux Programmer's Manual"
.SH NAME
getpid, getppid \- get process identification
returns the process ID of the parent of the calling process.
.SH ERRORS
These functions are always successful.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001, 4.3BSD, SVr4.
.SH NOTES
Since glibc version 2.3.4,
may return the wrong value even when invoking
.BR clone (2)
via the glibc wrapper function.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR clone (2),
.BR fork (2),
.BR kill (2),
.\" Copyright (c) 1980, 1991 The Regents of the University of California.
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)getpriority.2 6.9 (Berkeley) 3/10/91
.\"
.\" FIXME Oct 2008: Denys Vlasenko is working on a PRIO_THREAD feature that
.\" is likely to get included in mainline; this will need to be documented.
.\"
-.TH GETPRIORITY 2 2008-05-29 "Linux" "Linux Programmer's Manual"
+.TH GETPRIORITY 2 2013-02-12 "Linux" "Linux Programmer's Manual"
.SH NAME
getpriority, setpriority \- get/set program scheduling priority
.SH SYNOPSIS
call sets the priorities of all of the specified processes
to the specified value.
Only the superuser may lower priorities.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
Since
.BR getpriority ()
can legitimately return the value \-1, it is necessary
.B CAP_SYS_NICE
capability).
But see NOTES below.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.4BSD (these function calls first appeared in 4.2BSD),
POSIX.1-2001.
.SH NOTES
.I struct timeval
defined in
.IR <sys/time.h> .)
-.SH "SEE ALSO"
+.SH BUGS
+According to POSIX, the nice value is a per-process setting.
+However, under the current Linux/NPTL implementation of POSIX threads,
+the nice value is a per-thread attribute:
+different threads in the same process can have different nice values.
+Portable applications should avoid relying on the Linux behavior,
+which may be made standards conformant in the future.
+.SH SEE ALSO
.BR nice (1),
.BR renice (1),
.BR fork (2),
.BR capabilities (7)
-.sp
+
.I Documentation/scheduler/sched-nice-design.txt
-in the kernel source tree (since Linux 2.6.23).
+in the Linux kernel source tree (since Linux 2.6.23)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 1997 Andries Brouwer (aeb@cwi.nl)
.\" and Copyright (c) 2007, Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified, 2003-05-26, Michael Kerrisk, <mtk.manpages@gmail.com>
+.\"
.TH GETRESUID 2 2010-11-22 "Linux" "Linux Programmer's Manual"
.SH NAME
getresuid, getresgid \- get real, effective and saved user/group IDs
respectively.
.BR getresgid ()
performs the analogous task for the process's group IDs.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
provided
.B _GNU_SOURCE
is defined.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These calls are nonstandard;
they also appear on HP-UX and some of the BSDs.
.SH NOTES
and
.BR getresgid ()
wrapper functions transparently deal with the variations across kernel versions.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getuid (2),
.BR setresuid (2),
.BR setreuid (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1992 Drew Eckhardt, March 28, 1992
.\" and Copyright (c) 2002, 2004, 2005, 2008, 2010 Michael Kerrisk
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified by Michael Haardt <michael@moria.de>
.\" Modified 1993-07-23 by Rik Faith <faith@cs.unc.edu>
.\" 2008-05-07, mtk / Peter Zijlstra, Added description of RLIMIT_RTTIME
.\" 2010-11-06, mtk: Added documentation of prlimit()
.\"
-.TH GETRLIMIT 2 2011-09-10 "Linux" "Linux Programmer's Manual"
+.TH GETRLIMIT 2 2013-02-11 "Linux" "Linux Programmer's Manual"
.SH NAME
getrlimit, setrlimit, prlimit \- get/set resource limits
.SH SYNOPSIS
The shell's resource limits are inherited by the processes that
it creates to execute commands.
+Since Linux 2.6.24, the resource limits of any process can be inspected via
+.IR /proc/[pid]/limits ;
+see
+.BR proc (5).
+
Ancient systems provided a
.BR vlimit ()
function with a similar purpose to
.BR vlimit ().
All new applications should be written using
.BR setrlimit ().
+.SH BUGS
+.\" FIXME prlimit() does not suffer
+.\" https://bugzilla.kernel.org/show_bug.cgi?id=5042
+.\" http://sources.redhat.com/bugzilla/show_bug.cgi?id=12201
+.\" Since versions 2.13, glibc has library implementations of
+.\" getrlimit() and setrlimit() that use prlimit() to work around
+.\" this bug.
+In older Linux kernels, the
+.B SIGXCPU
+and
+.B SIGKILL
+signals delivered when a process encountered the soft and hard
+.B RLIMIT_CPU
+limits were delivered one (CPU) second later than they should have been.
+This was fixed in kernel 2.6.8.
+
+In 2.6.x kernels before 2.6.17, a
+.B RLIMIT_CPU
+limit of 0 is wrongly treated as "no limit" (like
+.BR RLIM_INFINITY ).
+Since Linux 2.6.17, setting a limit of 0 does have an effect,
+but is actually treated as a limit of 1 second.
+.\" see http://marc.theaimsgroup.com/?l=linux-kernel&m=114008066530167&w=2
+
+A kernel bug means that
+.\" See https://lwn.net/Articles/145008/
+.B RLIMIT_RTPRIO
+does not work in kernel 2.6.12; the problem is fixed in kernel 2.6.13.
+
+In kernel 2.6.12, there was an off-by-one mismatch
+between the priority ranges returned by
+.BR getpriority (2)
+and
+.BR RLIMIT_NICE .
+This had the effect that the actual ceiling for the nice value
+was calculated as
+.IR "19\ \-\ rlim_cur" .
+This was fixed in kernel 2.6.13.
+.\" see http://marc.theaimsgroup.com/?l=linux-kernel&m=112256338703880&w=2
+
+Since Linux 2.6.12,
+.\" The relevant patch, sent to LKML, seems to be
+.\" http://thread.gmane.org/gmane.linux.kernel/273462
+.\" From: Roland McGrath <roland <at> redhat.com>
+.\" Subject: [PATCH 7/7] make RLIMIT_CPU/SIGXCPU per-process
+.\" Date: 2005-01-23 23:27:46 GMT
+if a process reaches its soft
+.BR RLIMIT_CPU
+limit and has a handler installed for
+.BR SIGXCPU ,
+then, in addition to invoking the signal handler,
+the kernel increases the soft limit by one second.
+This behavior repeats if the process continues to consume CPU time,
+until the hard limit is reached,
+at which point the process is killed.
+Other implementations
+.\" Tested Solaris 10, FreeBSD 9, OpenBSD 5.0
+do not change the
+.BR RLIMIT_CPU
+soft limit in this manner,
+and the Linux behavior is probably not standards conformant;
+portable applications should avoid relying on this Linux-specific behavior.
+.\" FIXME https://bugzilla.kernel.org/show_bug.cgi?id=50951
+The Linux-specific
+.BR RLIMIT_RTTIME
+limit exhibits the same behavior when the soft limit is encountered.
+
+Kernels before 2.4.22 did not diagnose the error
+.B EINVAL
+for
+.BR setrlimit ()
+when
+.I rlim\->rlim_cur
+was greater than
+.IR rlim\->rlim_max .
.SH EXAMPLE
The program below demonstrates the use of
.BR prlimit ().
exit(EXIT_FAILURE);
}
.fi
-.SH BUGS
-.\" FIXME prlimit() does not suffer
-.\" https://bugzilla.kernel.org/show_bug.cgi?id=5042
-.\" http://sources.redhat.com/bugzilla/show_bug.cgi?id=12201
-In older Linux kernels, the
-.B SIGXCPU
-and
-.B SIGKILL
-signals delivered when a process encountered the soft and hard
-.B RLIMIT_CPU
-limits were delivered one (CPU) second later than they should have been.
-This was fixed in kernel 2.6.8.
-
-In 2.6.x kernels before 2.6.17, a
-.B RLIMIT_CPU
-limit of 0 is wrongly treated as "no limit" (like
-.BR RLIM_INFINITY ).
-Since Linux 2.6.17, setting a limit of 0 does have an effect,
-but is actually treated as a limit of 1 second.
-.\" see http://marc.theaimsgroup.com/?l=linux-kernel&m=114008066530167&w=2
-
-A kernel bug means that
-.B RLIMIT_RTPRIO
-does not work in kernel 2.6.12; the problem is fixed in kernel 2.6.13.
-
-In kernel 2.6.12, there was an off-by-one mismatch
-between the priority ranges returned by
-.BR getpriority (2)
-and
-.BR RLIMIT_NICE .
-This had the effect that the actual ceiling for the nice value
-was calculated as
-.IR "19\ \-\ rlim_cur" .
-This was fixed in kernel 2.6.13.
-.\" see http://marc.theaimsgroup.com/?l=linux-kernel&m=112256338703880&w=2
-
-Kernels before 2.4.22 did not diagnose the error
-.B EINVAL
-for
-.BR setrlimit ()
-when
-.I rlim\->rlim_cur
-was greater than
-.IR rlim\->rlim_max .
-.SH "SEE ALSO"
+.SH SEE ALSO
+.BR prlimit (1),
.BR dup (2),
.BR fcntl (2),
.BR fork (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1992 Drew Eckhardt, March 28, 1992
.\" and Copyright (c) 2002 Michael Kerrisk
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 2004-11-16 -- mtk: the getrlimit.2 page, which formerly included
.\" coverage of getrusage(2), has been split, so that the latter is
priority process becoming runnable or because the current process
exceeded its time slice.
.PP
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.B EINVAL
.I who
is invalid.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD.
POSIX.1-2001 specifies
.BR getrusage (),
.IR /proc/PID/stat
in
.BR proc (5).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR clock_gettime (2),
.BR getrlimit (2),
.BR times (2),
.\" Copyright (C) 1996 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Thu Oct 31 14:18:40 1996 by Eric S. Raymond <esr@y\thyrsus.com>
.\" Modified 2001-12-17, aeb
This system call is available on Linux since version 2.0.
.\" Linux has this system call since Linux 1.3.44.
.\" There is libc support since libc 5.2.19.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001.
.SH NOTES
Linux does not return
.BR EPERM .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getpgid (2),
.BR setsid (2),
.BR credentials (7)
.\" Copyright (c) 1983, 1991 The Regents of the University of California.
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)getsockname.2 6.4 (Berkeley) 3/10/91
.\"
in this case,
.I addrlen
will return a value greater than was supplied to the call.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
The argument
.I sockfd
is a file, not a socket.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.4BSD (the
.BR getsockname ()
function call appeared in 4.2BSD), POSIX.1-2001.
also used by glibc.
See also
.BR accept (2).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR bind (2),
.BR socket (2),
.BR getifaddrs (3),
.\" Copyright (c) 1983, 1991 The Regents of the University of California.
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" $Id: getsockopt.2,v 1.1 1999/05/24 14:57:04 freitag Exp $
.\"
For a description of the available socket options see
.BR socket (7)
and the appropriate protocol man pages.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
The argument
.I sockfd
is a file, not a socket.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.4BSD (these system calls first appeared in 4.2BSD),
POSIX.1-2001.
.\" SVr4 documents additional ENOMEM and ENOSR error codes, but does
.SH BUGS
Several of the socket options should be handled at lower levels of the
system.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ioctl (2),
.BR socket (2),
.BR getprotoent (3),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 2003 Abhijit Menon-Sen <ams@wiw.org>
.\" and Copyright (C) 2008 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH GETTID 2 2008-04-14 "Linux" "Linux Programmer's Manual"
+.TH GETTID 2 2013-02-04 "Linux" "Linux Programmer's Manual"
.SH NAME
gettid \- get thread identification
.SH SYNOPSIS
.sp
.B pid_t gettid(void);
.fi
+
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
.SH DESCRIPTION
.BR gettid ()
returns the caller's thread ID (TID).
.BR CLONE_THREAD
in
.BR clone (2).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, returns the thread ID of the calling process.
.SH ERRORS
This call is always successful.
The
.BR gettid ()
system call first appeared on Linux in kernel 2.4.11.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR gettid ()
is Linux-specific and should not be used in programs that
are intended to be portable.
The thread ID returned by this call is not the same thing as a
POSIX thread ID (i.e., the opaque value returned by
.BR pthread_self (3)).
-.SH "SEE ALSO"
+.SH SEE ALSO
+.BR capget (2),
.BR clone (2),
+.BR fcntl (2),
.BR fork (2),
-.BR getpid (2)
+.BR get_robust_list (2),
+.BR getpid (2),
+.\" .BR kcmp (2),
+.BR ioprio_set (2),
+.\" .BR move_pages (2),
+.\" .BR migrate_pages (2),
+.BR perf_event_open (2),
+.\" .BR process_vm_readv (2),
+.\" .BR ptrace (2),
+.BR sched_setaffinity (2),
+.BR sched_setparam (2),
+.BR sched_setscheduler (2),
+.BR timer_create (2),
+.BR tgkill (2)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1992 Drew Eckhardt (drew@cs.colorado.edu), March 28, 1992
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified by Michael Haardt (michael@moria.de)
.\" Modified 1993-07-23 by Rik Faith (faith@cs.unc.edu)
or
.I tz
is NULL, the corresponding structure is not set or returned.
+.\" FIXME The compilation warning looks to be going away in 2.17
+.\" see glibc commit 4b7634a5e03b0da6f8875de9d3f74c1cf6f2a6e8
(However, compilation warnings will result if
.I tv
is NULL.)
is on local time, and that it has to be incremented by this amount
to get UTC system time.
No doubt it is a bad idea to use this feature.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR gettimeofday ()
and
.BR settimeofday ()
under Linux the
.B CAP_SYS_TIME
capability is required.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD.
POSIX.1-2001 describes
.BR gettimeofday ()
instead.
.SH NOTES
The time returned by
-.BR gettimeofday (2)
+.BR gettimeofday ()
.I is
affected by discontinuous jumps in the system time
(e.g., if the system administrator manually changes the system time).
decisions.
So this method of representing timezones
has been abandoned.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR date (1),
.BR adjtimex (2),
.BR clock_gettime (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 1993 Rickard E. Faith (faith@cs.unc.edu)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Historical remark, aeb, 2004-06-05
.TH GETUID 2 2010-11-22 "Linux" "Linux Programmer's Manual"
returns the effective user ID of the calling process.
.SH ERRORS
These functions are always successful.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001, 4.3BSD.
.SH NOTES
.SS History
.BR getuid ()
and
.BR geteuid ().
-.SH NOTES
+
The original Linux
.BR getuid ()
and
and
.BR geteuid ()
wrapper functions transparently deal with the variations across kernel versions.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getresuid (2),
.BR setreuid (2),
.BR setuid (2),
--- /dev/null
+.\" Copyright (C) 2006 Red Hat, Inc. All Rights Reserved.
+.\" Written by Marcela Maslanova <mmaslano@redhat.com>
+.\" and Copyright 2013, Michael kerrisk <mtk.manpages@gmail.com>
+.\"
+.\" %%%LICENSE_START(VERBATIM)
+.\" Permission is granted to make and distribute verbatim copies of this
+.\" manual provided the copyright notice and this permission notice are
+.\" preserved on all copies.
+.\"
+.\" Permission is granted to copy and distribute modified versions of this
+.\" manual under the conditions for verbatim copying, provided that the
+.\" entire resulting derived work is distributed under the terms of a
+.\" permission notice identical to this one.
+.\"
+.\" Since the Linux kernel and libraries are constantly changing, this
+.\" manual page may be incorrect or out-of-date. The author(s) assume no
+.\" responsibility for errors or omissions, or for damages resulting from
+.\" the use of the information contained herein. The author(s) may not
+.\" have taken the same level of care in the production of this manual,
+.\" which is licensed free of charge, as they might when working
+.\" professionally.
+.\"
+.\" Formatted or processed versions of this manual, if unaccompanied by
+.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
+.\"
+.TH GETUNWIND 2 2013-02-13 Linux "Linux Programmer's Manual"
+.SH NAME
+getunwind \- copy the unwind data to caller's buffer
+.SH SYNOPSIS
+.nf
+.B #include <syscall.h>
+.B #include <linux/unwind.h>
+.sp
+.BI "long getunwind(void " *buf ", size_t " buf_size );
+.fi
+
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
+.SH DESCRIPTION
+.I Note: this function is obsolete.
+
+The
+IA-64-specific
+.BR getunwind ()
+system call copies the kernel's call frame
+unwind data into the buffer pointed to by
+.I buf
+and returns the size of the unwind data;
+this data describes the gate page (kernel code that
+is mapped into user space).
+
+The size of the buffer
+.I buf
+is specified in
+.IR buf_size .
+The data is copied only if
+.I buf_size
+is greater than or equal to the size of the unwind data and
+.I buf
+is not NULL;
+otherwise, no data is copied, and the call succeeds,
+returning the size that would be needed to store the unwind data.
+
+The first part of the unwind data contains an unwind table.
+The rest contains the associated unwind information, in no particular order.
+The unwind table contains entries of the following form:
+
+.nf
+ u64 start; (64-bit address of start of function)
+ u64 end; (64-bit address of end of function)
+ u64 info; (BUF-relative offset to unwind info)
+.fi
+
+An entry whose
+.I start
+value is zero indicates the end of the table.
+For more information about the format, see the
+.I IA-64 Software Conventions and Runtime Architecture
+manual.
+.SH RETURN VALUE
+On success,
+.BR getunwind ()
+returns the size of unwind table.
+On error, \-1 is returned and
+.I errno
+is set to indicate the error.
+.SH ERRORS
+.BR getunwind ()
+fails with the error
+.B EFAULT
+if the unwind info can't be stored in the space specified by
+.IR buf .
+.SH VERSIONS
+This system call is available since Linux 2.4.
+.SH CONFORMING TO
+This system call is Linux specific,
+and is available only on the IA-64 architecture.
+.SH NOTES
+This system call has been deprecated.
+The modern way to obtain the kernel's unwind data is via the gate DSO.
+The address of the ELF header for this DSO
+is passed to user level via
+.BR AT_SYSINFO_EHDR
+(see
+.BR getauxval (3)).
+
+Glibc does not provide a wrapper for this system call;
+in the unlikely event that you want to call it, use
+.BR syscall (2).
+.SH SEE ALSO
+.BR getauxval (3)
-.\"
-.\" Extended attributes system calls manual pages
-.\"
.\" Copyright (C) Andreas Gruenbacher, February 2001
.\" Copyright (C) Silicon Graphics Inc, September 2001
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
-.TH GETXATTR 2 2001-12-01 "Linux" "Linux Programmer's Manual"
+.TH GETXATTR 2 2013-01-19 "Linux" "Linux Programmer's Manual"
.SH NAME
getxattr, lgetxattr, fgetxattr \- retrieve an extended attribute value
.SH SYNOPSIS
On failure, \-1 is returned and
.I errno
is set appropriately.
-.PP
-If the named attribute does not exist, or the process has no access to
-this attribute,
-.I errno
-is set to
-.BR ENOATTR .
-.PP
-If the
+.SH ERRORS
+.TP
+.B ENOATTR
+The named attribute does not exist, or the process has no access to
+this attribute.
+.RB ( ENOATTR
+is defined to be a synonym for
+.BR ENODATA
+in
+.IR <attr/xattr.h> .)
+.TP
+.B ENOTSUP
+Extended attributes are not supported by the file system, or are disabled.
+.TP
+.B ERANGE
+The
.I size
of the
.I value
-buffer is too small to hold the result,
-.I errno
-is set to
-.BR ERANGE .
-.PP
-If extended attributes are not supported by the file system, or are disabled,
-.I errno
-is set to
-.BR ENOTSUP .
+buffer is too small to hold the result.
.PP
-The errors documented for the
+In addition, the errors documented in
.BR stat (2)
-system call are also applicable here.
+can also occur.
.SH VERSIONS
These system calls have been available on Linux since kernel 2.4;
glibc support is provided since version 2.3.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These system calls are Linux-specific.
.\" .SH AUTHORS
.\" Andreas Gruenbacher,
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 1993 Rickard E. Faith (faith@cs.unc.edu)
.\" Portions extracted from linux/mm/swap.c:
.\" Copyright (C) 1991, 1992 Linus Torvalds
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified 21 Aug 1994 by Michael Chastain <mec@shell.portal.com>:
.\" Added text about calling restriction (new in kernel 1.1.20 I believe).
.\" N.B. calling "idle" from user process used to hang process!
.\" Modified Thu Oct 31 14:41:15 1996 by Eric S. Raymond <esr@thyrsus.com>
.\" "
-.TH IDLE 2 1994-08-21 "Linux" "Linux Programmer's Manual"
+.TH IDLE 2 2012-12-31 "Linux" "Linux Programmer's Manual"
.SH NAME
idle \- make process 0 idle
.SH SYNOPSIS
Any user process, even a process with superuser permission,
will receive
.BR EPERM .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR idle ()
never returns for process 0, and always returns \-1 for a user process.
.SH ERRORS
.B EPERM
Always, for a user process.
.SH VERSIONS
-Since 2.3.13 this system call does not exist anymore.
-.SH "CONFORMING TO"
+Since Linux 2.3.13, this system call does not exist anymore.
+.SH CONFORMING TO
This function is Linux-specific, and should not be used in programs
intended to be portable.
+.\" Copyright (C) 2012 Michael Kerrisk <mtk.manpages@gmail.com>
+.\" A few fragments remain from a version
.\" Copyright (C) 1996 Free Software Foundation, Inc.
-.\" This file is distributed according to the GNU General Public License.
-.\" See the file COPYING in the top level source directory for details.
.\"
-.\" 2006-02-09, some reformatting by Luc Van Oostenryck; some
-.\" reformatting and rewordings by mtk
+.\" %%%LICENSE_START(VERBATIM)
+.\" Permission is granted to make and distribute verbatim copies of this
+.\" manual provided the copyright notice and this permission notice are
+.\" preserved on all copies.
.\"
-.TH INIT_MODULE 2 2006-02-09 "Linux" "Linux Programmer's Manual"
+.\" Permission is granted to copy and distribute modified versions of this
+.\" manual under the conditions for verbatim copying, provided that the
+.\" entire resulting derived work is distributed under the terms of a
+.\" permission notice identical to this one.
+.\"
+.\" Since the Linux kernel and libraries are constantly changing, this
+.\" manual page may be incorrect or out-of-date. The author(s) assume no
+.\" responsibility for errors or omissions, or for damages resulting from
+.\" the use of the information contained herein. The author(s) may not
+.\" have taken the same level of care in the production of this manual,
+.\" which is licensed free of charge, as they might when working
+.\" professionally.
+.\"
+.\" Formatted or processed versions of this manual, if unaccompanied by
+.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
+.\"
+.TH INIT_MODULE 2 2013-01-07 "Linux" "Linux Programmer's Manual"
.SH NAME
-init_module \- initialize a loadable module entry
+init_module, finit_module \- load a kernel module
.SH SYNOPSIS
.nf
-.B #include <linux/module.h>
-.sp
-.BI "int init_module(const char *" name ", struct module *" image );
+.BI "int init_module(void *" module_image ", unsigned long " len ,
+.BI " const char *" param_values );
+
+.BI "int finit_module(int " fd ", const char *" param_values ,
+.BI " int " flags );
.fi
+
+.IR Note :
+There are no glibc wrappers for these system calls; see NOTES.
.SH DESCRIPTION
.BR init_module ()
-loads the relocated module image into kernel space and runs the
-module's
+loads an ELF image into kernel space,
+performs any necessary symbol relocations,
+initializes module parameters to values provided by the caller,
+and then runs the module's
+.I init
+function.
+This system call requires privilege.
+
+The
+.I module_image
+argument points to a buffer containing the binary image
+to be loaded;
+.I len
+specifies the size of that buffer.
+The module image should be a valid ELF image, built for the running kernel.
+
+The
+.I param_values
+argument is a string containing space-delimited specifications of the
+values for module parameters (defined inside the module using
+.BR module_param ()
+and
+.BR module_param_array ()).
+The kernel parses this string and initializes the specified
+parameters.
+Each of the parameter specifications has the form:
+
+.RI " " name [\c
+.BI = value\c
+.RB [ ,\c
+.IR value ...]]
+
+The parameter
+.I name
+is one of those defined within the module using
+.IR module_param ()
+(see the Linux kernel source file
+.IR include/linux/moduleparam.h ).
+The parameter
+.I value
+is optional in the case of
+.I bool
+and
+.I invbool
+parameters.
+Values for array parameters are specified as a comma-separated list.
+.SS finit_module()
+The
+.BR finit_module ()
+.\" commit 34e1169d996ab148490c01b65b4ee371cf8ffba2
+.\" https://lwn.net/Articles/519010/
+system call is like
+.BR init_module (),
+but reads the module to be loaded from the file descriptor
+.IR fd .
+It is useful when the authenticity of a kernel module
+can be determined from its location in the file system;
+in cases where that is possible,
+the overhead of using cryptographically signed modules to
+determine the authenticity of a module can be avoided.
+The
+.I param_values
+argument is as for
+.BR init_module ().
+
+The
+.I flags
+argument modifies the operation of
+.BR finit_module ().
+It is a bit mask value created by ORing
+together zero or more of the following flags:
+.\" commit 2f3238aebedb243804f58d62d57244edec4149b2
+.TP
+.B MODULE_INIT_IGNORE_MODVERSIONS
+Ignore symbol version hashes.
+.TP
+.B MODULE_INIT_IGNORE_VERMAGIC
+Ignore kernel version magic.
+.PP
+There are some safety checks built into a module to ensure that
+it matches the kernel against which it is loaded.
+.\" http://www.tldp.org/HOWTO/Module-HOWTO/basekerncompat.html
+.\" is dated, but informative
+These checks are recorded when the module is built and
+verified when the module is loaded.
+First, the module records a "vermagic" string containing
+the kernel version number and prominent features (such as the CPU type).
+Second, if the module was built with the
+.B CONFIG_MODVERSIONS
+configuration option enabled,
+a version hash is recorded for each symbol the module uses.
+This hash is based on the types of the arguments and return value
+for the function named by the symbol.
+In this case, the kernel version number within the
+"vermagic" string is ignored,
+as the symbol version hashes are assumed to be sufficiently reliable.
+
+Using the
+.B MODULE_INIT_IGNORE_VERMAGIC
+flag indicates that the "vermagic" string is to be ignored, and the
+.B MODULE_INIT_IGNORE_MODVERSIONS
+flag indicates that the symbol version hashes are to be ignored.
+If the kernel is built to permit forced loading (i.e., configured with
+.BR CONFIG_MODULE_FORCE_LOAD ),
+then loading will continue, otherwise it will fail with
+.B ENOEXEC
+as expected for malformed modules.
+.SH RETURN VALUE
+On success, these system calls return 0.
+On error, \-1 is returned and
+.I errno
+is set appropriately.
+.SH ERRORS
+.TP
+.BR EBADMSG " (since Linux 3.7)"
+Module signature is misformatted.
+.TP
+.B EBUSY
+Timeout while trying to resolve a symbol reference by this module.
+.TP
+.B EFAULT
+An address argument referred to a location that
+is outside the process's accessible address space.
+.TP
+.BR ENOKEY " (since Linux 3.7)"
+.\" commit 48ba2462ace6072741fd8d0058207d630ce93bf1
+.\" commit 1d0059f3a468825b5fc5405c636a2f6e02707ffa
+.\" commit 106a4ee258d14818467829bf0e12aeae14c16cd7
+Module signature is invalid or
+the kernel does not have a key for this module.
+This error is returned only if the kernel was configured with
+.BR CONFIG_MODULE_SIG_FORCE ;
+if the kernel was not configured with this option,
+then an invalid or unsigned module simply taints the kernel.
+.TP
+.B ENOMEM
+Out of memory.
+.TP
+.B EPERM
+The caller was not privileged
+(did not have the
+.B CAP_SYS_MODULE
+capability),
+or module loading is disabled
+(see
+.IR /proc/sys/kernel/modules_disabled
+in
+.BR proc (5)).
+.PP
+The following errors may additionally occur for
+.BR init_module ():
+.TP
+.B EEXIST
+A module with this name is already loaded.
+.TP
+.B EINVAL
+.I param_values
+is invalid, or some part of the ELF image in
+.IR module_image
+contains inconsistencies.
+.\" .TP
+.\" .BR EINVAL " (Linux 2.4 and earlier)"
+.\" Some
+.\" .I image
+.\" slot is filled in incorrectly,
+.\" .I image\->name
+.\" does not correspond to the original module name, some
+.\" .I image\->deps
+.\" entry does not correspond to a loaded module,
+.\" or some other similar inconsistency.
+.TP
+.B ENOEXEC
+The binary image supplied in
+.I module_image
+is not an ELF image,
+or is an ELF image that is invalid or for a different architecture.
+.PP
+The following errors may additionally occur for
+.BR finit_module ():
+.TP
+.B EBADF
+The file referred to by
+.I fd
+is not opened for reading.
+.TP
+.B EFBIG
+The file referred to by
+.I fd
+is too large.
+.TP
+.B EINVAL
+.I flags
+is invalid.
+.TP
+.B ENOEXEC
+.I fd
+does not refer to an open file.
+.PP
+In addition to the above errors, if the module's
+.I init
+function is executed and returns an error, then
+.BR init_module ()
+or
+.BR finit_module ()
+fails and
+.I errno
+is set to the value returned by the
.I init
function.
+.SH VERSIONS
+.B finit_module ()
+is available since Linux 3.8.
+.SH CONFORMING TO
+.BR init_module ()
+and
+.BR finit_module ()
+are Linux-specific.
+.SH NOTES
+Glibc does not provide a wrapper for these system calls; call them using
+.BR syscall (2).
+
+Information about currently loaded modules can be found in
+.IR /proc/modules
+and in the file trees under the per-module subdirectories under
+.IR /sys/module .
+
+See the Linux kernel source file
+.I include/linux/module.h
+for some useful background information.
+.SS Linux 2.4 and earlier
+.PP
+In Linux 2.4 and earlier, the
+.BR init_module ()
+system call was rather different:
+
+.B " #include <linux/module.h>"
+
+.BI " int init_module(const char *" name ", struct module *" image );
+
+(User-space applications can detect which version of
+.BR init_module ()
+is available by calling
+.BR query_module ();
+the latter call fails with the error
+.BR ENOSYS
+on Linux 2.6 and later.)
+
+The older version of the system call
+loads the relocated module image pointed to by
+.I image
+into kernel space and runs the module's
+.I init
+function.
+The caller is responsible for providing the relocated image (since
+Linux 2.6, the
+.BR init_module ()
+system call does the relocation).
.PP
The module image begins with a module structure and is followed by
code and data as appropriate.
-The module structure is defined as follows:
+Since Linux 2.2, the module structure is defined as follows:
.PP
.in +4n
.nf
are expected to point within the module body and be
initialized as appropriate for kernel space, that is, relocated with
the rest of the module.
-.PP
-This system call requires privilege.
-.SH "RETURN VALUE"
-On success, zero is returned.
-On error, \-1 is returned and
-.I errno
-is set appropriately.
-.SH ERRORS
-.TP
-.B EBUSY
-The module's initialization routine failed.
-.TP
-.B EFAULT
-.I name
-or
-.I image
-is outside the program's accessible address space.
-.TP
-.B EINVAL
-Some
-.I image
-slot is filled in incorrectly,
-.I image\->name
-does not correspond to the original module name, some
-.I image\->deps
-entry does not correspond to a loaded module,
-or some other similar inconsistency.
-.TP
-.B ENOENT
-No module by that name exists.
-.TP
-.B EPERM
-The caller was not privileged
-(did not have the
-.B CAP_SYS_MODULE
-capability).
-.SH "CONFORMING TO"
-.BR init_module ()
-is Linux-specific.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR create_module (2),
.BR delete_module (2),
-.BR query_module (2)
+.BR query_module (2),
+.BR lsmod (8),
+.BR modprobe (8)
-.\" man2/inotify_add_watch.2 - inotify_add_watch man page
-.\"
.\" Copyright (C) 2005 Robert Love
.\" and Copyright, 2006 Michael Kerrisk
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 2005-07-19 Robert Love <rlove@rlove.org> - initial version
.\" 2006-02-07 mtk, various changes
indicating file system events;
the watch descriptor inside this structure identifies
the object for which the event occurred.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR inotify_add_watch ()
returns a nonnegative watch descriptor.
kernel failed to allocate a needed resource.
.SH VERSIONS
Inotify was merged into the 2.6.13 Linux kernel.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This system call is Linux-specific.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR inotify_init (2),
.BR inotify_rm_watch (2),
.BR inotify (7)
-.\" man2/inotify_init.2 - inotify_init man page
-.\"
.\" Copyright (C) 2005 Robert Love
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 2005-07-19 Robert Love <rlove@rlove.org> - initial version
.\" 2006-02-07 mtk, minor changes
flag in
.BR open (2)
for reasons why this may be useful.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these system calls return a new file descriptor.
On error, \-1 is returned, and
.I errno
Insufficient kernel memory is available.
.SH VERSIONS
.BR inotify_init ()
-first appeared in Linux 2.6.1;
+first appeared in Linux 2.6.13;
library support was added to glibc in version 2.4.
.BR inotify_init1 ()
was added in Linux 2.6.27;
library support was added to glibc in version 2.9.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These system calls are Linux-specific.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR inotify_add_watch (2),
.BR inotify_rm_watch (2),
.BR inotify (7)
-.\" man2/inotify_rm_watch.2 - inotify_rm_watch man page
-.\"
.\" Copyright (C) 2005 Robert Love
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 2005-07-19 Robert Love <rlove@rlove.org> - initial version
.\" 2006-02-07 mtk, minor changes
event to be generated for this watch descriptor.
(See
.BR inotify (7).)
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR inotify_rm_watch ()
returns zero, or \-1 if an error occurred (in which case,
is not an inotify file descriptor.
.SH VERSIONS
Inotify was merged into the 2.6.13 Linux kernel.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This system call is Linux-specific.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR inotify_add_watch (2),
.BR inotify_init (2),
.BR inotify (7)
.\" Copyright (C) 2007 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 2007-10-23 mtk: moved the _syscallN specific material to the
.\" new _syscall(2) page, and substantially enhanced and rewrote
.\"
.TH INTRO 2 2010-11-11 "Linux" "Linux Programmer's Manual"
.SH NAME
-intro \- Introduction to system calls
+intro \- introduction to system calls
.SH DESCRIPTION
Section 2 of the manual describes the Linux system calls.
A system call is an entry point into the Linux kernel.
In such cases, the required macro is described in the man page.
For further information on feature test macros, see
.BR feature_test_macros (7).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
Certain terms and abbreviations are used to indicate UNIX variants
and standards to which calls in this section conform.
See
.BR standards (7).
.SH NOTES
-.SS "Calling Directly"
+.SS Calling directly
In most cases, it is unnecessary to invoke a system call directly,
but there are times when the Standard C library does not implement
a nice wrapper function for you.
Historically, this was also possible using one of the _syscall macros
described in
.BR _syscall (2).
-.SS Authors and Copyright Conditions
+.SS Authors and copyright conditions
Look at the header of the manual page source for the author(s) and copyright
conditions.
Note that these can be different from page to page!
-.SH "SEE ALSO"
+.SH SEE ALSO
.ad l
.nh
.BR _syscall (2),
.\" Copyright (C) 2003 Free Software Foundation, Inc.
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" This file is distributed according to the GNU General Public License.
-.\" See the file COPYING in the top level source directory for details.
+.\" %%%LICENSE_END
.\"
-.TH IO_CANCEL 2 2012-05-08 "Linux" "Linux Programmer's Manual"
+.TH IO_CANCEL 2 2012-07-13 "Linux" "Linux Programmer's Manual"
.SH NAME
io_cancel \- cancel an outstanding asynchronous I/O operation
-.SH "SYNOPSIS"
+.SH SYNOPSIS
.nf
.BR "#include <linux/aio_abi.h>" " /* Defines needed types */"
.BI "int io_cancel(aio_context_t " ctx_id ", struct iocb *" iocb ,
.BI " struct io_event *" result );
.fi
-.SH "DESCRIPTION"
+
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
+.SH DESCRIPTION
.PP
The
.BR io_cancel ()
If the AIO context is found, the event will be canceled and then copied
into the memory pointed to by \fIresult\fP without being placed
into the completion queue.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR io_cancel ()
returns 0.
For the failure return, see NOTES.
-.SH "ERRORS"
+.SH ERRORS
.TP
.B EAGAIN
The \fIiocb\fP specified was not canceled.
.B ENOSYS
.BR io_cancel ()
is not implemented on this architecture.
-.SH "VERSIONS"
+.SH VERSIONS
.PP
The asynchronous I/O system calls first appeared in Linux 2.5.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.PP
.BR io_cancel ()
is Linux-specific and should not be used
indicating an error: \-1, with
.I errno
set to a (positive) value that indicates the error.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR io_destroy (2),
.BR io_getevents (2),
.BR io_setup (2),
.\" Copyright (C) 2003 Free Software Foundation, Inc.
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" This file is distributed according to the GNU General Public License.
-.\" See the file COPYING in the top level source directory for details.
+.\" %%%LICENSE_END
.\"
-.\" ..
-.TH IO_DESTROY 2 2012-05-08 "Linux" "Linux Programmer's Manual"
+.TH IO_DESTROY 2 2012-07-13 "Linux" "Linux Programmer's Manual"
.SH NAME
io_destroy \- destroy an asynchronous I/O context
-.SH "SYNOPSIS"
+.SH SYNOPSIS
.nf
.BR "#include <linux/aio_abi.h>" " /* Defines needed types */"
.BI "int io_destroy(aio_context_t " ctx_id );
.fi
-.SH "DESCRIPTION"
+
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
+.SH DESCRIPTION
.PP
The
.BR io_destroy ()
I/O contexts and then destroys it.
It can also cancel any outstanding asynchronous I/O
actions on \fIctx_id\fP and block on completion.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR io_destroy ()
returns 0.
For the failure return, see NOTES.
-.SH "ERRORS"
+.SH ERRORS
.TP
.B EFAULT
The context pointed to is invalid.
.B ENOSYS
.BR io_destroy ()
is not implemented on this architecture.
-.SH "VERSIONS"
+.SH VERSIONS
.PP
The asynchronous I/O system calls first appeared in Linux 2.5.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.PP
.BR io_destroy ()
is Linux-specific and should not be used in programs
indicating an error: \-1, with
.I errno
set to a (positive) value that indicates the error.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR io_cancel (2),
.BR io_getevents (2),
.BR io_setup (2),
.\" Copyright (C) 2003 Free Software Foundation, Inc.
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" This file is distributed according to the GNU General Public License.
-.\" See the file COPYING in the top level source directory for details.
+.\" %%%LICENSE_END
.\"
-.TH IO_GETEVENTS 2 2012-05-08 "Linux" "Linux Programmer's Manual"
+.TH IO_GETEVENTS 2 2012-11-11 "Linux" "Linux Programmer's Manual"
.SH NAME
io_getevents \- read asynchronous I/O events from the completion queue
-.SH "SYNOPSIS"
+.SH SYNOPSIS
.nf
.BR "#include <linux/aio_abi.h>" " /* Defines needed types */"
.BR "#include <linux/time.h>" " /* Defines 'struct timespec' */"
-.sp
.BI "int io_getevents(aio_context_t " ctx_id ", long " min_nr ", long " nr ,
.BI " struct io_event *" events \
", struct timespec *" timeout );
.fi
-.SH "DESCRIPTION"
+
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
+.SH DESCRIPTION
.PP
The
.BR io_getevents ()
have been seen.
Note that \fItimeout\fP is relative and will be updated if not NULL
and the operation blocks.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR io_getevents ()
returns the number of events read: 0 if no events are
available, or less than \fImin_nr\fP if the \fItimeout\fP has elapsed.
For the failure return, see NOTES.
-.SH "ERRORS"
+.SH ERRORS
.TP
.B EFAULT
Either \fIevents\fP or \fItimeout\fP is an invalid pointer.
.B ENOSYS
.BR io_getevents ()
is not implemented on this architecture.
-.SH "VERSIONS"
+.SH VERSIONS
.PP
The asynchronous I/O system calls first appeared in Linux 2.5.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.PP
.BR io_getevents ()
is Linux-specific and should not be used in
indicating an error: \-1, with
.I errno
set to a (positive) value that indicates the error.
-.SH "SEE ALSO"
+.SH BUGS
+An invalid
+.IR ctx_id
+may cause a segmentation fault instead of genenerating the error
+.BR EINVAL .
+.SH SEE ALSO
.PP
.BR io_cancel (2),
.BR io_destroy (2),
.\" Copyright (C) 2003 Free Software Foundation, Inc.
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" This file is distributed according to the GNU General Public License.
-.\" See the file COPYING in the top level source directory for details.
+.\" %%%LICENSE_END
.\"
-.TH IO_SETUP 2 2012-05-08 "Linux" "Linux Programmer's Manual"
+.TH IO_SETUP 2 2012-07-13 "Linux" "Linux Programmer's Manual"
.SH NAME
io_setup \- create an asynchronous I/O context
-.SH "SYNOPSIS"
+.SH SYNOPSIS
.nf
.BR "#include <linux/aio_abi.h>" " /* Defines needed types */"
.BI "int io_setup(unsigned " nr_events ", aio_context_t *" ctx_idp );
.fi
-.SH "DESCRIPTION"
+
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
+.SH DESCRIPTION
.PP
The
.BR io_setup ()
be initialized to 0 prior to the call.
On successful creation of the AIO context, \fI*ctx_idp\fP is filled in
with the resulting handle.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR io_setup ()
returns 0.
For the failure return, see NOTES.
-.SH "ERRORS"
+.SH ERRORS
.TP
.B EAGAIN
The specified \fInr_events\fP exceeds the user's limit of available events.
.B ENOSYS
.BR io_setup ()
is not implemented on this architecture.
-.SH "VERSIONS"
+.SH VERSIONS
.PP
The asynchronous I/O system calls first appeared in Linux 2.5.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.PP
.BR io_setup ()
is Linux-specific and should not be used in programs
indicating an error: \-1, with
.I errno
set to a (positive) value that indicates the error.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR io_cancel (2),
.BR io_destroy (2),
.BR io_getevents (2),
.\" Copyright (C) 2003 Free Software Foundation, Inc.
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" This file is distributed according to the GNU General Public License.
-.\" See the file COPYING in the top level source directory for details.
+.\" %%%LICENSE_END
.\"
-.TH IO_SUBMIT 2 2012-05-08 "Linux" "Linux Programmer's Manual"
+.TH IO_SUBMIT 2 2012-07-13 "Linux" "Linux Programmer's Manual"
.SH NAME
io_submit \- submit asynchronous I/O blocks for processing
-.SH "SYNOPSIS"
+.SH SYNOPSIS
.nf
.BR "#include <linux/aio_abi.h>" " /* Defines needed types */"
.BI "int io_submit(aio_context_t " ctx_id ", long " nr \
", struct iocb **" iocbpp );
.fi
-.SH "DESCRIPTION"
+
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
+.SH DESCRIPTION
.PP
The
.BR io_submit ()
.I iocbpp
argument should be an array of \fInr\fP AIO control blocks,
which will be submitted to context \fIctx_id\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR io_submit ()
returns the number of \fIiocb\fPs submitted (which may be
0 if \fInr\fP is zero).
For the failure return, see NOTES.
-.SH "ERRORS"
+.SH ERRORS
.TP
.B EAGAIN
Insufficient resources are available to queue any \fIiocb\fPs.
.B ENOSYS
.BR io_submit ()
is not implemented on this architecture.
-.SH "VERSIONS"
+.SH VERSIONS
.PP
The asynchronous I/O system calls first appeared in Linux 2.5.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.PP
.BR io_submit ()
is Linux-specific and should not be used in
indicating an error: \-1, with
.I errno
set to a (positive) value that indicates the error.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR io_cancel (2),
.BR io_destroy (2),
.BR io_getevents (2),
.\" Copyright (c) 1980, 1991 Regents of the University of California.
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)ioctl.2 6.4 (Berkeley) 3/10/91
.\"
.I request
are located in the file
.IR <sys/ioctl.h> .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
Usually, on success zero is returned.
A few
.BR ioctl ()
by giving it the
.B O_NONBLOCK
flag.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR execve (2),
.BR fcntl (2),
.BR ioctl_list (2),
-.\" Ioctl List 1.3.27
-.\" Sun 17 Sep 1995
+.\" Ioctl List 1.3.27 is copyright 1995 by Michael Elizabeth Chastain.
.\" Michael Elizabeth Chastain
.\" <mec@duracef.shout.net>
.\"
-.\" // Copyright
-.\"
-.\" Ioctl List 1.3.27 is copyright 1995 by Michael Elizabeth Chastain.
+.\" %%%LICENSE_START(GPLv2_MISC)
.\" It is licensed under the Gnu Public License, Version 2.
+.\" %%%LICENSE_END
+.\"
+.\" Ioctl List 1.3.27
+.\" Sun 17 Sep 1995
+.\"
+.\" // Copyright
.\"
.\"
.\"
separate section.
.PP
This list is very incomplete.
-.SS "ioctl structure"
+.SS ioctl structure
.\" added two sections - aeb
Ioctl command values are 32-bit constants.
In principle these constants are completely arbitrary, but people have
Thus, it seems that the new structure only gave disadvantages:
it does not help in checking, but it causes varying values
for the various architectures.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
Decent ioctls return 0 on success and \-1 on error, while
any output value is stored via the argument.
However,
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1993 Michael Haardt
.\" (michael@moria.de)
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Sat Jul 24 15:12:05 1993 by Rik Faith <faith@cs.unc.edu>
.\" Modified Tue Aug 1 16:27 1995 by Jochen Karrer
.\" Modified, 27 May 2004, Michael Kerrisk <mtk.manpages@gmail.com>
.\" Added notes on capability requirements
.\"
-.TH IOPERM 2 2007-06-15 "Linux" "Linux Programmer's Manual"
+.TH IOPERM 2 2013-03-12 "Linux" "Linux Programmer's Manual"
.SH NAME
ioperm \- set port input/output permissions
.SH SYNOPSIS
.BI "int ioperm(unsigned long " from ", unsigned long " num ", int " turn_on );
.SH DESCRIPTION
.BR ioperm ()
-sets the port access permission bits for the calling process for
-\fInum\fP bytes starting from port address \fIfrom\fP to the value
-\fIturn_on\fP.
-If \fIturn_on\fP is nonzero, the calling process must be privileged
+sets the port access permission bits for the calling thread for
+.I num
+bits starting from port address
+.IR from .
+If
+.I turn_on
+is nonzero, then permission for the specified bits is enabled;
+otherwise it is disabled.
+If
+.I turn_on
+is nonzero, the calling thread must be privileged
.RB ( CAP_SYS_RAWIO ).
-.\" FIXME is the following ("Only the first 0x3ff I/O ports can be
-.\" specified in this manner") still true? Looking at changes in
-.\" include/asm-i386/processor.h between 2.4 and 2.6 suggests
-.\" that the limit is different in 2.6.
-Only the first 0x3ff I/O ports can be specified in this manner.
+Before Linux 2.6.8,
+only the first 0x3ff I/O ports could be specified in this manner.
For more ports, the
.BR iopl (2)
-system call must be used.
+system call had to be used (with a
+.I level
+argument of 3).
+Since Linux 2.6.8, 65,536 I/O ports can be specified.
Permissions are not inherited by the child created by
-.BR fork (2).
+.BR fork (2);
+following a
+.BR fork (2)
+the child must turn on those permissions that it needs.
Permissions are preserved across
.BR execve (2);
this is useful for giving port access permissions to unprivileged
This call is mostly for the i386 architecture.
On many other architectures it does not exist or will always
return an error.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
Out of memory.
.TP
.B EPERM
-The calling process has insufficient privilege.
-.SH "CONFORMING TO"
+The calling thread has insufficient privilege.
+.SH CONFORMING TO
.BR ioperm ()
is Linux-specific and should not be used in programs
intended to be portable.
.SH NOTES
+The
+.I /proc/ioports
+file shows the I/O ports that are currently allocated on the system.
+
Libc5 treats it as a system call and has a prototype in
.IR <unistd.h> .
Glibc1 does not have a prototype.
and in
.IR <sys/perm.h> .
Avoid the latter, it is available on i386 only.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR iopl (2),
+.BR outb (2),
.BR capabilities (7)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 1993 Rickard E. Faith (faith@cs.unc.edu)
.\" Portions extracted from linux/kernel/ioport.c (no copyright notice).
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified Tue Aug 1 16:47 1995 by Jochen Karrer
.\" <cip307@cip.physik.uni-wuerzburg.de>
.\" Modified, 27 May 2004, Michael Kerrisk <mtk.manpages@gmail.com>
.\" Added notes on capability requirements
.\"
-.TH IOPL 2 2004-05-27 "Linux" "Linux Programmer's Manual"
+.TH IOPL 2 2013-03-15 "Linux" "Linux Programmer's Manual"
.SH NAME
iopl \- change I/O privilege level
.SH SYNOPSIS
.BI "int iopl(int " level );
.SH DESCRIPTION
.BR iopl ()
-changes the I/O privilege level of the calling process, as specified in
+changes the I/O privilege level of the calling process,
+as specified by the two least significant bits in
.IR level .
This call is necessary to allow 8514-compatible X servers to run under
This call is mostly for the i386 architecture.
On many other architectures it does not exist or will always
return an error.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.BR iopl ();
the
.B CAP_SYS_RAWIO
-capability is required.
-.SH "CONFORMING TO"
+capability is required to raise the I/O privilege level
+above its current value.
+.SH CONFORMING TO
.BR iopl ()
-is Linux-specific and should not be used in processes
+is Linux-specific and should not be used in programs that are
intended to be portable.
.SH NOTES
Libc5 treats it as a system call and has a prototype in
and in
.IR <sys/perm.h> .
Avoid the latter, it is available on i386 only.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ioperm (2),
+.BR outb (2),
.BR capabilities (7)
-.\" This is _*_ nroff _*_ source. Emacs, gimme all those colors :)
-.\"
.\" Copyright (c) International Business Machines orp., 2006
.\"
+.\" %%%LICENSE_START(GPLv2+_SW_3_PARA)
.\" This program is free software; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
.\" the GNU General Public License for more details.
.\"
-.\" You should have received a copy of the GNU General Public License
-.\" along with this program; if not, write to the Free Software
-.\" Foundation, Inc., 59 Temple Place, Suite 330, Boston,
-.\" MA 02111-1307 USA
+.\" You should have received a copy of the GNU General Public
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" HISTORY:
.\" 2006-04-27, created by Eduardo M. Fleury <efleury@br.ibm.com>
.\" with various additions by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
.\"
-.TH IOPRIO_SET 2 2008-07-09 "Linux" "Linux Programmer's Manual"
+.TH IOPRIO_SET 2 2013-02-12 "Linux" "Linux Programmer's Manual"
.SH NAME
ioprio_get, ioprio_set \- get/set I/O scheduling class and priority
.SH SYNOPSIS
.BI "int ioprio_get(int " which ", int " who );
.BI "int ioprio_set(int " which ", int " who ", int " ioprio );
.fi
+
+.IR Note :
+There are no glibc wrappers for these system calls; see NOTES.
.SH DESCRIPTION
The
.BR ioprio_get ()
and
.BR ioprio_set ()
system calls respectively get and set the I/O scheduling class and
-priority of one or more processes.
+priority of one or more threads.
The
.I which
and
.I who
-arguments identify the process(es) on which the system
+arguments identify the thread(s) on which the system
calls operate.
The
.I which
.TP
.B IOPRIO_WHO_PROCESS
.I who
-is a process ID identifying a single process.
+is a process ID or thread ID identifying a single process or thread.
+If
+.I who
+is 0, then operate on the calling thread.
.TP
.B IOPRIO_WHO_PGRP
.I who
is a process group ID identifying all the members of a process group.
+If
+.I who
+is 0, then operate on the process group of which the caller is a member.
.TP
.B IOPRIO_WHO_USER
.I who
is a user ID identifying all of the processes that
have a matching real UID.
+.\" FIXME who==0 needs to be documented,
+.\" See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652443
.PP
If
.I which
I/O priorities are not supported for asynchronous
writes because they are issued outside the context of the program
dirtying the memory, and thus program-specific priorities do not apply.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR ioprio_get ()
returns the
.SH VERSIONS
These system calls have been available on Linux since
kernel 2.6.13.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These system calls are Linux-specific.
.SH NOTES
-Glibc does not provide wrapper for these system calls; call them using
+Glibc does not provide a wrapper for these system calls; call them using
.BR syscall (2).
+Two or more processes or threads can share an I/O context.
+This will be the case when
+.BR clone (2)
+was called with the
+.B CLONE_IO
+flag.
+However, by default, the distinct threads of a process will
+.B not
+share the same I/O context.
+This means that if you want to change the I/O
+priority of all threads in a process, you may need to call
+.BR ioprio_set ()
+on each of the threads.
+The thread ID that you would need for this operation
+is the one that is returned by
+.BR gettid (2)
+or
+.BR clone (2).
+
These system calls only have an effect when used
in conjunction with an I/O scheduler that supports I/O priorities.
As at kernel 2.6.17 the only such scheduler is the Completely Fair Queuing
(CFQ) I/O scheduler.
-.SS "Selecting an I/O Scheduler"
+.SS Selecting an I/O scheduler
I/O Schedulers are selected on a per-device basis via the special
file
.IR /sys/block/<device>/queue/scheduler .
.RB "#" " echo cfq > /sys/block/hda/queue/scheduler"
.fi
.RE
-.SS "The Completely Fair Queuing (CFQ) I/O Scheduler"
+.SS The Completely Fair Queuing (CFQ) I/O scheduler
Since v3 (aka CFQ Time Sliced) CFQ implements
I/O nice levels similar to those
of CPU scheduling.
Refer to
.I Documentation/block/ioprio.txt
for more information on the CFQ I/O Scheduler and an example program.
-.SS "Required permissions to set I/O priorities"
+.SS Required permissions to set I/O priorities
Permission to change a process's priority is granted or denied based
on two assertions:
.TP
the function prototypes and macros described on this page.
Suitable definitions can be found in
.IR linux/ioprio.h .
-.SH "SEE ALSO"
+.SH SEE ALSO
+.BR ionice (1),
.BR getpriority (2),
.BR open (2),
.BR capabilities (7)
-.sp
-Documentation/block/ioprio.txt in the kernel source tree.
+
+.I Documentation/block/ioprio.txt
+in the Linux kernel source tree
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1995 Michael Chastain (mec@shell.portal.com), 15 April 1995.
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Tue Oct 22 08:11:14 EDT 1996 by Eric S. Raymond <esr@thyrsus.com>
-.TH IPC 2 2007-06-28 "Linux" "Linux Programmer's Manual"
+.TH IPC 2 2012-10-16 "Linux" "Linux Programmer's Manual"
.SH NAME
ipc \- System V IPC system calls
.SH SYNOPSIS
User programs should call the appropriate functions by their usual names.
Only standard library implementors and kernel hackers need to know about
.BR ipc ().
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR ipc ()
is Linux-specific, and should not be used in programs
intended to be portable.
.SH NOTES
-On a few architectures, for example ia64, there is no
+On some architectures\(emfor example x86-64 and ARM\(emthere is no
.BR ipc ()
system call; instead
.BR msgctl (2),
.BR semctl (2),
.BR shmctl (2),
and so on really are implemented as separate system calls.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR msgctl (2),
.BR msgget (2),
.BR msgrcv (2),
--- /dev/null
+.so man2/unimplemented.2
--- /dev/null
+.\" Copyright (C) 2012, Cyrill Gorcunov <gorcunov@openvz.org>
+.\" and Copyright (C) 2012, Michael Kerrisk <mtk.manpages@gmail.com>
+.\"
+.\" %%%LICENSE_START(VERBATIM)
+.\" Permission is granted to make and distribute verbatim copies of this
+.\" manual provided the copyright notice and this permission notice are
+.\" preserved on all copies.
+.\"
+.\" Permission is granted to copy and distribute modified versions of
+.\" this manual under the conditions for verbatim copying, provided that
+.\" the entire resulting derived work is distributed under the terms of
+.\" a permission notice identical to this one.
+.\"
+.\" Since the Linux kernel and libraries are constantly changing, this
+.\" manual page may be incorrect or out-of-date. The author(s) assume.
+.\" no responsibility for errors or omissions, or for damages resulting.
+.\" from the use of the information contained herein. The author(s) may.
+.\" not have taken the same level of care in the production of this.
+.\" manual, which is licensed free of charge, as they might when working.
+.\" professionally.
+.\"
+.\" Formatted or processed versions of this manual, if unaccompanied by
+.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
+.\"
+.\" Kernel commit d97b46a64674a267bc41c9e16132ee2a98c3347d
+.\"
+.TH KCMP 2 2013-01-27 "Linux" "Linux Programmer's Manual"
+.SH NAME
+kcmp \- compare two processes to determine if they share a kernel resource
+.SH SYNOPSIS
+.nf
+.B #include <linux/kcmp.h>
+
+.BI "int kcmp(pid_t " pid1 ", pid_t " pid2 ", int " type ,
+.BI " unsigned long " idx1 ", unsigned long " idx2 );
+.fi
+
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
+.SH DESCRIPTION
+The
+.BR kcmp ()
+system call can be used to check whether the two processes identified by
+.I pid1
+and
+.I pid2
+share a kernel resource such as virtual memory, file descriptors,
+and so on.
+
+The
+.I type
+argument specifies which resource is to be compared in the two processes.
+It has one of the following values:
+.TP
+.BR KCMP_FILE
+Check whether a file descriptor
+.I idx1
+in the process
+.I pid1
+refers to the same open file description (see
+.BR open (2))
+as file descriptor
+.I idx2
+in the process
+.IR pid2 .
+.TP
+.BR KCMP_FILES
+Check whether the process share the same set of open file descriptors.
+The arguments
+.I idx1
+and
+.I idx2
+are ignored.
+.TP
+.BR KCMP_FS
+Check whether the processes share the same file system information
+(i.e., file mode creation mask, working directory, and file system root).
+The arguments
+.I idx1
+and
+.I idx2
+are ignored.
+.TP
+.BR KCMP_IO
+Check whether the processes share I/O context.
+The arguments
+.I idx1
+and
+.I idx2
+are ignored.
+.TP
+.BR KCMP_SIGHAND
+Check whether the processes share the same table of signal dispositions.
+The arguments
+.I idx1
+and
+.I idx2
+are ignored.
+.TP
+.BR KCMP_SYSVSEM
+Check whether the processes share the same
+list of System V semaphore undo operations.
+The arguments
+.I idx1
+and
+.I idx2
+are ignored.
+.TP
+.BR KCMP_VM
+Check whether the processes share the same address space.
+The arguments
+.I idx1
+and
+.I idx2
+are ignored.
+.PP
+Note the
+.BR kcmp ()
+is not protected against false positives which may have place if tasks are
+running.
+Which means one should stop tasks being inspected with this syscall to obtain
+meaningful results.
+.SH RETURN VALUE
+The return value of a successful call to
+.BR kcmp ()
+is simply the result of arithmetic comparison
+of kernel pointers (when the kernel compares resources, it uses their
+memory addresses).
+
+The easiest way to explain is to consider an example.
+Suppose that
+.I v1
+and
+.I v2
+are the addresses of appropriate resources, then the return value
+is one of the following:
+.RS 4
+.IP 0 4
+.I v1
+is equal to
+.IR v2 ;
+in other words, the two processes share the resource.
+.IP 1
+.I v1
+is less than
+.IR v2 .
+.IP 2
+.I v1
+is greater than
+.IR v2 .
+.IP 3
+.I v1
+is not equal to
+.IR v2 ,
+but ordering information is unavailable.
+.RE
+.PP
+On error, \-1 is returned, and
+.I errno
+is set appropriately.
+
+.B kcmp ()
+was designed to return values suitable for sorting.
+This is particularly handy if one needs to compare
+a large number of file descriptors.
+.SH ERRORS
+.TP
+.B EBADF
+.I type
+is
+.B KCMP_FILE
+and
+.I fd1
+or
+.I fd2
+is not an open file descriptor.
+.TP
+.B EINVAL
+.I type
+is invalid.
+.TP
+.B EPERM
+Insufficient permission to inspect process resources.
+The
+.B CAP_SYS_PTRACE
+capability is required to inspect processes that you do not own.
+.TP
+.B ESRCH
+Process
+.I pid1
+or
+.I pid2
+does not exist.
+.SH VERSIONS
+The
+.BR kcmp ()
+system call first appeared in Linux 3.5.
+.SH CONFORMING TO
+.BR kcmp ()
+is Linux specific and should not be used in programs intended to be portable.
+.SH NOTES
+Glibc does not provide a wrapper for this system call; call it using
+.BR syscall (2).
+
+This system call is available only if the kernel was configured with
+.BR CONFIG_CHECKPOINT_RESTORE .
+The main use of the system call is for the
+checkpoint/restore in user space (CRIU) feature.
+The alternative to this system call would have been to expose suitable
+process information via the
+.BR proc (5)
+file system; this was deemed to be unsuitable for security reasons.
+
+See
+.BR clone (2)
+for some background information on the shared resources
+referred to on this page.
+.SH SEE ALSO
+.BR clone (2),
+.BR unshare (2)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2010 Intel Corporation
.\" Author: Andi Kleen
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.TH KEXEC_LOAD 2 2010-11-04 "Linux" "Linux Programmer's Manual"
+.\" %%%LICENSE_END
+.\"
+.TH KEXEC_LOAD 2 2012-07-13 "Linux" "Linux Programmer's Manual"
.SH NAME
kexec_load \- load a new kernel for later execution
.SH SYNOPSIS
.br
.BI " struct kexec_segment *" segments \
", unsigned long " flags ");"
+
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
.SH DESCRIPTION
The
.BR kexec_load ()
Execute the new kernel automatically on a system crash.
.\" FIXME figure out how this is really used
.TP
-.BR KEXEC_PRESERVE_CONTEXT " (since Linux 2.7.27)"
+.BR KEXEC_PRESERVE_CONTEXT " (since Linux 2.6.27)"
Preserve the system hardware and
software states before executing the new kernel.
This could be used for system suspend.
Call it using
.BR syscall (2).
.PP
-The required constants are in the kernel source file
+The required constants are in the Linux kernel source file
.IR linux/kexec.h ,
which is not currently exported to glibc.
.\" FIXME Andi submitted a patch for this.
-.\"
.\" Copyright (C) 2006 Red Hat, Inc. All Rights Reserved.
.\" Written by David Howells (dhowells@redhat.com)
.\"
+.\" %%%LICENSE_START(GPLv2+_SW_ONEPARA)
.\" This program is free software; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License
.\" as published by the Free Software Foundation; either version
.\" 2 of the License, or (at your option) any later version.
+.\" %%%LICENSE_END
+.\"
+.\" FIXME Document KEYCTL_REJECT (new in 2.6.39)
+.\" commit fdd1b94581782a2ddf9124414e5b7a5f48ce2f9c
+.\" Documentation/security/keys.txt
+.\" FIXME Document KEYCTL_INSTANTIATE_IOV (new in 2.6.39)
+.\" commit ee009e4a0d4555ed522a631bae9896399674f064
+.\" Documentation/security/keys.txt
+.\" FIXME Document KEYCTL_INVALIDATE (new in 3.5)
+.\" commit fd75815f727f157a05f4c96b5294a4617c0557da
+.\" Documentation/security/keys.txt
.\"
.TH KEYCTL 2 2010-02-25 Linux "Linux Key Management Calls"
.SH NAME
-keyctl \- Manipulate the kernel's key management facility
+keyctl \- manipulate the kernel's key management facility
.SH SYNOPSIS
.nf
.B #include <keyutils.h>
On success
.BR keyctl ()
returns the serial number of the key it found.
-On error, the value
-.B -1
+On error, the value \-1
will be returned and errno will have been set to an appropriate error.
.SH ERRORS
.TP
.B -lkeyutils
should be specified to the linker.
.SH SEE ALSO
+.ad l
+.nh
.BR keyctl (1),
-.br
.BR add_key (2),
-.br
.BR request_key (2),
-.br
-.BR keyctl_get_keyring_ID (3),
-.br
-.BR keyctl_join_session_keyring (3),
-.br
-.BR keyctl_update (3),
-.br
-.BR keyctl_revoke (3),
-.br
+.BR keyctl_set_timeout (3),
.BR keyctl_chown (3),
-.br
-.BR keyctl_setperm (3),
-.br
-.BR keyctl_describe (3),
-.br
.BR keyctl_clear (3),
-.br
-.BR keyctl_link (3),
-.br
-.BR keyctl_unlink (3),
-.br
-.BR keyctl_search (3),
-.br
-.BR keyctl_read (3),
-.br
+.BR keyctl_describe (3),
+.BR keyctl_describe_alloc (3),
+.BR keyctl_get_keyring_ID (3),
.BR keyctl_instantiate (3),
-.br
+.BR keyctl_join_session_keyring (3),
+.BR keyctl_link (3),
.BR keyctl_negate (3),
-.br
+.BR keyctl_revoke (3),
+.BR keyctl_search (3),
+.BR keyctl_setperm (3),
.BR keyctl_set_reqkey_keyring (3),
-.br
.BR keyctl_set_timeout (3),
-.br
-.BR keyctl_assume_authority (3),
-.br
-.BR keyctl_describe_alloc (3),
-.br
+.BR keyctl_read (3),
.BR keyctl_read_alloc (3),
-.br
+.BR keyctl_unlink (3),
+.BR keyctl_update (3),
.BR request-key (8)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1992 Drew Eckhardt (drew@cs.colorado.edu), March 28, 1992
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified by Michael Haardt <michael@moria.de>
.\" Modified by Thomas Koenig <ig25@rz.uni-karlsruhe.de>
.\" Modified 2004-06-24 by aeb
.\" Modified, 2004-11-30, after idea from emmanuel.colbus@ensimag.imag.fr
.\"
-.TH KILL 2 2009-09-15 "Linux" "Linux Programmer's Manual"
+.TH KILL 2 2013-02-05 "Linux" "Linux Programmer's Manual"
.SH NAME
kill \- send signal to a process
.SH SYNOPSIS
.B SIGCONT
it suffices when the sending and receiving
processes belong to the same session.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success (at least one signal was sent), zero is returned.
On error, \-1 is returned, and
.I errno
has not yet been
.BR wait (2)ed
for.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
.SH NOTES
The only signals that can be sent to process ID 1, the
unblocked signal must be delivered to the sending thread before the
.BR kill ()
returns.
-.SS "Linux Notes"
+.SS Linux notes
Across different kernel versions, Linux has enforced different rules
for the permissions required for an unprivileged process
to send a signal to another process.
.BR kill ()
failed with the error
.B EPERM
-if the caller did have permission to send the signal to \fIany\fP (rather
+if the caller did not have permission to send the signal to \fIany\fP (rather
than \fIall\fP) of the members of the process group.
Notwithstanding this error return, the signal was still delivered
to all of the processes for which the caller had permission to signal.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR _exit (2),
.BR killpg (2),
.BR signal (2),
.\" Copyright (c) 1980, 1991 Regents of the University of California.
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)killpg.2 6.5 (Berkeley) 3/10/91
.\"
Feature Test Macro Requirements for glibc (see
.BR feature_test_macros (7)):
.in
-.sp
.ad l
.TP 4
.BR killpg ():
.B SIGCONT
it suffices when the sending and receiving
processes belong to the same session.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.B ESRCH
The process group was given as 0 but the sending process does not
have a process group.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.4BSD (the
.BR killpg ()
function call first appeared in 4BSD), POSIX.1-2001.
.BR killpg ()
is implemented as a library function that makes the call
.IR "kill(-pgrp,\ sig)" .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getpgrp (2),
.BR kill (2),
.BR signal (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 1992 Drew Eckhardt;
.\" 1993 Michael Haardt, Ian Jackson.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified 1993-07-23 by Rik Faith <faith@cs.unc.edu>
.\" Modified 1994-08-21 by Michael Haardt
.\" Modified 2004-06-23 by Michael Kerrisk <mtk.manpages@gmail.com>
.\" Modified 2005-04-04, as per suggestion by Michael Hardt for rename.2
.\"
-.TH LINK 2 2008-08-21 "Linux" "Linux Programmer's Manual"
+.TH LINK 2 2013-01-27 "Linux" "Linux Programmer's Manual"
.SH NAME
link \- make a new name for a file
.SH SYNOPSIS
both names refer to the same file (and so have the same permissions
and ownership) and it is impossible to tell which name was the
"original".
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
(See also
.BR path_resolution (7).)
.TP
+.B EDQUOT
+The user's quota of disk blocks on the file system has been exhausted.
+.TP
.B EEXIST
.I newpath
already exists.
.IR oldpath " and " newpath
does not support the creation of hard links.
.TP
+.BR EPERM " (since Linux 3.6)"
+The caller does not have permission to create a hard link to this file
+(see the description of
+.IR /proc/sys/fs/protected_hardlink
+in
+.BR proc (5)).
+.TP
.B EROFS
The file is on a read-only file system.
.TP
.BR link ()
does not work across different mount points,
even if the same file system is mounted on both.)
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001 (but see NOTES).
.\" SVr4 documents additional ENOLINK and
.\" EMULTIHOP error conditions; POSIX.1 does not document ELOOP.
Use
.BR stat (2)
to find out if the link got created.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ln (1),
.BR linkat (2),
.BR open (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 2006, Michael Kerrisk
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" FIXME: Linux 2.6.39 added AT_EMPTY_PATH
.\"
Before kernel 2.6.18, the
.I flags
argument was unused, and had to be specified as 0.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR linkat ()
returns 0.
.BR linkat ()
was added to Linux in kernel 2.6.16;
library support was added to glibc in version 2.4.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
.SH NOTES
See
.BR openat (2)
for an explanation of the need for
.BR linkat ().
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR link (2),
.BR openat (2),
.BR path_resolution (7),
.\" and Copyright (C) 2007, Michael Kerrisk <mtk.manpages@gmail.com>
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" $Id: listen.2,v 1.6 1999/05/18 14:10:32 freitag Exp $
.\"
.B ECONNREFUSED
or, if the underlying protocol supports retransmission, the request may be
ignored so that a later reattempt at connection succeeds.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
The socket is not of a type that supports the
.BR listen ()
operation.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.4BSD, POSIX.1-2001.
The
.BR listen ()
.SH EXAMPLE
See
.BR bind (2).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR accept (2),
.BR bind (2),
.BR connect (2),
-.\"
-.\" Extended attributes system calls manual pages
-.\"
.\" Copyright (C) Andreas Gruenbacher, February 2001
.\" Copyright (C) Silicon Graphics Inc, September 2001
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
-.TH LISTXATTR 2 2001-12-01 "Linux" "Linux Programmer's Manual"
+.TH LISTXATTR 2 2013-01-27 "Linux" "Linux Programmer's Manual"
.SH NAME
listxattr, llistxattr, flistxattr \- list extended attribute names
.SH SYNOPSIS
.RE
.fam T
.SH RETURN VALUE
-On success, a positive number is returned indicating the size of the
+On success, a nonnegative number is returned indicating the size of the
extended attribute name list.
On failure, \-1 is returned and
.I errno
is set appropriately.
-.PP
-If the
+.SH ERRORS
+.TP
+.B ENOTSUP
+Extended attributes are not supported by the file system, or are disabled.
+.TP
+.B ERANGE
+The
.I size
of the
.I list
-buffer is too small to hold the result,
-.I errno
-is set to
-.BR ERANGE .
-.PP
-If extended attributes are not supported by the file system, or are disabled,
-.I errno
-is set to
-.BR ENOTSUP .
+buffer is too small to hold the result.
.PP
-The errors documented for the
+In addition, the errors documented in
.BR stat (2)
-system call are also applicable here.
+can also occur.
.SH VERSIONS
These system calls have been available on Linux since kernel 2.4;
glibc support is provided since version 2.3.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These system calls are Linux-specific.
.\" .SH AUTHORS
.\" Andreas Gruenbacher,
.\" Copyright (C) 1995 Andries Brouwer (aeb@cwi.nl)
+.\" Written 10 June 1995 by Andries Brouwer <aeb@cwi.nl>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.\" Written 10 June 1995 by Andries Brouwer <aeb@cwi.nl>
.\" Modified Thu Oct 31 15:16:23 1996 by Eric S. Raymond <esr@thyrsus.com>
.\"
-.TH LLSEEK 2 2007-06-01 "Linux" "Linux Programmer's Manual"
+.TH LLSEEK 2 2012-07-13 "Linux" "Linux Programmer's Manual"
.SH NAME
_llseek \- reposition read/write file offset
.SH SYNOPSIS
.BI " unsigned long " offset_low ", loff_t *" result ,
.BI " unsigned int " whence );
.fi
+
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
.SH DESCRIPTION
The
.BR _llseek ()
respectively.
It returns the resulting file position in the argument
.IR result .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
Upon successful completion,
.BR _llseek ()
returns 0.
.B EINVAL
.I whence
is invalid.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This function is Linux-specific, and should not be used in programs
intended to be portable.
.SH NOTES
Glibc does not provide a wrapper for this system call; call it using
.BR syscall (2).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR lseek (2),
.BR lseek64 (3)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2003 John Levon <levon@movementarian.org>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified 2004-06-17 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
.BR lookup_dcookie ()
to return successfully,
the kernel must still hold a cookie reference to the directory entry.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR lookup_dcookie ()
returns the length of the path string copied into the buffer.
The
.B ENAMETOOLONG
error return was added in 2.5.70.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR lookup_dcookie ()
is Linux-specific.
-.SH "NOTES"
+.SH NOTES
.BR lookup_dcookie ()
is a special-purpose system call, currently used only by the oprofile profiler.
It relies on a kernel driver to register cookies for directory entries.
.\" and Copyright (c) 2011, Michael Kerrisk <mtk.manpages@gmail.com>
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)lseek.2 6.5 (Berkeley) 3/10/91
.\"
.\" https://lkml.org/lkml/2011/4/22/79
.\" http://lwn.net/Articles/440255/
.\" http://blogs.oracle.com/bonwick/entry/seek_hole_and_seek_data
-.SH "RETURN VALUE"
+.SH RETURN VALUE
Upon successful completion,
.BR lseek ()
returns the resulting offset location as measured in bytes from the
or
.BR SEEK_HOLE ,
and the current file offset is beyond the end of the file.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
.BR SEEK_DATA
On Linux, using
.BR lseek ()
-on a tty device returns
+on a terminal device returns
\fBESPIPE\fP.
.\" Other systems return the number of written characters,
.\" using SEEK_SET to set the counter. (Of written characters.)
.BR fork (2)
share the current file position pointer, so seeking on such files may be
subject to race conditions.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR dup (2),
.BR fork (2),
.BR open (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2001 David Gómez <davidge@jazzfree.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Based on comments from mm/filemap.c. Last modified on 10-06-2001
.\" Modified, 25 Feb 2002, Michael Kerrisk, <mtk.manpages@gmail.com>
The KSM feature is intended for applications that generate many
instances of the same data (e.g., virtualization systems such as KVM).
It can consume a lot of processing power; use with care.
-See the kernel source file
+See the Linux kernel source file
.I Documentation/vm/ksm.txt
for more details.
The
systems such as QEMU).
It can very easily waste memory (e.g., a 2MB mapping that only ever accesses
1 byte will result in 2MB of wired memory instead of one 4KB page).
-See the kernel source file
+See the Linux kernel source file
.I Documentation/vm/transhuge.txt
for more details.
The
.BR MADV_DODUMP " (since Linux 3.4)"
Undo the effect of an earlier
.BR MADV_DONTDUMP .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success
.BR madvise ()
returns zero.
.B ENOMEM
Addresses in the specified range are not currently
mapped, or are outside the address space of the process.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1b.
POSIX.1-2001 describes
.BR posix_madvise (3)
.BR MADV_UNMERGEABLE
are Linux-specific.
.SH NOTES
-.SS "Linux Notes"
+.SS Linux notes
.LP
The current Linux implementation (2.4.0) views this system call
more as a command than as advice and hence may return an error
.\" The
.\" .BR madvise ()
.\" function first appeared in 4.4BSD.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getrlimit (2),
.BR mincore (2),
.BR mmap (2),
.\" Copyright 2003,2004 Andi Kleen, SuSE Labs.
.\" and Copyright 2007 Lee Schermerhorn, Hewlett Packard
.\"
+.\" %%%LICENSE_START(VERBATIM_PROF)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 2006-02-03, mtk, substantial wording changes and other improvements
.\" 2007-08-27, Lee Schermerhorn <Lee.Schermerhorn@hp.com>
.\" more precise specification of behavior.
.\"
+.\" FIXME
+.\" Linux 3.8 added the following, which need to be documented.
+.\" And do they also apply for move_pages()?
+.\"
+.\" MPOL_LOCAL
+.\" commit 479e2802d09f1e18a97262c4c6f8f17ae5884bd8
+.\" Author: Peter Zijlstra <a.p.zijlstra@chello.nl>
+.\" Date: Thu Oct 25 14:16:28 2012 +0200
+.\"
+.\" commit f2a07f40dbc603c15f8b06e6ec7f768af67b424f
+.\" Author: Hugh Dickins <hughd@google.com>
+.\" Date: Wed Jan 2 02:01:33 2013 -0800
+.\"
+.\" MPOL_MF_LAZY
+.\" commit b24f53a0bea38b266d219ee651b22dba727c44ae
+.\" Author: Lee Schermerhorn <lee.schermerhorn@hp.com>
+.\" Date: Thu Oct 25 14:16:32 2012 +0200
+.\"
.TH MBIND 2 2008-08-15 Linux "Linux Programmer's Manual"
.SH NAME
-mbind \- Set memory policy for a memory range
+mbind \- set memory policy for a memory range
.SH SYNOPSIS
.nf
.B "#include <numaif.h>"
node ids allowed by the process's current cpuset.
.PP
.I nodemask
-points to a bitmask of nodes containing up to
+points to a bit mask of nodes containing up to
.I maxnode
bits.
The bit mask size is rounded to the next multiple of
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 2009 Intel Corporation
.\" Author: Andi Kleen
.\" Based on the move_pages manpage which was
.\" This manpage is Copyright (C) 2006 Silicon Graphics, Inc.
.\" Christoph Lameter
.\"
+.\" %%%LICENSE_START(VERBATIM_TWO_PARA)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\" manual under the conditions for verbatim copying, provided that the
.\" entire resulting derived work is distributed under the terms of a
.\" permission notice identical to this one.
-.TH MIGRATE_PAGES 2 2010-11-01 "Linux" "Linux Programmer's Manual"
+.\" %%%LICENSE_END
+.\"
+.TH MIGRATE_PAGES 2 2012-08-01 "Linux" "Linux Programmer's Manual"
.SH NAME
migrate_pages \- move all pages in a process to another set of nodes
.SH SYNOPSIS
.sp
.BI "long migrate_pages(int " pid ", unsigned long " maxnode,
.BI " const unsigned long *" old_nodes,
-.BI " const unsigned long *" new_nodes);
+.BI " const unsigned long *" new_nodes );
.fi
.sp
Link with \fI\-lnuma\fP.
.SH DESCRIPTION
.BR migrate_pages ()
-moves all pages of the process
+attempts to move all pages of the process
.I pid
that are in memory nodes
.I old_nodes
process has the
.B CAP_SYS_NICE
privilege.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success
.BR migrate_pages ()
-returns zero.
+returns the number of pages that could not be moved
+(i.e., a return of zero means that all pages were successfully moved).
On error, it returns \-1, and sets
.I errno
to indicate the error.
system call first appeared on Linux in version 2.6.16.
.SH CONFORMING TO
This system call is Linux-specific.
-.SH "NOTES"
+.SH NOTES
For information on library support, see
.BR numa (7).
header is not included with glibc, but requires installing
.I libnuma-devel
or a similar package.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR get_mempolicy (2),
.BR mbind (2),
.BR set_mempolicy (2),
.BR cpuset (7),
.BR numa (7),
.BR migratepages (8),
-.BR numa_stat (8);
-.br
-the kernel source file
-.IR Documentation/vm/page_migration .
+.BR numa_stat (8)
+
+.IR Documentation/vm/page_migration
+in the Linux kernel source tree
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2001 Bert Hubert <ahu@ds9a.nl>
.\" and Copyright (C) 2007 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Created Sun Jun 3 17:23:32 2001 by bert hubert <ahu@ds9a.nl>
.\" Slightly adapted, following comments by Hugh Dickins, aeb, 2001-06-04.
locked in memory can come and go at any moment, and the contents of
.I vec
may already be stale by the time this call returns.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR mincore ()
returns zero.
contained unmapped memory.
.SH VERSIONS
Available since Linux 2.3.99pre1 and glibc 2.2.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR mincore ()
is not specified in POSIX.1-2001,
and it is not available on all UNIX implementations.
.\" .B mincore
.\" always fails with the error
.\" .BR ENOMEM .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mlock (2),
.BR mmap (2)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 1992 Drew Eckhardt;
.\" 1993 Michael Haardt
.\" 1993,1994 Ian Jackson.
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" You may distribute it under the terms of the GNU General
.\" Public License. It comes with NO WARRANTY.
+.\" %%%LICENSE_END
.\"
-.TH MKDIR 2 2010-06-26 "Linux" "Linux Programmer's Manual"
+.TH MKDIR 2 2013-01-27 "Linux" "Linux Programmer's Manual"
.SH NAME
mkdir \- create a directory
.SH SYNOPSIS
If the parent directory has the set-group-ID bit set then so will the
newly created directory.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR mkdir ()
returns zero on success, or \-1 if an error occurred (in which case,
.I errno
(See also
.BR path_resolution (7).)
.TP
+.B EDQUOT
+The user's quota of disk blocks or inodes on the file system has been
+exhausted.
+.TP
.B EEXIST
.I pathname
already exists (not necessarily as a directory).
.B EROFS
.I pathname
refers to a file on a read-only file system.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, BSD, POSIX.1-2001.
.\" SVr4 documents additional EIO, EMULTIHOP
.SH NOTES
There are many infelicities in the protocol underlying NFS.
Some of these affect
.BR mkdir ().
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mkdir (1),
.BR chmod (2),
.BR chown (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 2006, Michael Kerrisk
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\"
+.\" %%%LICENSE_END
.\"
.TH MKDIRAT 2 2012-05-04 "Linux" "Linux Programmer's Manual"
.SH NAME
is absolute, then
.I dirfd
is ignored.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR mkdirat ()
returns 0.
.BR mkdirat ()
was added to Linux in kernel 2.6.16;
library support was added to glibc in version 2.4.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
.SH NOTES
See
.BR openat (2)
for an explanation of the need for
.BR mkdirat ().
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mkdir (2),
.BR openat (2),
.BR path_resolution (7)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 1992 Drew Eckhardt;
.\" 1993 Michael Haardt
.\" 1993,1994 Ian Jackson.
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" You may distribute it under the terms of the GNU General
.\" Public License. It comes with NO WARRANTY.
+.\" %%%LICENSE_END
.\"
.\" Modified 1996-08-18 by urs
.\" Modified 2003-04-23 by Michael Kerrisk
.\" Modified 2004-06-23 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
-.TH MKNOD 2 2010-09-20 "Linux" "Linux Programmer's Manual"
+.TH MKNOD 2 2013-01-27 "Linux" "Linux Programmer's Manual"
.SH NAME
mknod \- create a special or ordinary file
.SH SYNOPSIS
bit set, or if the file system is mounted with BSD group semantics, the
new node will inherit the group ownership from its parent directory;
otherwise it will be owned by the effective group ID of the process.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR mknod ()
returns zero on success, or \-1 if an error occurred (in which case,
.I errno
(See also
.BR path_resolution (7).)
.TP
+.B EDQUOT
+The user's quota of disk blocks or inodes on the file system has been
+exhausted.
+.TP
.B EEXIST
.I pathname
already exists.
.B EROFS
.I pathname
refers to a file on a read-only file system.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.4BSD, POSIX.1-2001 (but see below).
.\" The Linux version differs from the SVr4 version in that it
.\" does not require root permission to create pipes, also in that no
There are many infelicities in the protocol underlying NFS.
Some of these affect
.BR mknod ().
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR chmod (2),
.BR chown (2),
.BR fcntl (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 2006, Michael Kerrisk
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\"
+.\" %%%LICENSE_END
.\"
.TH MKNODAT 2 2012-05-04 "Linux" "Linux Programmer's Manual"
.SH NAME
is absolute, then
.I dirfd
is ignored.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR mknodat ()
returns 0.
.BR mknodat ()
was added to Linux in kernel 2.6.16;
library support was added to glibc in version 2.4.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
.SH NOTES
See
.BR openat (2)
for an explanation of the need for
.BR mknodat ().
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mknod (2),
.BR openat (2),
.BR path_resolution (7)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) Michael Kerrisk, 2004
.\" using some material drawn from earlier man pages
.\" written by Thomas Kuhn, Copyright 1996
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330,
-.\" Boston, MA 02111, USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.TH MLOCK 2 2011-09-14 "Linux" "Linux Programmer's Manual"
.SH NAME
address space, so that pages in the specified virtual address range may
once more to be swapped out if required by the kernel memory manager.
Memory locking and unlocking are performed in units of whole pages.
-.SS "mlock() and munlock()"
+.SS mlock() and munlock()
.BR mlock ()
locks pages in the address range starting at
.I addr
bytes.
After this call, all pages that contain a part of the specified
memory range can be moved to external swap space again by the kernel.
-.SS "mlockall() and munlockall()"
+.SS mlockall() and munlockall()
.BR mlockall ()
locks all pages mapped into the address space of the
calling process.
.BR munlockall ()
unlocks all pages mapped into the address space of the
calling process.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success these system calls return 0.
On error, \-1 is returned,
.I errno
.B EPERM
(Linux 2.6.8 and earlier) The caller was not privileged
.RB ( CAP_IPC_LOCK ).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001, SVr4.
.SH AVAILABILITY
On POSIX systems on which
.\" POSIX.1-2001: It shall be defined to -1 or 0 or 200112L.
.\" -1: unavailable, 0: ask using sysconf().
.\" glibc defines it to 1.
-.SH "NOTES"
+.SH NOTES
Memory locking has two main applications: real-time algorithms and
high-security data processing.
Real-time applications require
Pages which are mapped to several locations or by several processes stay
locked into RAM as long as they are locked at least at one location or by
at least one process.
-.SS "Linux Notes"
+.SS Linux notes
Under Linux,
.BR mlock ()
and
and
.BR mmap (2)
.BR MAP_LOCKED .
-.SS "Limits and permissions"
+.SS Limits and permissions
In Linux 2.6.8 and earlier,
a process must be privileged
.RB ( CAP_IPC_LOCK )
.B RLIMIT_MEMLOCK
soft resource limit instead defines a limit on how much memory an
unprivileged process may lock.
-.SH "BUGS"
+.SH BUGS
In the 2.4 series Linux kernels up to and including 2.4.17,
a bug caused the
.BR mlockall ()
.\" http://marc.theaimsgroup.com/?l=linux-kernel&m=113801392825023&w=2
.\" "Rationale for RLIMIT_MEMLOCK"
.\" 23 Jan 2006
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mmap (2),
.BR setrlimit (2),
.BR shmctl (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 1996 Andries Brouwer <aeb@cwi.nl>
.\" and Copyright (C) 2006, 2007 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified 1997-01-31 by Eric S. Raymond <esr@thyrsus.com>
.\" Modified 2000-03-25 by Jim Van Zandt <jrv@vanzandt.mv.com>
.\" 2007-07-10, mtk, Added an example program.
.\" 2008-11-18, mtk, document MAP_STACK
.\"
-.TH MMAP 2 2012-04-16 "Linux" "Linux Programmer's Manual"
+.TH MMAP 2 2013-02-25 "Linux" "Linux Programmer's Manual"
.SH NAME
mmap, munmap \- map or unmap files or devices into memory
.SH SYNOPSIS
.BI " int " fd ", off_t " offset );
.BI "int munmap(void *" addr ", size_t " length );
.fi
+
+See NOTES for information on feature test macro requirements.
.SH DESCRIPTION
.BR mmap ()
creates a new mapping in the virtual address space of
.TP
.BR MAP_HUGETLB " (since Linux 2.6.32)"
Allocate the mapping using "huge pages."
-See the kernel source file
+See the Linux kernel source file
.I Documentation/vm/hugetlbpage.txt
for further information.
.TP
or
.B MS_ASYNC
flag, if one occurs.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR mmap ()
returns a pointer to the mapped area.
was set but the object specified by
.I fd
is open for writing.
+.TP
+.B EOVERFLOW
+On 32-bit architecture together with the large file extension
+(i.e., using 64-bit
+.IR off_t ):
+the number of pages used for
+.I length
+plus number of pages used for
+.I offset
+would overflow
+.I "unsigned long"
+(32 bits).
.LP
Use of a mapped region can result in these signals:
.TP
Attempted access to a portion of the buffer that does not correspond
to the file (for example, beyond the end of the file, including the
case where another process has truncated the file).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.4BSD, POSIX.1-2001.
.\" SVr4 documents additional error codes ENXIO and ENODEV.
.\" SUSv2 documents additional error codes EMFILE and EOVERFLOW.
flag is specified, and
.I addr
is 0 (NULL), then the mapped address will be 0 (NULL).
+
+Certain
+.I flags
+constants are defined only if either
+.BR _BSD_SOURCE
+or
+.BR _SVID_SOURCE
+is defined.
+(Requiring
+.BR _GNU_SOURCE
+also suffices,
+and requiring that macro specifically would have been more logical,
+since these flags are all Linux specific.)
+The relevant flags are:
+.BR MAP_32BIT ,
+.BR MAP_ANONYMOUS
+(and the synonym
+.BR MAP_ANON ),
+.BR MAP_DENYWRITE ,
+.BR MAP_EXECUTABLE ,
+.BR MAP_FILE ,
+.BR MAP_GROWSDOWN ,
+.BR MAP_HUGETLB ,
+.BR MAP_LOCKED ,
+.BR MAP_NONBLOCK ,
+.BR MAP_NORESERVE ,
+.BR MAP_POPULATE ,
+and
+.BR MAP_STACK .
.SH BUGS
On Linux there are no guarantees like those suggested above under
.BR MAP_NORESERVE .
fails with the error
.B EINVAL
for this case.
+
+POSIX specifies that the system shall always
+zero fill any partial page at the end
+of the object and that system will never write any modification of the
+object beyond its end.
+On Linux, when you write data to such partial page after the end
+of the object, the data stays in the page cache even after the file
+is closed and unmapped
+and even though the data is never written to the file itself,
+subsequent mappings may see the modified content.
+In some cases, this could be fixed by calling
+.BR msync (2)
+before the unmap takes place;
+however, this doesn't work on tmpfs
+(for example, when using POSIX shared memory interface documented in
+.BR shm_overview (7)).
.SH EXAMPLE
.\" FIXME . Add an example here that uses an anonymous shared region for
.\" IPC between parent and child.
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getpagesize (2),
.BR mincore (2),
.BR mlock (2),
.BR shmat (2),
.BR shm_open (3),
.BR shm_overview (7)
-.br
+
B.O. Gallmeister, POSIX.4, O'Reilly, pp. 128-129 and 389-391.
.\"
.\" Repeat after me: private read-only mappings are 100% equivalent to
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2002, Michael Kerrisk
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified 31 Jan 2002, Michael Kerrisk <mtk.manpages@gmail.com>
.\" Added description of mmap2
This enables applications that use a 32-bit
.I off_t
to map large files (up to 2^44 bytes).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR mmap2 ()
returns a pointer to the mapped area.
.SH ERRORS
.TP
.B EFAULT
-Problem with getting the data from userspace.
+Problem with getting the data from user space.
.TP
.B EINVAL
(Various platforms where the page size is not 4096 bytes.)
.SH VERSIONS
.BR mmap2 ()
is available since Linux 2.3.31.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This system call is Linux-specific.
.SH NOTES
Nowadays, the glibc
.\" ia64 can have page sizes ranging from 4kB to 64kB.
.\" On cris, it looks like the unit might also be the page size,
.\" which is 8192 bytes. -- mtk, June 2007
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getpagesize (2),
.BR mmap (2),
.BR mremap (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1995 Michael Chastain (mec@duracef.shout.net), 22 July 1995.
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
-.TH MODIFY_LDT 2 2007-06-01 "Linux" "Linux Programmer's Manual"
+.TH MODIFY_LDT 2 2012-07-13 "Linux" "Linux Programmer's Manual"
.SH NAME
modify_ldt \- get or set ldt
.SH SYNOPSIS
.sp
.BI "int modify_ldt(int " "func" ", void *" "ptr" ", unsigned long " "bytecount" );
.fi
+
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
.SH DESCRIPTION
.BR modify_ldt ()
reads or writes the local descriptor table (ldt) for a process.
.\" will result in a segmentation violation when trying to access the memory
.\" outside of the process address space. The memory protection is enforced
.\" at the paging layer.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR modify_ldt ()
returns either the actual number of bytes read (for reading)
.B ENOSYS
.I func
is neither 0 nor 1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This call is Linux-specific and should not be used in programs intended
to be portable.
.SH NOTES
Glibc does not provide a wrapper for this system call; call it using
.BR syscall (2).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR vm86 (2)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 1993 Rickard E. Faith <faith@cs.unc.edu>
.\" and Copyright (C) 1994 Andries E. Brouwer <aeb@cwi.nl>
.\" and Copyright (C) 2002, 2005 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified 1996-11-04 by Eric S. Raymond <esr@thyrsus.com>
.\" Modified 2001-10-13 by Michael Kerrisk <mtk.manpages@gmail.com>
.\" 2008-10-06, mtk: move umount*() material into separate umount.2 page.
.\" 2008-10-06, mtk: Add discussion of namespaces.
.\"
-.TH MOUNT 2 2012-05-10 "Linux" "Linux Programmer's Manual"
+.TH MOUNT 2 2012-07-05 "Linux" "Linux Programmer's Manual"
.SH NAME
mount \- mount file system
.SH SYNOPSIS
in the low order 16 bits:
.\" FIXME 2.6.15 added flags for "shared subtree" functionality:
.\" MS_UNBINDABLE, MS_PRIVATE, MS_SHARED, MS_SLAVE
+.\"
+.\" MS_PRIVATE.
+.\" All mounts are private by default. Previously shared mouns
+.\" can be remarked PRIVATE.
+.\" MS_SHARED
+.\" Mount points that are marked SHARED propagate mount events
+.\" to one another after bing cloned.
+.\" MS_SLAVE
+.\" A previously shared mount point can be marked SALVE, meaning
+.\" it receives propagated events, but does not propagate events.
+.\" MS_UNBINDABLE
+.\" mounts cannot be bound into other places, and will not be
+.\" propagated into new subtrees
+.\" mount --make-rshared ==> MS_SHARED | MS_REC
+.\"
+.\" These settings are visible in proc/mountinfo
+.\"
+.\"
.\" These need to be documented on this page.
.\" See:
.\" Documentation/filesystems/sharedsubtree.txt
.\" Shared Subtree Concept and Implementation in the Linux Kernel
.\" Ram Pai
.\"
+.\" http://www.ibm.com/developerworks/linux/library/l-mount-namespaces/index.html
+.\" Applying mount namespaces
+.\"
+.\" Uncover practical applications for advanced Linux mounts features
+.\" Serge E. Hallyn (sergeh@us.ibm.com), Software Engineer, IBM
+.\" Ram Pai (linuxram@us.ibm.com), Software Engineer, IBM
+.\" Date: 17 Sep 2007
+.\"
.\" 2.6.25 Added MS_I_VERSION, which needs to be documented.
.\"
.TP
and
.I data
of an existing mount without having to unmount and remount the file system.
-.I source
-and
.I target
-should be the same values specified in the initial
+should be the same value specified in the initial
.BR mount ()
call;
+.I source
+and
.I filesystemtype
-is ignored.
+are ignored.
The following
.I mountflags
errors.
Each file-system type may have its own special errors and its
own special behavior.
-See the kernel source code for details.
+See the Linux kernel source code for details.
.TP
.B EACCES
A component of a path was not searchable.
Since Linux 2.4 the set-user-ID and set-group-ID bits are
just silently ignored in this case.
.\" The change is in patch-2.4.0-prerelease.
-.SS Per-process Namespaces
+.SS Per-process namespaces
Starting with kernel 2.4.19, Linux provides
per-process mount namespaces.
A mount namespace is the set of file system mounts that
for details.
.SH "SEE ALSO"
.BR umount (2),
+.BR namespaces (7),
.BR path_resolution (7),
.BR mount (8),
.BR umount (8)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 2006 Silicon Graphics, Inc.
.\" Christoph Lameter
.\"
+.\" %%%LICENSE_START(VERBATIM_TWO_PARA)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\" manual under the conditions for verbatim copying, provided that the
.\" entire resulting derived work is distributed under the terms of a
.\" permission notice identical to this one.
+.\" %%%LICENSE_END
.\"
.\" FIXME Should programs normally be using this API directly, or should
.\" they rather be using interfaces in the numactl package?
.TP
.B -ENOMEM
Unable to allocate memory on target node.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success
.BR move_pages ()
returns zero.
first appeared on Linux in version 2.6.18.
.SH CONFORMING TO
This system call is Linux-specific.
-.SH "NOTES"
+.SH NOTES
For information on library support, see
.BR numa (7).
header is not included with glibc, but requires installing
.I libnuma-devel
or a similar package.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR get_mempolicy (2),
.BR mbind (2),
.BR set_mempolicy (2),
-.\" -*- nroff -*-
.\" Copyright (C) 2007 Michael Kerrisk <mtk.manpages@gmail.com>
.\" and Copyright (C) 1995 Michael Shields <shields@tembel.org>.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and author of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified 1996-10-22 by Eric S. Raymond <esr@thyrsus.com>
.\" Modified 1997-05-31 by Andries Brouwer <aeb@cwi.nl>
.\" Modified 2004-08-16 by Andi Kleen <ak@muc.de>
.\" 2007-06-02, mtk: Fairly substantial rewrites and additions, and
.\" a much improved example program.
+.\" FIXME The following protection flags need documenting:
+.\" PROT_SEM
+.\" PROT_GROWSDOWN
+.\" PROT_GROWSUP
+.\" PROT_SAO (PowerPC)
.\"
-.TH MPROTECT 2 2011-09-08 "Linux" "Linux Programmer's Manual"
+.TH MPROTECT 2 2012-08-14 "Linux" "Linux Programmer's Manual"
.SH NAME
mprotect \- set protection on a region of memory
.SH SYNOPSIS
.nf
.B #include <sys/mman.h>
.sp
-.BI "int mprotect(const void *" addr ", size_t " len ", int " prot );
+.BI "int mprotect(void *" addr ", size_t " len ", int " prot );
.fi
.SH DESCRIPTION
.BR mprotect ()
The memory can be executed.
.\" FIXME
.\" Document PROT_GROWSUP and PROT_GROWSDOWN
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR mprotect ()
returns zero.
(Before kernel 2.4.19, the error
.BR EFAULT
was incorrectly produced for these cases.)
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001.
.\" SVr4 defines an additional error
.\" code EAGAIN. The SVr4 error conditions don't map neatly onto Linux's.
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mmap (2),
.BR sysconf (3)
'\" t
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH MQ_GETSETATTR 2 2010-08-29 "Linux" "Linux Programmer's Manual"
+.TH MQ_GETSETATTR 2 2012-07-13 "Linux" "Linux Programmer's Manual"
.SH NAME
mq_getsetattr \- get/set message queue attributes
.SH SYNOPSIS
.BI "int mq_getsetattr(mqd_t " mqdes ", struct mq_attr *" newattr ","
.BI " struct mq_attr *" oldattr );
.fi
+
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
.SH DESCRIPTION
Do not use this system call.
Glibc does not provide a wrapper for this system call; call it using
.BR syscall (2).
(Actually, never call it unless you are writing a C library!)
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mq_getattr (3),
.BR mq_overview (7)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1996 Tom Bjorkholm <tomb@mydata.se>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 1996-04-11 Tom Bjorkholm <tomb@mydata.se>
.\" First version written (1.3.86)
or similar), then this lock is maintained when the segment is
resized and/or relocated.
As a consequence, the amount of memory locked by the process may change.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success
.BR mremap ()
returns a pointer to the new virtual memory area.
.B MREMAP_MAYMOVE
flag is not set in \fIflags\fP.
Or, there is not enough (virtual) memory available.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This call is Linux-specific, and should not be used in programs
intended to be portable.
.\" 4.2BSD had a (never actually implemented)
did not allow for the
.I new_address
argument.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR brk (2),
.BR getpagesize (2),
.BR getrlimit (2),
.BR sbrk (2),
.BR malloc (3),
.BR realloc (3)
-.P
-Your favorite OS text book for more information on paged memory.
-(\fIModern Operating Systems\fP by Andrew S. Tanenbaum,
+
+Your favorite text book on operating systems
+for more information on paged memory
+(e.g., \fIModern Operating Systems\fP by Andrew S. Tanenbaum,
\fIInside Linux\fP by Randolf Bentson,
-\fIThe Design of the UNIX Operating System\fP by Maurice J. Bach.)
+\fIThe Design of the UNIX Operating System\fP by Maurice J. Bach)
.\" Copyright 1993 Giorgio Ciucci (giorgio@crcc.it)
.\" and Copyright 2004, 2005 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified Tue Oct 22 08:11:14 EDT 1996 by Eric S. Raymond <esr@thyrsus.com>
.\" Modified Sun Feb 18 01:59:29 2001 by Andries E. Brouwer <aeb@cwi.nl>
.\" Added msqid_ds and ipc_perm structure definitions
.\" 2005-08-02, mtk: Added IPC_INFO, MSG_INFO, MSG_STAT descriptions
.\"
-.TH MSGCTL 2 2008-08-06 "Linux" "Linux Programmer's Manual"
+.TH MSGCTL 2 2012-05-31 "Linux" "Linux Programmer's Manual"
.SH NAME
msgctl \- message control operations
.SH SYNOPSIS
.PP
The
.I ipc_perm
-structure is defined in \fI<sys/ipc.h>\fP as follows
+structure is defined as follows
(the highlighted fields are settable using
.BR IPC_SET ):
.PP
argument is not a queue identifier, but instead an index into
the kernel's internal array that maintains information about
all message queues on the system.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR IPC_STAT ,
.BR IPC_SET ,
and the process is not privileged (Linux: it does not have the
.B CAP_SYS_ADMIN
capability).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001.
.\" SVID does not document the EIDRM error condition.
.SH NOTES
+The inclusion of
+.I <sys/types.h>
+and
+.I <sys/ipc.h>
+isn't required on Linux or by any version of POSIX.
+However,
+some old implementations required the inclusion of these header files,
+and the SVID also documented their inclusion.
+Applications intended to be portable to such old systems may need
+to include these header files.
+.\" Like Linux, the FreeBSD man pages still document
+.\" the inclusion of these header files.
+
The
.BR IPC_INFO ,
.B MSG_STAT
.B IPC_64
flag in
.IR cmd .)
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR msgget (2),
.BR msgrcv (2),
.BR msgsnd (2),
.\" Copyright 1993 Giorgio Ciucci <giorgio@crcc.it>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
-.\" manual provflags the copyright notice and this permission notice are
+.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Permission is granted to copy and distribute modified versions of this
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Added correction due to Nick Duffek <nsd@bbc.com>, aeb, 960426
.\" Modified Wed Nov 6 04:00:31 1996 by Eric S. Raymond <esr@thyrsus.com>
.\" Language and formatting clean-ups
.\" Added notes on /proc files
.\"
-.TH MSGGET 2 2004-05-27 "Linux" "Linux Programmer's Manual"
+.TH MSGGET 2 2012-05-31 "Linux" "Linux Programmer's Manual"
.SH NAME
msgget \- get a message queue identifier
.SH SYNOPSIS
If the message queue already exists the permissions are
verified, and a check is made to see if it is marked for
destruction.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
If successful, the return value will be the message queue identifier (a
nonnegative integer), otherwise \-1
with
number of message queues
.RB ( MSGMNI )
would be exceeded.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001.
.SH NOTES
+The inclusion of
+.I <sys/types.h>
+and
+.I <sys/ipc.h>
+isn't required on Linux or by any version of POSIX.
+However,
+some old implementations required the inclusion of these header files,
+and the SVID also documented their inclusion.
+Applications intended to be portable to such old systems may need
+to include these header files.
+.\" Like Linux, the FreeBSD man pages still document
+.\" the inclusion of these header files.
+
.B IPC_PRIVATE
isn't a flag field but a
.I key_t
dependent
(on Linux, this limit can be read and modified via
.IR /proc/sys/kernel/msgmni ).
-.SS "Linux Notes"
+.SS Linux notes
Until version 2.3.20 Linux would return
.B EIDRM
for a
was perhaps unfortunate,
.B IPC_NEW
would more clearly show its function.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR msgctl (2),
.BR msgrcv (2),
.BR msgsnd (2),
.\" Copyright 1993 Giorgio Ciucci <giorgio@crcc.it>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified Tue Oct 22 16:40:11 1996 by Eric S. Raymond <esr@thyrsus.com>
.\" Modified Mon Jul 10 21:09:59 2000 by aeb
.\" Added notes on /proc files
.\" FIXME . Add example programs to this page.
.\"
-.TH MSGOP 2 2008-04-23 "Linux" "Linux Programmer's Manual"
+.TH MSGOP 2 2012-05-31 "Linux" "Linux Programmer's Manual"
.SH NAME
msgrcv, msgsnd \- message operations
.SH SYNOPSIS
.IP
.I msg_rtime
is set to the current time.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On failure both functions return \-1
with
.I errno
was specified in
.I msgflg
and no message of the requested type existed on the message queue.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001.
.SH NOTES
+The inclusion of
+.I <sys/types.h>
+and
+.I <sys/ipc.h>
+isn't required on Linux or by any version of POSIX.
+However,
+some old implementations required the inclusion of these header files,
+and the SVID also documented their inclusion.
+Applications intended to be portable to such old systems may need
+to include these header files.
+.\" Like Linux, the FreeBSD man pages still document
+.\" the inclusion of these header files.
+
The
.I msgp
argument is declared as \fIstruct msgbuf *\fP with
.RB ( MSGTQL )
and for the system wide maximum size in bytes of the message pool
.RB ( MSGPOOL ).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR msgctl (2),
.BR msgget (2),
.BR capabilities (7),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 1996 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH MSYNC 2 2008-04-22 "Linux" "Linux Programmer's Manual"
.SH NAME
.B MS_INVALIDATE
asks to invalidate other mappings of the same file
(so that they can be updated with the fresh values just written).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.TP
.B ENOMEM
The indicated memory (or part of it) was not mapped.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
This call was introduced in Linux 1.3.21, and then used
.\" POSIX.1-2001: It shall be defined to -1 or 0 or 200112L.
.\" -1: unavailable, 0: ask using sysconf().
.\" glibc defines them to 1.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mmap (2)
-.br
+
B.O. Gallmeister, POSIX.4, O'Reilly, pp. 128-129 and 389-391.
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) Markus Kuhn, 1996
.\" and Copyright (C) Linux Foundation, 2008, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 1996-04-10 Markus Kuhn <mskuhn@cip.informatik.uni-erlangen.de>
.\" First version written
does not interact with signals;
and it makes the task of resuming a sleep that has been
interrupted by a signal handler easier.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On successfully sleeping for the requested interval,
.BR nanosleep ()
returns 0.
field was not in the range 0 to 999999999 or
.I tv_sec
was negative.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
If the interval specified in
Consequently, these time services shall expire when the requested relative
interval elapses, independently of the new or old value of the clock.
.RE
-.SS "Old behavior"
+.SS Old behavior
In order to support applications requiring much more precise pauses
(e.g., in order to control some time-critical hardware),
.BR nanosleep ()
If the system call is subsequently restarted,
then the time that the thread spent in the stopped state is
\fInot\fP counted against the sleep interval.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR clock_nanosleep (2),
.BR sched_setscheduler (2),
.BR timer_create (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
+.\" %%%LICENSE_START(PUBLIC_DOMAIN)
.\" This text is in the public domain.
+.\" %%%LICENSE_END
.\"
.\" FIXME The description of nfsservctl() on this page
.\" is woefully thin.
unsigned int cr_debug;
};
.fi
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
is set appropriately.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This call is Linux-specific.
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1992 Drew Eckhardt <drew@cs.colorado.edu>, March 28, 1992
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified by Michael Haardt <michael@moria.de>
.\" Modified 1993-07-24 by Rik Faith <faith@cs.unc.edu>
or priority increase.
The range for nice values is described in
.BR getpriority (2).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, the new nice value is returned (but see NOTES below).
On error, \-1 is returned, and
.I errno
.B RLIMIT_NICE
resource limit in
.BR setrlimit (2).)
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
However, the Linux and (g)libc
(earlier than glibc 2.2.4) return value is nonstandard, see below.
to 0 before the call, and check its value when
.BR nice ()
returns \-1.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR nice (1),
.BR renice (1),
.BR fork (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 1992 Drew Eckhardt;
.\" 1993 Michael Haardt, Ian Jackson.
.\" 2008 Greg Banks
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified 1993-07-21 by Rik Faith <faith@cs.unc.edu>
.\" Modified 1994-08-21 by Michael Haardt
.\" FIXME Linux 2.6.33 has O_DSYNC, and a hidden __O_SYNC.
.\" FIXME: Linux 2.6.39 added O_PATH
.\"
-.TH OPEN 2 2012-05-01 "Linux" "Linux Programmer's Manual"
+.TH OPEN 2 2013-02-18 "Linux" "Linux Programmer's Manual"
.SH NAME
open, creat \- open and possibly create a file or device
.SH SYNOPSIS
The
.I file creation flags
are
-.BR O_CREAT ", " O_EXCL ", " O_NOCTTY ", and " O_TRUNC .
+.BR O_CLOEXEC ,
+.BR O_CREAT ,
+.BR O_DIRECTORY ,
+.BR O_EXCL ,
+.BR O_NOCTTY ,
+.BR O_NOFOLLOW ,
+.BR O_TRUNC ,
+and
+.BR O_TTY_INIT .
The
.I file status flags
are all of the remaining flags listed below.
-.\" FIXME . Actually is it true that the "file status flags" are all of the
-.\" remaining flags listed below? SUSv4 divides the flags into:
+.\" SUSv4 divides the flags into:
.\" * Access mode
.\" * File creation
.\" * File status
.\" * Other (O_CLOEXEC, O_DIRECTORY, O_NOFOLLOW)
.\" though it's not clear what the difference between "other" and
-.\" "File creation" flags is. (I've raised an Aardvark to see if this
-.\" can be clarified in SUSv4; 10 Oct 2008.)
+.\" "File creation" flags is. I raised an Aardvark to see if this
+.\" can be clarified in SUSv4; 10 Oct 2008.
+.\" http://thread.gmane.org/gmane.comp.standards.posix.austin.general/64/focus=67
+.\" TC1 (balloted in 2013), resolved this, so that those three constants
+.\" are also categorized" as file status flags.
+.\"
The distinction between these two groups of flags is that
the file status flags can be retrieved and (in some cases)
modified using
Try to minimize cache effects of the I/O to and from this file.
In general this will degrade performance, but it is useful in
special situations, such as when applications do their own caching.
-File I/O is done directly to/from user space buffers.
+File I/O is done directly to/from user-space buffers.
The
.B O_DIRECT
flag on its own makes an effort to transfer data synchronously,
.BR feature_test_macros (7)).
.TP
.BR O_NOATIME " (Since Linux 2.6.8)"
-Do not update the file last access time (st_atime in the inode)
+Do not update the file last access time
+.RI ( st_atime
+in the inode)
when the file is
.BR read (2).
This flag is intended for use by indexing or backup programs,
If
.I pathname
refers to a terminal device\(emsee
-.BR tty (4)\(em
-it will not become the process's controlling terminal even if the
+.BR tty (4)\(emit
+will not become the process's controlling terminal even if the
process does not have one.
.TP
.B O_NOFOLLOW
.I flags
equal to
.BR O_CREAT|O_WRONLY|O_TRUNC .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR open ()
and
.BR creat ()
(See also
.BR path_resolution (7).)
.TP
+.B EDQUOT
+Where
+.B O_CREAT
+is specified, the file does not exist, and the user's quota of disk
+blocks or inodes on the file system has been exhausted.
+.TP
.B EEXIST
.I pathname
already exists and
flag was specified, and an incompatible lease was held on the file
(see
.BR fcntl (2)).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
The
.BR O_DIRECTORY ,
Most Linux file systems don't actually implement the POSIX
.B O_SYNC
semantics, which require all metadata updates of a write
-to be on disk on returning to userspace, but only the
+to be on disk on returning to user space, but only the
.B O_DSYNC
semantics, which require only actual file data and metadata necessary
to retrieve it to be on disk by the time the system call returns.
The
.B O_DIRECT
flag may impose alignment restrictions on the length and address
-of userspace buffers and the file offset of I/Os.
+of user-space buffers and the file offset of I/Os.
In Linux alignment
restrictions vary by file system and kernel version and might be
absent entirely.
system call,
if the memory buffer is a private mapping
(i.e., any mapping created with the
-.BR mmap(2)
+.BR mmap (2)
.BR MAP_PRIVATE
flag;
this includes memory allocated on the heap and statically allocated buffers).
Nor does this restriction apply when the memory buffer has been advised as
.B MADV_DONTFORK
with
-.BR madvise(2),
+.BR madvise (2),
ensuring that it will not be available
to the child after
.BR fork (2).
to enable this flag.
.\" FIXME . Check bugzilla report on open(O_ASYNC)
.\" See http://bugzilla.kernel.org/show_bug.cgi?id=5993
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR chmod (2),
.BR chown (2),
.BR close (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 2006, Michael Kerrisk
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\"
+.\" %%%LICENSE_END
.\"
.TH OPENAT 2 2012-05-04 "Linux" "Linux Programmer's Manual"
.SH NAME
is absolute, then
.I dirfd
is ignored.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR openat ()
returns a new file descriptor.
.BR openat ()
was added to Linux in kernel 2.6.16;
library support was added to glibc in version 2.4.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
A similar system call exists on Solaris.
.\" The 'at' suffix in Solaris is actually double sensed. It
on the use of
.IR /proc/self/fd/ dirfd,
but less efficiently.)
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR faccessat (2),
.BR fchmodat (2),
.BR fchownat (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1995 Paul Gortmaker
.\" (gpg109@rsphy1.anu.edu.au)
.\" Wed Nov 29 10:58:54 EST 1995
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
-.\"
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
-.TH OUTB 2 1995-11-29 "Linux" "Linux Programmer's Manual"
+.TH OUTB 2 2012-12-31 "Linux" "Linux Programmer's Manual"
.SH NAME
outb, outw, outl, outsb, outsw, outsl,
inb, inw, inl, insb, insw, insl,
outb_p, outw_p, outl_p, inb_p, inw_p, inl_p \- port I/O
+.SH SYNOPSIS
+.nf
+.B #include <sys/io.h>
+
+.BI "unsigned char inb(unsigned short int " port );
+.BI "unsigned char inb_p(unsigned short int " port );
+.BI "unsigned short int inw(unsigned short int " port );
+.BI "unsigned short int inw_p(unsigned short int " port );
+.BI "unsigned int inl(unsigned short int " port );
+.BI "unsigned int inl_p(unsigned short int " port );
+
+.BI "void outb(unsigned char " value ", unsigned short int " port );
+.BI "void outb_p(unsigned char " value ", unsigned short int " port );
+.BI "void outw(unsigned short int " value ", unsigned short int " port );
+.BI "void outw_p(unsigned short int " value ", unsigned short int " port );
+.BI "void outl(unsigned int " value ", unsigned short int " port );
+.BI "void outl_p(unsigned int " value ", unsigned short int " port );
+
+.BI "void insb(unsigned short int " port ", void *" addr ,
+.BI " unsigned long int " count );
+.BI "void insw(unsigned short int " port ", void *" addr ,
+.BI " unsigned long int " count );
+.BI "void insl(unsigned short int " port ", void *" addr ,
+.BI " unsigned long int " count );
+.BI "void outsb(unsigned short int " port ", const void *" addr ,
+.BI " unsigned long int " count );
+.BI "void outsw(unsigned short int " port ", const void *" addr ,
+.BI " unsigned long int " count );
+.BI "void outsl(unsigned short int " port ", const void *" addr ,
+.BI " unsigned long int " count );
+.fi
.SH DESCRIPTION
This family of functions is used to do low-level port input and output.
The out* functions do port output, the in* functions do port input;
.\" in addition to that given in
.\" .BR outb (9).
-You compile with \fB\-O\fP or \fB\-O2\fP or similar.
+You must compile with \fB\-O\fP or \fB\-O2\fP or similar.
The functions
are defined as inline macros, and will not be substituted in without
optimization enabled, causing unresolved references at link time.
I/O ports in question.
Failure to do this will cause the application
to receive a segmentation fault.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR outb ()
and friends are hardware-specific.
The
.I port
argument is passed second,
which is the opposite order from most DOS implementations.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ioperm (2),
.BR iopl (2)
+++ /dev/null
-.so man7/path_resolution.7
-.\" FIXME . this link will eventually be removed (created June 2007)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1992 Drew Eckhardt (drew@cs.colorado.edu), March 28, 1992
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified by Michael Haardt (michael@moria.de)
.\" Modified Sat Jul 24 14:48:00 1993 by Rik Faith (faith@cs.unc.edu)
causes the calling process (or thread) to sleep
until a signal is delivered that either terminates the process or causes
the invocation of a signal-catching function.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR pause ()
only returns when a signal was caught and the
signal-catching function returned.
.TP
.B EINTR
a signal was caught and the signal-catching function returned.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR kill (2),
.BR select (2),
.BR signal (2),
.\" Contributed by Niki A. Rahimi, LTC Security Development
.\" narahimi@us.ibm.com
+.\"
+.\" %%%LICENSE_START(FREELY_REDISTRIBUTABLE)
.\" May be freely distributed.
+.\" %%%LICENSE_END
.\"
.TH PCICONFIG_READ 2 2003-07-14 "Linux" "Linux Programmer's Manual"
.SH NAME
.PP
Most of the interaction with PCI devices is already handled by the
kernel PCI layer,
-and thus these calls should not normally need to be accessed from userspace.
+and thus these calls should not normally need to be accessed from user space.
.TP
.BR pciconfig_read ()
Reads to
You pass it a bus/devfn pair and get a physical address for either the
memory offset (for things like prep, this is 0xc0000000),
the IO base for PIO cycles, or the ISA holes if any.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.TP
.BR pciconfig_read ()
On success zero is returned.
User does not have the \fBCAP_SYS_ADMIN\fP capability.
This does not apply to
.BR pciconfig_iobase ().
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These calls are Linux-specific, available since Linux 2.0.26/2.1.11.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR capabilities (7)
--- /dev/null
+.\" Copyright (c) 2012, Vincent Weaver
+.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
+.\" This is free documentation; you can redistribute it and/or
+.\" modify it under the terms of the GNU General Public License as
+.\" published by the Free Software Foundation; either version 2 of
+.\" the License, or (at your option) any later version.
+.\"
+.\" The GNU General Public License's references to "object code"
+.\" and "executables" are to be interpreted as the output of any
+.\" document formatting or typesetting system, including
+.\" intermediate and printed output.
+.\"
+.\" This manual is distributed in the hope that it will be useful,
+.\" but WITHOUT ANY WARRANTY; without even the implied warranty of
+.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+.\" GNU General Public License for more details.
+.\"
+.\" You should have received a copy of the GNU General Public
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
+.\"
+.\" This document is based on the perf_event.h header file, the
+.\" tools/perf/design.txt file, and a lot of bitter experience.
+.\"
+.TH PERF_EVENT_OPEN 2 2013-02-04 "Linux" "Linux Programmer's Manual"
+.SH NAME
+perf_event_open \- set up performance monitoring
+.SH SYNOPSIS
+.nf
+.B #include <linux/perf_event.h>
+.B #include <linux/hw_breakpoint.h>
+.sp
+.BI "int perf_event_open(struct perf_event_attr *" attr ,
+.BI " pid_t " pid ", int " cpu ", int " group_fd ,
+.BI " unsigned long " flags );
+.fi
+
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
+.SH DESCRIPTION
+Given a list of parameters,
+.BR perf_event_open ()
+returns a file descriptor, for use in subsequent system calls
+.RB ( read "(2), " mmap "(2), " prctl "(2), " fcntl "(2), etc.)."
+.PP
+A call to
+.BR perf_event_open ()
+creates a file descriptor that allows measuring performance
+information.
+Each file descriptor corresponds to one
+event that is measured; these can be grouped together
+to measure multiple events simultaneously.
+.PP
+Events can be enabled and disabled in two ways: via
+.BR ioctl (2)
+and via
+.BR prctl (2) .
+When an event is disabled it does not count or generate overflows but does
+continue to exist and maintain its count value.
+.PP
+Events come in two flavors: counting and sampled.
+A
+.I counting
+event is one that is used for counting the aggregate number of events
+that occur.
+In general, counting event results are gathered with a
+.BR read (2)
+call.
+A
+.I sampling
+event periodically writes measurements to a buffer that can then
+be accessed via
+.BR mmap (2) .
+.SS Arguments
+.P
+The argument
+.I pid
+allows events to be attached to processes in various ways.
+If
+.I pid
+is 0, measurements happen on the current thread, if
+.I pid
+is greater than 0, the process indicated by
+.I pid
+is measured, and if
+.I pid
+is \-1, all processes are counted.
+
+The
+.I cpu
+argument allows measurements to be specific to a CPU.
+If
+.I cpu
+is greater than or equal to 0,
+measurements are restricted to the specified CPU;
+if
+.I cpu
+is \-1, the events are measured on all CPUs.
+.P
+Note that the combination of
+.IR pid " == \-1"
+and
+.IR cpu " == \-1"
+is not valid.
+.P
+A
+.IR pid " > 0"
+and
+.IR cpu " == \-1"
+setting measures per-process and follows that process to whatever CPU the
+process gets scheduled to.
+Per-process events can be created by any user.
+.P
+A
+.IR pid " == \-1"
+and
+.IR cpu " >= 0"
+setting is per-CPU and measures all processes on the specified CPU.
+Per-CPU events need the
+.B CAP_SYS_ADMIN
+capability or a
+.I /proc/sys/kernel/perf_event_paranoid
+value of less than 1.
+.P
+The
+.I group_fd
+argument allows event groups to be created.
+An event group has one event which is the group leader.
+The leader is created first, with
+.IR group_fd " = \-1."
+The rest of the group members are created with subsequent
+.BR perf_event_open ()
+calls with
+.IR group_fd
+being set to the fd of the group leader.
+(A single event on its own is created with
+.IR group_fd " = \-1"
+and is considered to be a group with only 1 member.)
+An event group is scheduled onto the CPU as a unit: it will only
+be put onto the CPU if all of the events in the group can be put onto
+the CPU.
+This means that the values of the member events can be
+meaningfully compared, added, divided (to get ratios), etc., with each
+other, since they have counted events for the same set of executed
+instructions.
+.P
+The
+.I flags
+argument takes one of the following values:
+.TP
+.BR PERF_FLAG_FD_NO_GROUP
+.\" FIXME The following sentence is unclear
+This flag allows creating an event as part of an event group but
+having no group leader.
+It is unclear why this is useful.
+.\" FIXME So, why is it useful?
+.TP
+.BR PERF_FLAG_FD_OUTPUT
+This flag re-routes the output from an event to the group leader.
+.TP
+.BR PERF_FLAG_PID_CGROUP " (Since Linux 2.6.39)."
+This flag activates per-container system-wide monitoring.
+A container
+is an abstraction that isolates a set of resources for finer grain
+control (CPUs, memory, etc...).
+In this mode, the event is measured
+only if the thread running on the monitored CPU belongs to the designated
+container (cgroup).
+The cgroup is identified by passing a file descriptor
+opened on its directory in the cgroupfs filesystem.
+For instance, if the
+cgroup to monitor is called
+.IR test ,
+then a file descriptor opened on
+.I /dev/cgroup/test
+(assuming cgroupfs is mounted on
+.IR /dev/cgroup )
+must be passed as the
+.I pid
+parameter.
+cgroup monitoring is only available
+for system-wide events and may therefore require extra permissions.
+.P
+The
+.I perf_event_attr
+structure provides detailed configuration information
+for the event being created.
+
+.in +4n
+.nf
+struct perf_event_attr {
+ __u32 type; /* Type of event */
+ __u32 size; /* Size of attribute structure */
+ __u64 config; /* Type-specific configuration */
+
+ union {
+ __u64 sample_period; /* Period of sampling */
+ __u64 sample_freq; /* Frequency of sampling */
+ };
+
+ __u64 sample_type; /* Specifies values included in sample */
+ __u64 read_format; /* Specifies values returned in read */
+
+ __u64 disabled : 1, /* off by default */
+ inherit : 1, /* children inherit it */
+ pinned : 1, /* must always be on PMU */
+ exclusive : 1, /* only group on PMU */
+ exclude_user : 1, /* don't count user */
+ exclude_kernel : 1, /* don't count kernel */
+ exclude_hv : 1, /* don't count hypervisor */
+ exclude_idle : 1, /* don't count when idle */
+ mmap : 1, /* include mmap data */
+ comm : 1, /* include comm data */
+ freq : 1, /* use freq, not period */
+ inherit_stat : 1, /* per task counts */
+ enable_on_exec : 1, /* next exec enables */
+ task : 1, /* trace fork/exit */
+ watermark : 1, /* wakeup_watermark */
+ precise_ip : 2, /* skid constraint */
+ mmap_data : 1, /* non-exec mmap data */
+ sample_id_all : 1, /* sample_type all events */
+ exclude_host : 1, /* don't count in host */
+ exclude_guest : 1, /* don't count in guest */
+ exclude_callchain_kernel : 1,
+ /* exclude kernel callchains */
+ exclude_callchain_user : 1,
+ /* exclude user callchains */
+ __reserved_1 : 41;
+
+ union {
+ __u32 wakeup_events; /* wakeup every n events */
+ __u32 wakeup_watermark; /* bytes before wakeup */
+ };
+
+ __u32 bp_type; /* breakpoint type */
+
+ union {
+ __u64 bp_addr; /* breakpoint address */
+ __u64 config1; /* extension of config */
+ };
+
+ union {
+ __u64 bp_len; /* breakpoint length */
+ __u64 config2; /* extension of config1 */
+ };
+ __u64 branch_sample_type; /* enum perf_branch_sample_type */
+ __u64 sample_regs_user; /* user regs to dump on samples */
+ __u32 sample_stack_user; /* size of stack to dump on
+ samples */
+ __u32 __reserved_2; /* Align to u64 */
+
+};
+.fi
+.in
+
+The fields of the
+.I perf_event_attr
+structure are described in more detail below:
+.TP
+.I type
+This field specifies the overall event type.
+It has one of the following values:
+.RS
+.TP
+.B PERF_TYPE_HARDWARE
+This indicates one of the "generalized" hardware events provided
+by the kernel.
+See the
+.I config
+field definition for more details.
+.TP
+.B PERF_TYPE_SOFTWARE
+This indicates one of the software-defined events provided by the kernel
+(even if no hardware support is available).
+.TP
+.B PERF_TYPE_TRACEPOINT
+This indicates a tracepoint
+provided by the kernel tracepoint infrastructure.
+.TP
+.B PERF_TYPE_HW_CACHE
+This indicates a hardware cache event.
+This has a special encoding, described in the
+.I config
+field definition.
+.TP
+.B PERF_TYPE_RAW
+This indicates a "raw" implementation-specific event in the
+.IR config " field."
+.TP
+.BR PERF_TYPE_BREAKPOINT " (Since Linux 2.6.33)"
+This indicates a hardware breakpoint as provided by the CPU.
+Breakpoints can be read/write accesses to an address as well as
+execution of an instruction address.
+.TP
+.RB "dynamic PMU"
+Since Linux 2.6.39,
+.BR perf_event_open ()
+can support multiple PMUs.
+To enable this, a value exported by the kernel can be used in the
+.I type
+field to indicate which PMU to use.
+The value to use can be found in the sysfs filesystem:
+there is a subdirectory per PMU instance under
+.IR /sys/bus/event_source/devices .
+In each sub-directory there is a
+.I type
+file whose content is an integer that can be used in the
+.I type
+field.
+For instance,
+.I /sys/bus/event_source/devices/cpu/type
+contains the value for the core CPU PMU, which is usually 4.
+.RE
+.TP
+.I "size"
+The size of the
+.I perf_event_attr
+structure for forward/backward compatibility.
+Set this using
+.I sizeof(struct perf_event_attr)
+to allow the kernel to see
+the struct size at the time of compilation.
+
+The related define
+.B PERF_ATTR_SIZE_VER0
+is set to 64; this was the size of the first published struct.
+.B PERF_ATTR_SIZE_VER1
+is 72, corresponding to the addition of breakpoints in Linux 2.6.33.
+.B PERF_ATTR_SIZE_VER2
+is 80 corresponding to the addition of branch sampling in Linux 3.4.
+.B PERF_ATR_SIZE_VER3
+is 96 corresponding to the addition
+of
+.I sample_regs_user
+and
+.I sample_stack_user
+in Linux 3.7.
+.TP
+.I "config"
+This specifies which event you want, in conjunction with
+the
+.I type
+field.
+The
+.IR config1 " and " config2
+fields are also taken into account in cases where 64 bits is not
+enough to fully specify the event.
+The encoding of these fields are event dependent.
+
+The most significant bit (bit 63) of
+.I config
+signifies CPU-specific (raw) counter configuration data;
+if the most significant bit is unset, the next 7 bits are an event
+type and the rest of the bits are the event identifier.
+
+There are various ways to set the
+.I config
+field that are dependent on the value of the previously
+described
+.I type
+field.
+What follows are various possible settings for
+.I config
+separated out by
+.IR type .
+
+If
+.I type
+is
+.BR PERF_TYPE_HARDWARE ,
+we are measuring one of the generalized hardware CPU events.
+Not all of these are available on all platforms.
+Set
+.I config
+to one of the following:
+.RS 12
+.TP
+.B PERF_COUNT_HW_CPU_CYCLES
+Total cycles.
+Be wary of what happens during CPU frequency scaling
+.TP
+.B PERF_COUNT_HW_INSTRUCTIONS
+Retired instructions.
+Be careful, these can be affected by various
+issues, most notably hardware interrupt counts
+.TP
+.B PERF_COUNT_HW_CACHE_REFERENCES
+Cache accesses.
+Usually this indicates Last Level Cache accesses but this may
+vary depending on your CPU.
+This may include prefetches and coherency messages; again this
+depends on the design of your CPU.
+.TP
+.B PERF_COUNT_HW_CACHE_MISSES
+Cache misses.
+Usually this indicates Last Level Cache misses; this is intended to be
+used in conjunction with the
+.B PERF_COUNT_HW_CACHE_REFERENCES
+event to calculate cache miss rates.
+.TP
+.B PERF_COUNT_HW_BRANCH_INSTRUCTIONS
+Retired branch instructions.
+Prior to Linux 2.6.34, this used
+the wrong event on AMD processors.
+.TP
+.B PERF_COUNT_HW_BRANCH_MISSES
+Mispredicted branch instructions.
+.TP
+.B PERF_COUNT_HW_BUS_CYCLES
+Bus cycles, which can be different from total cycles.
+.TP
+.BR PERF_COUNT_HW_STALLED_CYCLES_FRONTEND " (Since Linux 3.0)"
+Stalled cycles during issue.
+.TP
+.BR PERF_COUNT_HW_STALLED_CYCLES_BACKEND " (Since Linux 3.0)"
+Stalled cycles during retirement.
+.TP
+.BR PERF_COUNT_HW_REF_CPU_CYCLES " (Since Linux 3.3)"
+Total cycles; not affected by CPU frequency scaling.
+.RE
+.IP
+If
+.I type
+is
+.BR PERF_TYPE_SOFTWARE ,
+we are measuring software events provided by the kernel.
+Set
+.I config
+to one of the following:
+.RS 12
+.TP
+.B PERF_COUNT_SW_CPU_CLOCK
+This reports the CPU clock, a high-resolution per-CPU timer.
+.TP
+.B PERF_COUNT_SW_TASK_CLOCK
+This reports a clock count specific to the task that is running.
+.TP
+.B PERF_COUNT_SW_PAGE_FAULTS
+This reports the number of page faults.
+.TP
+.B PERF_COUNT_SW_CONTEXT_SWITCHES
+This counts context switches.
+Until Linux 2.6.34, these were all reported as user-space
+events, after that they are reported as happening in the kernel.
+.TP
+.B PERF_COUNT_SW_CPU_MIGRATIONS
+This reports the number of times the process
+has migrated to a new CPU.
+.TP
+.B PERF_COUNT_SW_PAGE_FAULTS_MIN
+This counts the number of minor page faults.
+These did not require disk I/O to handle.
+.TP
+.B PERF_COUNT_SW_PAGE_FAULTS_MAJ
+This counts the number of major page faults.
+These required disk I/O to handle.
+.TP
+.BR PERF_COUNT_SW_ALIGNMENT_FAULTS " (Since Linux 2.6.33)"
+This counts the number of alignment faults.
+These happen when unaligned memory accesses happen; the kernel
+can handle these but it reduces performance.
+This only happens on some architectures (never on x86).
+.TP
+.BR PERF_COUNT_SW_EMULATION_FAULTS " (Since Linux 2.6.33)"
+This counts the number of emulation faults.
+The kernel sometimes traps on unimplemented instructions
+and emulates them for user space.
+This can negatively impact performance.
+.RE
+
+.RS
+If
+.I type
+is
+.BR PERF_TYPE_TRACEPOINT ,
+then we are measuring kernel tracepoints.
+The value to use in
+.I config
+can be obtained from under debugfs
+.I tracing/events/*/*/id
+if ftrace is enabled in the kernel.
+.RE
+
+.RS
+If
+.I type
+is
+.BR PERF_TYPE_HW_CACHE ,
+then we are measuring a hardware CPU cache event.
+To calculate the appropriate
+.I config
+value use the following equation:
+.RS 4
+.nf
+
+ (perf_hw_cache_id) | (perf_hw_cache_op_id << 8) |
+ (perf_hw_cache_op_result_id << 16)
+.fi
+.P
+where
+.I perf_hw_cache_id
+is one of:
+.RS 4
+.TP
+.B PERF_COUNT_HW_CACHE_L1D
+for measuring Level 1 Data Cache
+.TP
+.B PERF_COUNT_HW_CACHE_L1I
+for measuring Level 1 Instruction Cache
+.TP
+.B PERF_COUNT_HW_CACHE_LL
+for measuring Last-Level Cache
+.TP
+.B PERF_COUNT_HW_CACHE_DTLB
+for measuring the Data TLB
+.TP
+.B PERF_COUNT_HW_CACHE_ITLB
+for measuring the Instruction TLB
+.TP
+.B PERF_COUNT_HW_CACHE_BPU
+for measuring the branch prediction unit
+.TP
+.BR PERF_COUNT_HW_CACHE_NODE " (Since Linux 3.0)"
+for measuring local memory accesses
+.RE
+.P
+and
+.I perf_hw_cache_op_id
+is one of
+.RS 4
+.TP
+.B PERF_COUNT_HW_CACHE_OP_READ
+for read accesses
+.TP
+.B PERF_COUNT_HW_CACHE_OP_WRITE
+for write accesses
+.TP
+.B PERF_COUNT_HW_CACHE_OP_PREFETCH
+for prefetch accesses
+.RE
+.P
+and
+.I perf_hw_cache_op_result_id
+is one of
+.RS 4
+.TP
+.B PERF_COUNT_HW_CACHE_RESULT_ACCESS
+to measure accesses
+.TP
+.B PERF_COUNT_HW_CACHE_RESULT_MISS
+to measure misses
+.RE
+.RE
+
+If
+.I type
+is
+.BR PERF_TYPE_RAW ,
+then a custom "raw"
+.I config
+value is needed.
+Most CPUs support events that are not covered by the "generalized" events.
+These are implementation defined; see your CPU manual (for example
+the Intel Volume 3B documentation or the AMD BIOS and Kernel Developer
+Guide).
+The libpfm4 library can be used to translate from the name in the
+architectural manuals to the raw hex value
+.BR perf_event_open ()
+expects in this field.
+
+If
+.I type
+is
+.BR PERF_TYPE_BREAKPOINT ,
+then leave
+.I config
+set to zero.
+Its parameters are set in other places.
+.RE
+.TP
+.IR sample_period ", " sample_freq
+A "sampling" counter is one that generates an interrupt
+every N events, where N is given by
+.IR sample_period .
+A sampling counter has
+.IR sample_period " > 0."
+When an overflow interrupt occurs, requested data is recorded
+in the mmap buffer.
+The
+.I sample_type
+field controls what data is recorded on each interrupt.
+
+.I sample_freq
+can be used if you wish to use frequency rather than period.
+In this case you set the
+.I freq
+flag.
+The kernel will adjust the sampling period
+to try and achieve the desired rate.
+The rate of adjustment is a
+timer tick.
+.TP
+.I "sample_type"
+The various bits in this field specify which values to include
+in the sample.
+They will be recorded in a ring-buffer,
+which is available to user space using
+.BR mmap (2).
+The order in which the values are saved in the
+sample are documented in the MMAP Layout subsection below;
+it is not the
+.I "enum perf_event_sample_format"
+order.
+.RS
+.TP
+.B PERF_SAMPLE_IP
+Records instruction pointer.
+.TP
+.B PERF_SAMPLE_TID
+Records the process and thread IDs.
+.TP
+.B PERF_SAMPLE_TIME
+Records a timestamp.
+.TP
+.B PERF_SAMPLE_ADDR
+Records an address, if applicable.
+.TP
+.B PERF_SAMPLE_READ
+Record counter values for all events in a group, not just the group leader.
+.TP
+.B PERF_SAMPLE_CALLCHAIN
+Records the callchain (stack backtrace).
+.TP
+.B PERF_SAMPLE_ID
+Records a unique ID for the opened event's group leader.
+.TP
+.B PERF_SAMPLE_CPU
+Records CPU number.
+.TP
+.B PERF_SAMPLE_PERIOD
+Records the current sampling period.
+.TP
+.B PERF_SAMPLE_STREAM_ID
+Records a unique ID for the opened event.
+Unlike
+.B PERF_SAMPLE_ID
+the actual ID is returned, not the group leader.
+This ID is the same as the one returned by PERF_FORMAT_ID.
+.TP
+.B PERF_SAMPLE_RAW
+Records additional data, if applicable.
+Usually returned by tracepoint events.
+.TP
+.BR PERF_SAMPLE_BRANCH_STACK " (Since Linux 3.4)"
+Records the branch stack.
+See branch_sample_type.
+.TP
+.BR PERF_SAMPLE_REGS_USER " (Since Linux 3.7)"
+Records the current register state.
+.TP
+.BR PERF_SAMPLE_STACK_USER " (Since Linux 3.7)"
+[To be documented]
+.RE
+.TP
+.IR "read_format"
+This field specifies the format of the data returned by
+.BR read (2)
+on a
+.BR perf_event_open ()
+file descriptor.
+.RS
+.TP
+.B PERF_FORMAT_TOTAL_TIME_ENABLED
+Adds the 64-bit
+.I time_enabled
+field.
+This can be used to calculate estimated totals if
+the PMU is overcommitted and multiplexing is happening.
+.TP
+.B PERF_FORMAT_TOTAL_TIME_RUNNING
+Adds the 64-bit
+.I time_running
+field.
+This can be used to calculate estimated totals if
+the PMU is overcommitted and multiplexing is happening.
+.TP
+.B PERF_FORMAT_ID
+Adds a 64-bit unique value that corresponds to the event group.
+.TP
+.B PERF_FORMAT_GROUP
+Allows all counter values in an event group to be read with one read.
+.RE
+.TP
+.IR "disabled"
+The
+.I disabled
+bit specifies whether the counter starts out disabled or enabled.
+If disabled, the event can later be enabled by
+.BR ioctl (2),
+.BR prctl (2),
+or
+.IR enable_on_exec .
+.TP
+.IR "inherit"
+The
+.I inherit
+bit specifies that this counter should count events of child
+tasks as well as the task specified.
+This only applies to new children, not to any existing children at
+the time the counter is created (nor to any new children of
+existing children).
+
+Inherit does not work for some combinations of
+.IR read_format s,
+such as
+.BR PERF_FORMAT_GROUP .
+.TP
+.IR "pinned"
+The
+.I pinned
+bit specifies that the counter should always be on the CPU if at all
+possible.
+It only applies to hardware counters and only to group leaders.
+If a pinned counter cannot be put onto the CPU (e.g., because there are
+not enough hardware counters or because of a conflict with some other
+event), then the counter goes into an 'error' state, where reads
+return end-of-file (i.e.,
+.BR read (2)
+returns 0) until the counter is subsequently enabled or disabled.
+.TP
+.IR "exclusive"
+The
+.I exclusive
+bit specifies that when this counter's group is on the CPU,
+it should be the only group using the CPU's counters.
+In the future this may allow monitoring programs to
+support PMU features that need to run alone so that they do not
+disrupt other hardware counters.
+.TP
+.IR "exclude_user"
+If this bit is set, the count excludes events that happen in user space.
+.TP
+.IR "exclude_kernel"
+If this bit is set, the count excludes events that happen in kernel-space.
+.TP
+.IR "exclude_hv"
+If this bit is set, the count excludes events that happen in the
+hypervisor.
+This is mainly for PMUs that have built-in support for handling this
+(such as POWER).
+Extra support is needed for handling hypervisor measurements on most
+machines.
+.TP
+.IR "exclude_idle"
+If set, don't count when the CPU is idle.
+.TP
+.IR "mmap"
+The
+.I mmap
+bit enables recording of exec mmap events.
+.TP
+.IR "comm"
+The
+.I comm
+bit enables tracking of process command name as modified by the
+.IR exec (2)
+and
+.IR prctl (PR_SET_NAME)
+system calls.
+Unfortunately for tools,
+there is no way to distinguish one system call versus the other.
+.TP
+.IR "freq"
+If this bit is set, then
+.I sample_frequency
+not
+.I sample_period
+is used when setting up the sampling interval.
+.TP
+.IR "inherit_stat"
+This bit enables saving of event counts on context switch for
+inherited tasks.
+This is only meaningful if the
+.I inherit
+field is set.
+.TP
+.IR "enable_on_exec"
+If this bit is set, a counter is automatically
+enabled after a call to
+.BR exec (2).
+.TP
+.IR "task"
+If this bit is set, then
+fork/exit notifications are included in the ring buffer.
+.TP
+.IR "watermark"
+If set, have a sampling interrupt happen when we cross the
+.I wakeup_watermark
+boundary.
+Otherwise interrupts happen after
+.I wakeup_events
+samples.
+.TP
+.IR "precise_ip" " (Since Linux 2.6.35)"
+This controls the amount of skid.
+Skid is how many instructions
+execute between an event of interest happening and the kernel
+being able to stop and record the event.
+Smaller skid is
+better and allows more accurate reporting of which events
+correspond to which instructions, but hardware is often limited
+with how small this can be.
+
+The values of this are the following:
+.RS
+.TP
+0 -
+.B SAMPLE_IP
+can have arbitrary skid
+.TP
+1 -
+.B SAMPLE_IP
+must have constant skid
+.TP
+2 -
+.B SAMPLE_IP
+requested to have 0 skid
+.TP
+3 -
+.B SAMPLE_IP
+must have 0 skid.
+See also
+.BR PERF_RECORD_MISC_EXACT_IP .
+.RE
+.TP
+.IR "mmap_data" " (Since Linux 2.6.36)"
+The counterpart of the
+.I mmap
+field, but enables including data mmap events
+in the ring-buffer.
+.TP
+.IR "sample_id_all" " (Since Linux 2.6.38)"
+If set, then TID, TIME, ID, CPU, and STREAM_ID can
+additionally be included in
+.RB non- PERF_RECORD_SAMPLE s
+if the corresponding
+.I sample_type
+is selected.
+.TP
+.IR "exclude_host" " (Since Linux 3.2)"
+Do not measure time spent in VM host
+.TP
+.IR "exclude_guest" " (Since Linux 3.2)"
+Do not measure time spent in VM guest
+.TP
+.IR "exclude_callchain_kernel" " (Since Linux 3.7)"
+Do not include kernel callchains.
+.TP
+.IR "exclude_callchain_user" " (Since Linux 3.7)"
+Do not include user callchains.
+.TP
+.IR "wakeup_events" ", " "wakeup_watermark"
+This union sets how many samples
+.RI ( wakeup_events )
+or bytes
+.RI ( wakeup_watermark )
+happen before an overflow signal happens.
+Which one is used is selected by the
+.I watermark
+bitflag.
+.TP
+.IR "bp_type" " (Since Linux 2.6.33)"
+This chooses the breakpoint type.
+It is one of:
+.RS
+.TP
+.BR HW_BREAKPOINT_EMPTY
+no breakpoint
+.TP
+.BR HW_BREAKPOINT_R
+count when we read the memory location
+.TP
+.BR HW_BREAKPOINT_W
+count when we write the memory location
+.TP
+.BR HW_BREAKPOINT_RW
+count when we read or write the memory location
+.TP
+.BR HW_BREAKPOINT_X
+count when we execute code at the memory location
+.LP
+The values can be combined via a bitwise or, but the
+combination of
+.B HW_BREAKPOINT_R
+or
+.B HW_BREAKPOINT_W
+with
+.B HW_BREAKPOINT_X
+is not allowed.
+.RE
+.TP
+.IR "bp_addr" " (Since Linux 2.6.33)"
+.I bp_addr
+address of the breakpoint.
+For execution breakpoints this is the memory address of the instruction
+of interest; for read and write breakpoints it is the memory address
+of the memory location of interest.
+.TP
+.IR "config1" " (Since Linux 2.6.39)"
+.I config1
+is used for setting events that need an extra register or otherwise
+do not fit in the regular config field.
+Raw OFFCORE_EVENTS on Nehalem/Westmere/SandyBridge use this field
+on 3.3 and later kernels.
+.TP
+.IR "bp_len" " (Since Linux 2.6.33)"
+.I bp_len
+is the length of the breakpoint being measured if
+.I type
+is
+.BR PERF_TYPE_BREAKPOINT .
+Options are
+.BR HW_BREAKPOINT_LEN_1 ,
+.BR HW_BREAKPOINT_LEN_2 ,
+.BR HW_BREAKPOINT_LEN_4 ,
+.BR HW_BREAKPOINT_LEN_8 .
+For an execution breakpoint, set this to
+.IR sizeof(long) .
+.TP
+.IR "config2" " (Since Linux 2.6.39)"
+
+.I config2
+is a further extension of the
+.I config1
+field.
+.TP
+.IR "branch_sample_type" " (Since Linux 3.4)"
+This is used with the CPUs hardware branch sampling, if available.
+It can have one of the following values:
+.RS
+.TP
+.B PERF_SAMPLE_BRANCH_USER
+Branch target is in user space
+.TP
+.B PERF_SAMPLE_BRANCH_KERNEL
+Branch target is in kernel space
+.TP
+.B PERF_SAMPLE_BRANCH_HV
+Branch target is in hypervisor
+.TP
+.B PERF_SAMPLE_BRANCH_ANY
+Any branch type.
+.TP
+.B PERF_SAMPLE_BRANCH_ANY_CALL
+Any call branch
+.TP
+.B PERF_SAMPLE_BRANCH_ANY_RETURN
+Any return branch
+.TP
+.BR PERF_SAMPLE_BRANCH_IND_CALL
+Indirect calls
+.TP
+.BR PERF_SAMPLE_BRANCH_PLM_ALL
+User, kernel, and hv
+.RE
+.TP
+.IR "sample_regs_user" " (Since Linux 3.7)"
+This defines the set of user registers to dump on samples.
+See
+.\" FIXME: The following reference seems to be not quite right:
+.IR asm/perf_regs.h .
+.TP
+.IR "sample_stack_user" " (Since Linux 3.7)"
+This defines the size of the user stack to dump on samples.
+.SS Reading results
+Once a
+.BR perf_event_open ()
+file descriptor has been opened, the values
+of the events can be read from the file descriptor.
+The values that are there are specified by the
+.I read_format
+field in the
+.I attr
+structure at open time.
+
+If you attempt to read into a buffer that is not big enough to hold the
+data
+.B ENOSPC
+is returned
+
+Here is the layout of the data returned by a read:
+.IP * 2
+If
+.B PERF_FORMAT_GROUP
+was specified to allow reading all events in a group at once:
+
+.in +4n
+.nf
+struct read_format {
+ u64 nr; /* The number of events */
+ u64 time_enabled; /* if PERF_FORMAT_TOTAL_TIME_ENABLED */
+ u64 time_running; /* if PERF_FORMAT_TOTAL_TIME_RUNNING */
+ struct
+ u64 value; /* The value of the event */
+ u64 id; /* if PERF_FORMAT_ID */
+ } values[nr];
+};
+.fi
+.in
+.IP *
+If
+.B PERF_FORMAT_GROUP
+was
+.I not
+specified:
+
+.in +4n
+.nf
+struct read_format {
+ u64 value; /* The value of the event */
+ u64 time_enabled; /* if PERF_FORMAT_TOTAL_TIME_ENABLED */
+ u64 time_running; /* if PERF_FORMAT_TOTAL_TIME_RUNNING */
+ u64 id; /* if PERF_FORMAT_ID */
+};
+.fi
+.in
+.PP
+The values read are as follows:
+.TP
+.I nr
+The number of events in this file descriptor.
+Only available if
+.B PERF_FORMAT_GROUP
+was specified.
+.TP
+.IR time_enabled ", " time_running
+Total time the event was enabled and running.
+Normally these are the same.
+If more events are started
+than available counter slots on the PMU, then multiplexing
+happens and events only run part of the time.
+In that case the
+.I time_enabled
+and
+.I time running
+values can be used to scale an estimated value for the count.
+.TP
+.I value
+An unsigned 64-bit value containing the counter result.
+.TP
+.I id
+A globally unique value for this particular event, only there if
+.B PERF_FORMAT_ID
+was specified in
+.IR read_format .
+.SS MMAP layout
+When using
+.BR perf_event_open ()
+in sampled mode, asynchronous events
+(like counter overflow or
+.B PROT_EXEC
+mmap tracking)
+are logged into a ring-buffer.
+This ring-buffer is created and accessed through
+.BR mmap (2).
+
+The mmap size should be 1+2^n pages, where the first page is a
+metadata page
+.RI ( "struct perf_event_mmap_page" )
+that contains various
+bits of information such as where the ring-buffer head is.
+
+Before kernel 2.6.39, there is a bug that means you must allocate a mmap
+ring buffer when sampling even if you do not plan to access it.
+
+The structure of the first metadata mmap page is as follows:
+
+.in +4n
+.nf
+struct perf_event_mmap_page {
+ __u32 version; /* version number of this structure */
+ __u32 compat_version; /* lowest version this is compat with */
+ __u32 lock; /* seqlock for synchronization */
+ __u32 index; /* hardware counter identifier */
+ __s64 offset; /* add to hardware counter value */
+ __u64 time_enabled; /* time event active */
+ __u64 time_running; /* time event on CPU */
+ union {
+ __u64 capabilities;
+ __u64 cap_usr_time : 1,
+ cap_usr_rdpmc : 1,
+ };
+ __u16 pmc_width;
+ __u16 time_shift;
+ __u32 time_mult;
+ __u64 time_offset;
+ __u64 __reserved[120]; /* Pad to 1k */
+ __u64 data_head; /* head in the data section */
+ __u64 data_tail; /* user-space written tail */
+}
+.fi
+.in
+
+The following looks at the fields in the
+.I perf_event_mmap_page
+structure in more detail:
+.TP
+.I version
+Version number of this structure.
+.TP
+.I compat_version
+The lowest version this is compatible with.
+.TP
+.I lock
+A seqlock for synchronization.
+.TP
+.I index
+A unique hardware counter identifier.
+.TP
+.I offset
+.\" FIXME clarify
+Add this to hardware counter value??
+.TP
+.I time_enabled
+Time the event was active.
+.TP
+.I time_running
+Time the event was running.
+.TP
+.I cap_usr_time
+User time capability
+.TP
+.I cap_usr_rdpmc
+If the hardware supports user-space read of performance counters
+without syscall (this is the "rdpmc" instruction on x86), then
+the following code can be used to do a read:
+
+.in +4n
+.nf
+u32 seq, time_mult, time_shift, idx, width;
+u64 count, enabled, running;
+u64 cyc, time_offset;
+s64 pmc = 0;
+
+do {
+ seq = pc\->lock;
+ barrier();
+ enabled = pc\->time_enabled;
+ running = pc\->time_running;
+
+ if (pc\->cap_usr_time && enabled != running) {
+ cyc = rdtsc();
+ time_offset = pc\->time_offset;
+ time_mult = pc\->time_mult;
+ time_shift = pc\->time_shift;
+ }
+
+ idx = pc\->index;
+ count = pc\->offset;
+
+ if (pc\->cap_usr_rdpmc && idx) {
+ width = pc\->pmc_width;
+ pmc = rdpmc(idx \- 1);
+ }
+
+ barrier();
+} while (pc\->lock != seq);
+.fi
+.in
+.TP
+.I pmc_width
+If
+.IR cap_usr_rdpmc ,
+this field provides the bit-width of the value
+read using the rdpmc or equivalent instruction.
+This can be used to sign extend the result like:
+
+.in +4n
+.nf
+pmc <<= 64 \- pmc_width;
+pmc >>= 64 \- pmc_width; // signed shift right
+count += pmc;
+.fi
+.in
+.TP
+.IR time_shift ", " time_mult ", " time_offset
+
+If
+.IR cap_usr_time ,
+these fields can be used to compute the time
+delta since time_enabled (in nanoseconds) using rdtsc or similar.
+.nf
+
+ u64 quot, rem;
+ u64 delta;
+ quot = (cyc >> time_shift);
+ rem = cyc & ((1 << time_shift) \- 1);
+ delta = time_offset + quot * time_mult +
+ ((rem * time_mult) >> time_shift);
+.fi
+
+Where
+.IR time_offset ,
+.IR time_mult ,
+.IR time_shift ,
+and
+.IR cyc
+are read in the
+seqcount loop described above.
+This delta can then be added to
+enabled and possible running (if idx), improving the scaling:
+.nf
+
+ enabled += delta;
+ if (idx)
+ running += delta;
+ quot = count / running;
+ rem = count % running;
+ count = quot * enabled + (rem * enabled) / running;
+.fi
+.TP
+.I data_head
+This points to the head of the data section.
+The value continuously increases, it does not wrap.
+The value needs to be manually wrapped by the size of the mmap buffer
+before accessing the samples.
+
+On SMP-capable platforms, after reading the data_head value,
+user space should issue an rmb().
+.TP
+.I data_tail;
+When the mapping is
+.BR PROT_WRITE ,
+the
+.I data_tail
+value should be written by user space to reflect the last read data.
+In this case the kernel will not over-write unread data.
+.PP
+The following 2^n ring-buffer pages have the layout described below.
+
+If
+.I perf_event_attr.sample_id_all
+is set, then all event types will
+have the sample_type selected fields related to where/when (identity)
+an event took place (TID, TIME, ID, CPU, STREAM_ID) described in
+.B PERF_RECORD_SAMPLE
+below, it will be stashed just after the
+.I perf_event_header
+and the fields already present for the existing
+fields, i.e., at the end of the payload.
+That way a newer perf.data
+file will be supported by older perf tools, with these new optional
+fields being ignored.
+
+The mmap values start with a header:
+
+.in +4n
+.nf
+struct perf_event_header {
+ __u32 type;
+ __u16 misc;
+ __u16 size;
+};
+.fi
+.in
+
+Below, we describe the
+.I perf_event_header
+fields in more detail.
+.TP
+.I type
+The
+.I type
+value is one of the below.
+The values in the corresponding record (that follows the header)
+depend on the
+.I type
+selected as shown.
+.RS
+.TP 4
+.B PERF_RECORD_MMAP
+The MMAP events record the
+.B PROT_EXEC
+mappings so that we can correlate
+user-space IPs to code.
+They have the following structure:
+
+.in +4n
+.nf
+struct {
+ struct perf_event_header header;
+ u32 pid, tid;
+ u64 addr;
+ u64 len;
+ u64 pgoff;
+ char filename[];
+};
+.fi
+.in
+.TP
+.B PERF_RECORD_LOST
+This record indicates when events are lost.
+
+.in +4n
+.nf
+struct {
+ struct perf_event_header header;
+ u64 id;
+ u64 lost;
+};
+.fi
+.in
+.RS
+.TP
+.I id
+is the unique event ID for the samples that were lost.
+.TP
+.I lost
+is the number of events that were lost.
+.RE
+.TP
+.B PERF_RECORD_COMM
+This record indicates a change in the process name.
+
+.in +4n
+.nf
+struct {
+ struct perf_event_header header;
+ u32 pid, tid;
+ char comm[];
+};
+.fi
+.in
+.TP
+.B PERF_RECORD_EXIT
+This record indicates a process exit event.
+
+.in +4n
+.nf
+struct {
+ struct perf_event_header header;
+ u32 pid, ppid;
+ u32 tid, ptid;
+ u64 time;
+};
+.fi
+.in
+.TP
+.BR PERF_RECORD_THROTTLE ", " PERF_RECORD_UNTHROTTLE
+This record indicates a throttle/unthrottle event.
+
+.in +4n
+.nf
+struct {
+ struct perf_event_header header;
+ u64 time;
+ u64 id;
+ u64 stream_id;
+};
+.fi
+.in
+.TP
+.B PERF_RECORD_FORK
+This record indicates a fork event.
+
+.in +4n
+.nf
+struct {
+ struct perf_event_header header;
+ u32 pid, ppid;
+ u32 tid, ptid;
+ u64 time;
+};
+.fi
+.in
+.TP
+.B PERF_RECORD_READ
+This record indicates a read event.
+
+.in +4n
+.nf
+struct {
+ struct perf_event_header header;
+ u32 pid, tid;
+ struct read_format values;
+};
+.fi
+.in
+.TP
+.B PERF_RECORD_SAMPLE
+This record indicates a sample.
+
+.in +4n
+.nf
+struct {
+ struct perf_event_header header;
+ u64 ip; /* if PERF_SAMPLE_IP */
+ u32 pid, tid; /* if PERF_SAMPLE_TID */
+ u64 time; /* if PERF_SAMPLE_TIME */
+ u64 addr; /* if PERF_SAMPLE_ADDR */
+ u64 id; /* if PERF_SAMPLE_ID */
+ u64 stream_id; /* if PERF_SAMPLE_STREAM_ID */
+ u32 cpu, res; /* if PERF_SAMPLE_CPU */
+ u64 period; /* if PERF_SAMPLE_PERIOD */
+ struct read_format v; /* if PERF_SAMPLE_READ */
+ u64 nr; /* if PERF_SAMPLE_CALLCHAIN */
+ u64 ips[nr]; /* if PERF_SAMPLE_CALLCHAIN */
+ u32 size; /* if PERF_SAMPLE_RAW */
+ char data[size]; /* if PERF_SAMPLE_RAW */
+ u64 bnr; /* if PERF_SAMPLE_BRANCH_STACK */
+ struct perf_branch_entry lbr[bnr];
+ /* if PERF_SAMPLE_BRANCH_STACK */
+ u64 abi; /* if PERF_SAMPLE_REGS_USER */
+ u64 regs[weight(mask)];
+ /* if PERF_SAMPLE_REGS_USER */
+ u64 size; /* if PERF_SAMPLE_STACK_USER */
+ char data[size]; /* if PERF_SAMPLE_STACK_USER */
+ u64 dyn_size; /* if PERF_SAMPLE_STACK_USER */
+};
+.fi
+.RS
+.TP
+.I ip
+If
+.B PERF_SAMPLE_IP
+is enabled, then a 64-bit instruction
+pointer value is included.
+.TP
+.IR pid ", " tid
+If
+.B PERF_SAMPLE_TID
+is enabled, then a 32-bit process ID
+and 32-bit thread ID are included.
+.TP
+.I time
+If
+.B PERF_SAMPLE_TIME
+is enabled, then a 64-bit timestamp
+is included.
+This is obtained via local_clock() which is a hardware timestamp
+if available and the jiffies value if not.
+.TP
+.I addr
+If
+.B PERF_SAMPLE_ADDR
+is enabled, then a 64-bit address is included.
+This is usually the address of a tracepoint,
+breakpoint, or software event; otherwise the value is 0.
+.TP
+.I id
+If
+.B PERF_SAMPLE_ID
+is enabled, a 64-bit unique ID is included.
+If the event is a member of an event group, the group leader ID is returned.
+This ID is the same as the one returned by
+.BR PERF_FORMAT_ID .
+.TP
+.I stream_id
+If
+.B PERF_SAMPLE_STREAM_ID
+is enabled, a 64-bit unique ID is included.
+Unlike
+.B PERF_SAMPLE_ID
+the actual ID is returned, not the group leader.
+This ID is the same as the one returned by
+.BR PERF_FORMAT_ID .
+.TP
+.IR cpu ", " res
+If
+.B PERF_SAMPLE_CPU
+is enabled, this is a 32-bit value indicating
+which CPU was being used, in addition to a reserved (unused)
+32-bit value.
+.TP
+.I period
+If
+.B PERF_SAMPLE_PERIOD
+is enabled, a 64-bit value indicating
+the current sampling period is written.
+.TP
+.I v
+If
+.B PERF_SAMPLE_READ
+is enabled, a structure of type read_format
+is included which has values for all events in the event group.
+The values included depend on the
+.I read_format
+value used at
+.BR perf_event_open ()
+time.
+.TP
+.IR nr ", " ips[nr]
+If
+.B PERF_SAMPLE_CALLCHAIN
+is enabled, then a 64-bit number is included
+which indicates how many following 64-bit instruction pointers will
+follow.
+This is the current callchain.
+.TP
+.IR size ", " data[size]
+If
+.B PERF_SAMPLE_RAW
+is enabled, then a 32-bit value indicating size
+is included followed by an array of 8-bit values of length size.
+The values are padded with 0 to have 64-bit alignment.
+
+This RAW record data is opaque with respect to the ABI.
+The ABI doesn't make any promises with respect to the stability
+of its content, it may vary depending
+on event, hardware, and kernel version.
+.TP
+.IR bnr ", " lbr[bnr]
+If
+.B PERF_SAMPLE_BRANCH_STACK
+is enabled, then a 64-bit value indicating
+the number of records is included, followed by
+.I bnr
+.I perf_branch_entry
+structures.
+These structures have from, to, and flags values indicating
+the from and to addresses from the branches on the callstack.
+.TP
+.IR abi ", " regs[weight(mask)]
+If
+.B PERF_SAMPLE_REGS_USER
+is enabled, then
+[to be documented].
+
+The
+.I abi
+field is one of
+.BR PERF_SAMPLE_REGS_ABI_NONE ", " PERF_SAMPLE_REGS_ABI_32 " or "
+.BR PERF_SAMPLE_REGS_ABI_64 .
+.TP
+.IR size ", " data[size] ", " dyn_size
+If
+.B PERF_SAMPLE_STACK_USER
+is enabled, then
+[to be documented].
+.RE
+.RE
+.TP
+.I misc
+The
+.I misc
+field contains additional information about the sample.
+
+The CPU mode can be determined from this value by masking with
+.B PERF_RECORD_MISC_CPUMODE_MASK
+and looking for one of the following (note these are not
+bit masks, only one can be set at a time):
+.RS
+.TP
+.B PERF_RECORD_MISC_CPUMODE_UNKNOWN
+Unknown CPU mode.
+.TP
+.B PERF_RECORD_MISC_KERNEL
+Sample happened in the kernel.
+.TP
+.B PERF_RECORD_MISC_USER
+Sample happened in user code.
+.TP
+.B PERF_RECORD_MISC_HYPERVISOR
+Sample happened in the hypervisor.
+.TP
+.B PERF_RECORD_MISC_GUEST_KERNEL
+Sample happened in the guest kernel.
+.TP
+.B PERF_RECORD_MISC_GUEST_USER
+Sample happened in guest user code.
+.RE
+
+In addition, one of the following bits can be set:
+.RS
+.TP
+.B PERF_RECORD_MISC_EXACT_IP
+This indicates that the content of
+.B PERF_SAMPLE_IP
+points
+to the actual instruction that triggered the event.
+See also
+.IR perf_event_attr.precise_ip .
+.TP
+.B PERF_RECORD_MISC_EXT_RESERVED
+This indicates there is extended data available (currently not used).
+.TP
+.I size
+This indicates the size of the record.
+.RE
+.SS Signal overflow
+Events can be set to deliver a signal when a threshold is crossed.
+The signal handler is set up using the
+.BR poll (2),
+.BR select (2),
+.BR epoll (2)
+and
+.BR fcntl (2),
+system calls.
+
+To generate signals, sampling must be enabled
+.RI ( sample_period
+must have a non-zero value).
+
+There are two ways to generate signals.
+
+The first is to set a
+.I wakeup_events
+or
+.I wakeup_watermark
+value that will generate a signal if a certain number of samples
+or bytes have been written to the mmap ring buffer.
+In this case a signal of type
+.B POLL_IN
+is sent.
+
+The other way is by use of the
+.B PERF_EVENT_IOC_REFRESH
+ioctl.
+This ioctl adds to a counter that decrements each time the event overflows.
+When non-zero, a
+.B POLL_IN
+signal is sent on overflow, but
+once the value reaches 0, a signal is sent of type
+.B POLL_HUP
+and
+the underlying event is disabled.
+
+Note: on newer kernels (definitely noticed with 3.2)
+.\" FIXME(Vince) : Find out when this was introduced
+a signal is provided for every overflow, even if
+.I wakeup_events
+is not set.
+.SS rdpmc instruction
+Starting with Linux 3.4 on x86, you can use the
+.I rdpmc
+instruction to get low-latency reads without having to enter the kernel.
+Note that using
+.I rdpmc
+is not necessarily faster than other methods for reading event values.
+
+Support for this can be detected with the
+.I cap_usr_rdpmc
+field in the mmap page; documentation on how
+to calculate event values can be found in that section.
+.SS perf_event ioctl calls
+.PP
+Various ioctls act on
+.BR perf_event_open ()
+file descriptors
+.TP
+.B PERF_EVENT_IOC_ENABLE
+Enables the individual event or event group specified by the
+file descriptor argument.
+
+The ioctl argument is ignored.
+.TP
+.B PERF_EVENT_IOC_DISABLE
+Disables the individual counter or event group specified by the
+file descriptor argument.
+
+Enabling or disabling the leader of a group enables or disables the
+entire group; that is, while the group leader is disabled, none of the
+counters in the group will count.
+Enabling or disabling a member of a group other than the leader only
+affects that counter; disabling a non-leader
+stops that counter from counting but doesn't affect any other counter.
+
+The ioctl argument is ignored.
+.TP
+.B PERF_EVENT_IOC_REFRESH
+Non-inherited overflow counters can use this
+to enable a counter for a number of overflows specified by the argument,
+after which it is disabled.
+Subsequent calls of this ioctl add the argument value to the current
+count.
+A signal with
+.B POLL_IN
+set will happen on each overflow until the
+count reaches 0; when that happens a signal with
+POLL_HUP
+set is sent and the event is disabled.
+Using an argument of 0 is considered undefined behavior.
+.TP
+.B PERF_EVENT_IOC_RESET
+Reset the event count specified by the
+file descriptor argumentto zero.
+This only resets the counts; there is no way to reset the
+multiplexing
+.I time_enabled
+or
+.I time_running
+values.
+When sent to a group leader, only
+the leader is reset (child events are not).
+
+The ioctl argument is ignored.
+.TP
+.B PERF_EVENT_IOC_PERIOD
+IOC_PERIOD is the command to update the period; it
+does not update the current period but instead defers until next.
+
+The argument is a pointer to a 64-bit value containing the
+desired new period.
+.TP
+.B PERF_EVENT_IOC_SET_OUTPUT
+This tells the kernel to report event notifications to the specified
+file descriptor rather than the default one.
+The file descriptors must all be on the same CPU.
+
+The argument specifies the desired file descriptor, or \-1 if
+output should be ignored.
+.TP
+.BR PERF_EVENT_IOC_SET_FILTER " (Since Linux 2.6.33)"
+This adds an ftrace filter to this event.
+
+The argument is a pointer to the desired ftrace filter.
+.SS Using prctl
+A process can enable or disable all the event groups that are
+attached to it using the
+.BR prctl (2)
+.B PR_TASK_PERF_EVENTS_ENABLE
+and
+.B PR_TASK_PERF_EVENTS_DISABLE
+operations.
+This applies to all counters on the current process, whether created by
+this process or by another, and does not affect any counters that this
+process has created on other processes.
+It only enables or disables
+the group leaders, not any other members in the groups.
+.SS perf_event related configuration files
+Files in
+.I /proc/sys/kernel/
+.RS 4
+.TP
+.I /proc/sys/kernel/perf_event_paranoid
+
+The
+.I perf_event_paranoid
+file can be set to restrict access to the performance counters.
+
+2 - only allow user-space measurements
+
+1 - (default) allow both kernel and user measurements
+
+0 - allow access to CPU-specific data but not raw tracepoint samples
+
+\-1 - no restrictions
+
+The existence of the
+.I perf_event_paranoid
+file is the official method for determining if a kernel supports
+.BR perf_event_open ().
+.TP
+.I /proc/sys/kernel/perf_event_max_sample_rate
+
+This sets the maximum sample rate.
+Setting this too high can allow
+users to sample at a rate that impacts overall machine performance
+and potentially lock up the machine.
+The default value is
+100000 (samples per second).
+.TP
+.I /proc/sys/kernel/perf_event_mlock_kb
+
+Maximum number of pages an unprivileged user can mlock (2) .
+The default is 516 (kB).
+.RE
+Files in
+.I /sys/bus/event_source/devices/
+.RS 4
+Since Linux 2.6.34 the kernel supports having multiple PMUs
+available for monitoring.
+Information on how to program these PMUs can be found under
+.IR /sys/bus/event_source/devices/ .
+Each subdirectory corresponds to a different PMU.
+.TP
+.I /sys/bus/event_source/devices/*/type
+This contains an integer that can be used in the
+.I type
+field of perf_event_attr to indicate you wish to use this PMU.
+.TP
+.I /sys/bus/event_source/devices/*/rdpmc
+[To be documented]
+.TP
+.I /sys/bus/event_source/devices/*/format/
+This sub-directory contains information on what bits in the
+.I config
+field of perf_event_attr correspond to.
+.TP
+.I /sys/bus/event_source/devices/*/events/
+This sub-directory contains files with pre-defined events.
+The contents are strings describing the event settings
+expressed in terms of the fields found in the
+.I ./format/
+directory.
+These are not necessarily complete lists of all events supported by
+a PMU, but usually a subset of events deemed useful or interesting.
+.TP
+.I /sys/bus/event_source/devices/*/uevent
+[To be documented]
+.RE
+.SH RETURN VALUE
+.BR perf_event_open ()
+returns the new file descriptor, or \-1 if an error occurred
+(in which case,
+.I errno
+is set appropriately).
+.SH ERRORS
+.TP
+.B EINVAL
+Returned if the specified event is not available.
+.TP
+.B ENOSPC
+Prior to Linux 3.3, if there was not enough room for the event,
+.B ENOSPC
+was returned.
+Linus did not like this, and this was changed to
+.BR EINVAL .
+.B ENOSPC
+is still returned if you try to read results into
+too small of a buffer.
+.SH VERSION
+.BR perf_event_open ()
+was introduced in Linux 2.6.31 but was called
+.BR perf_counter_open () .
+It was renamed in Linux 2.6.32.
+.SH CONFORMING TO
+This
+.BR perf_event_open ()
+system call Linux- specific
+and should not be used in programs intended to be portable.
+.SH NOTES
+Glibc does not provide a wrapper for this system call; call it using
+.BR syscall (2).
+See the example below.
+
+The official way of knowing if
+.BR perf_event_open ()
+support is enabled is checking
+for the existence of the file
+.IR /proc/sys/kernel/perf_event_paranoid .
+.SH BUGS
+The
+.B F_SETOWN_EX
+option to
+.BR fcntl (2)
+is needed to properly get overflow signals in threads.
+This was introduced in Linux 2.6.32.
+
+Prior to Linux 2.6.33 (at least for x86) the kernel did not check
+if events could be scheduled together until read time.
+The same happens on all known kernels if the NMI watchdog is enabled.
+This means to see if a given set of events works you have to
+.BR perf_event_open (),
+start, then read before you know for sure you
+can get valid measurements.
+
+Prior to Linux 2.6.34 event constraints were not enforced by the kernel.
+In that case, some events would silently return "0" if the kernel
+scheduled them in an improper counter slot.
+
+Prior to Linux 2.6.34 there was a bug when multiplexing where the
+wrong results could be returned.
+
+Kernels from Linux 2.6.35 to Linux 2.6.39 can quickly crash the kernel if
+"inherit" is enabled and many threads are started.
+
+Prior to Linux 2.6.35,
+.B PERF_FORMAT_GROUP
+did not work with attached processes.
+
+In older Linux 2.6 versions,
+refreshing an event group leader refreshed all siblings,
+and refreshing with a parameter of 0 enabled infinite refresh.
+This behavior is unsupported and should not be relied on.
+
+There is a bug in the kernel code between
+Linux 2.6.36 and Linux 3.0 that ignores the
+"watermark" field and acts as if a wakeup_event
+was chosen if the union has a
+non-zero value in it.
+
+Always double-check your results!
+Various generalized events have had wrong values.
+For example, retired branches measured
+the wrong thing on AMD machines until Linux 2.6.35.
+.SH EXAMPLE
+The following is a short example that measures the total
+instruction count of a call to
+.BR printf (3).
+.nf
+
+#include <stdlib.h>
+#include <stdio.h>
+#include <unistd.h>
+#include <string.h>
+#include <sys/ioctl.h>
+#include <linux/perf_event.h>
+#include <asm/unistd.h>
+
+long
+perf_event_open(struct perf_event_attr *hw_event, pid_t pid,
+ int cpu, int group_fd, unsigned long flags)
+{
+ int ret;
+
+ ret = syscall(__NR_perf_event_open, hw_event, pid, cpu,
+ group_fd, flags);
+ return ret;
+}
+
+int
+main(int argc, char **argv)
+{
+ struct perf_event_attr pe;
+ long long count;
+ int fd;
+
+ memset(&pe, 0, sizeof(struct perf_event_attr));
+ pe.type = PERF_TYPE_HARDWARE;
+ pe.size = sizeof(struct perf_event_attr);
+ pe.config = PERF_COUNT_HW_INSTRUCTIONS;
+ pe.disabled = 1;
+ pe.exclude_kernel = 1;
+ pe.exclude_hv = 1;
+
+ fd = perf_event_open(&pe, 0, \-1, \-1, 0);
+ if (fd == \-1) {
+ fprintf(stderr, "Error opening leader %llx\\n", pe.config);
+ exit(EXIT_FAILURE);
+ }
+
+ ioctl(fd, PERF_EVENT_IOC_RESET, 0);
+ ioctl(fd, PERF_EVENT_IOC_ENABLE, 0);
+
+ printf("Measuring instruction count for this printf\\n");
+
+ ioctl(fd, PERF_EVENT_IOC_DISABLE, 0);
+ read(fd, &count, sizeof(long long));
+
+ printf("Used %lld instructions\\n", count);
+
+ close(fd);
+}
+.fi
+.SH SEE ALSO
+.BR fcntl (2),
+.BR mmap (2),
+.BR open (2),
+.BR prctl (2),
+.BR read (2)
--- /dev/null
+.\" Copyright (C) 2006 Red Hat, Inc. All Rights Reserved.
+.\" and Copyright (C) 2013 Michael Kerrisk <mtk.manpages@gmail.com>
+.\" Written by Ivana Varekova <varekova@redhat.com>
+.\"
+.\" %%%LICENSE_START(VERBATIM)
+.\" Permission is granted to make and distribute verbatim copies of this
+.\" manual provided the copyright notice and this permission notice are
+.\" preserved on all copies.
+.\"
+.\" Permission is granted to copy and distribute modified versions of this
+.\" manual under the conditions for verbatim copying, provided that the
+.\" entire resulting derived work is distributed under the terms of a
+.\" permission notice identical to this one.
+.\"
+.\" Since the Linux kernel and libraries are constantly changing, this
+.\" manual page may be incorrect or out-of-date. The author(s) assume no
+.\" responsibility for errors or omissions, or for damages resulting from
+.\" the use of the information contained herein. The author(s) may not
+.\" have taken the same level of care in the production of this manual,
+.\" which is licensed free of charge, as they might when working
+.\" professionally.
+.\"
+.\" Formatted or processed versions of this manual, if unaccompanied by
+.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
+.\"
+.TH PERFMONCTL 2 2013-02-13 Linux "Linux Programmer's Manual"
+.SH NAME
+perfmonctl \- interface to IA-64 performance monitoring unit
+.SH SYNOPSIS
+.nf
+.B #include <syscall.h>
+.B #include <perfmon.h>
+.sp
+.BI "long perfmonctl(int " fd ", int " cmd ", void *" arg ", int " narg ");
+.fi
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
+.SH DESCRIPTION
+The IA-64-specific
+.BR perfmonctl ()
+system call provides an interface to the
+PMU (performance monitoring unit).
+The PMU consists of PMD (performance monitoring data) registers and
+PMC (performance monitoring control) registers,
+which gather hardware statistics.
+
+.BR perfmonctl ()
+applies the operation
+.I cmd
+to the input arguments specified by
+.IR arg .
+The number of arguments is defined by \fInarg\fR.
+The
+.I fd
+argument specifies the perfmon context to operate on.
+
+Supported values for
+.I cmd
+are:
+.TP
+.B PFM_CREATE_CONTEXT
+.nf
+.BI "perfmonctl(int " fd ", PFM_CREATE_CONTEXT, pfarg_context_t *" ctxt ", 1);
+.fi
+Set up a context.
+
+The
+.I fd
+parameter is ignored.
+A new perfmon context is created as specified in
+.I ctxt
+and its file descriptor is returned in \fIctxt->ctx_fd\fR.
+
+The file descriptor can be used in subsequent calls to
+.BR perfmonctl ()
+and can be used to read event notifications (type
+.IR pfm_msg_t )
+using
+.BR read (2).
+The file descriptor is pollable using
+.BR select (2),
+.BR poll (2),
+and
+.BR epoll (7).
+
+The context can be destroyed by calling
+.BR close (2)
+on the file descriptor.
+.TP
+.B PFM_WRITE_PMCS
+.\" pfm_write_pmcs()
+.nf
+.BI "perfmonctl(int " fd ", PFM_WRITE_PMCS, pfarg_reg_t *" pmcs ", n);
+.fi
+Set PMC registers.
+.TP
+.B PFM_WRITE_PMDS
+.nf
+.BI "perfmonctl(int " fd ", PFM_WRITE_PMDS, pfarg_reg_t *" pmds ", n);
+.fi
+.\" pfm_write_pmds()
+Set PMD registers.
+.TP
+.B PFM_READ_PMDS
+.\" pfm_read_pmds()
+.nf
+.BI "perfmonctl(int " fd ", PFM_READ_PMDS, pfarg_reg_t *" pmds ", n);
+.fi
+Read PMD registers.
+.TP
+.B PFM_START
+.\" pfm_start()
+.nf
+.\" .BI "perfmonctl(int " fd ", PFM_START, arg, 1);
+.BI "perfmonctl(int " fd ", PFM_START, NULL, 0);
+.fi
+Start monitoring.
+.TP
+.B PFM_STOP
+.\" pfm_stop()
+.nf
+.BI "perfmonctl(int " fd ", PFM_STOP, NULL, 0);
+.fi
+Stop monitoring.
+.TP
+.B PFM_LOAD_CONTEXT
+.\" pfm_context_load()
+.nf
+.BI "perfmonctl(int " fd ", PFM_LOAD_CONTEXT, pfarg_load_t *" largs ", 1);
+.fi
+Attach the context to a thread.
+.TP
+.B PFM_UNLOAD_CONTEXT
+.\" pfm_context_unload()
+.nf
+.BI "perfmonctl(int " fd ", PFM_UNLOAD_CONTEXT, NULL, 0);
+.fi
+Detach the context from a thread.
+.TP
+.B PFM_RESTART
+.\" pfm_restart()
+.nf
+.BI "perfmonctl(int " fd ", PFM_RESTART, NULL, 0);
+.fi
+Restart monitoring after receiving an overflow notification.
+.TP
+.B PFM_GET_FEATURES
+.\" pfm_get_features()
+.nf
+.BI "perfmonctl(int " fd ", PFM_GET_FEARURES, pfarg_features_t *" arg ", 1);
+.fi
+.TP
+.B PFM_DEBUG
+.\" pfm_debug()
+.nf
+.BI "perfmonctl(int " fd ", PFM_DEBUG, " val ", 0);
+.fi
+If
+.I val
+is nonzero, enable debugging mode, otherwise disable.
+.TP
+.B PFM_GET_PMC_RESET_VAL
+.\" pfm_get_pmc_reset()
+.nf
+.BI "perfmonctl(int " fd ", PFM_GET_PMC_RESET_VAL, pfarg_reg_t * " req ", n);
+.fi
+Reset PMC registers to default values.
+.\"
+.\"
+.\" .TP
+.\" .B PFM_CREATE_EVTSETS
+.\"
+.\" create or modify event sets
+.\" .nf
+.\" .BI "perfmonctl(int " fd ", PFM_CREATE_EVTSETS, pfarg_setdesc_t *desc , n);
+.\" .fi
+.\" .TP
+.\" .B PFM_DELETE_EVTSETS
+.\" delete event sets
+.\" .nf
+.\" .BI "perfmonctl(int " fd ", PFM_DELETE_EVTSET, pfarg_setdesc_t *desc , n);
+.\" .fi
+.\" .TP
+.\" .B PFM_GETINFO_EVTSETS
+.\" get information about event sets
+.\" .nf
+.\" .BI "perfmonctl(int " fd ", PFM_GETINFO_EVTSETS, pfarg_setinfo_t *info, n);
+.\" .fi
+.SH RETURN VALUE
+.BR performctl ()
+returns zero when the operation is successful.
+On error, \-1 is returned and
+.I errno
+is set to indicate the cause of the error.
+.SH VERSIONS
+.BR perfmonctl ()
+is available since Linux 2.4.
+.SH CONFORMING TO
+.BR perfmonctl ()
+is Linux specific and is available only on the IA-64 architecture.
+.SH NOTES
+Glibc does not provide a wrapper for this system call; call it using
+.BR syscall (2).
+.SH SEE ALSO
+.BR gprof (1)
+
+The perfmon2 interface specification
.\" Copyright (C) 1995, Thomas K. Dyas <tdyas@eden.rutgers.edu>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Created Sat Aug 21 1995 Thomas K. Dyas <tdyas@eden.rutgers.edu>
.\"
referenced by
.I persona
the new execution domain of the calling process.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, the previous
.I persona
is returned.
.TP
.B EINVAL
The kernel was unable to change the personality.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR personality ()
is Linux-specific and should not be used in programs intended to
be portable.
--- /dev/null
+.so man2/unimplemented.2
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2005, 2008, Michael Kerrisk <mtk.manpages@gmail.com>
.\" (A few fragments remain from an earlier (1992) version by
.\" Drew Eckhardt <drew@cs.colorado.edu>.)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified by Michael Haardt <michael@moria.de>
.\" Modified 1993-07-23 by Rik Faith <faith@cs.unc.edu>
See the description of the same flag in
.BR open (2)
for reasons why this may be useful.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
was added to Linux in version 2.6.27;
glibc support is available starting with
version 2.9.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR pipe ():
POSIX.1-2001.
}
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fork (2),
.BR read (2),
.BR socketpair (2),
.\" Copyright (C) 2000 by Werner Almesberger
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" May be distributed under GPL
+.\" %%%LICENSE_END
.\"
.\" Written 2000-02-23 by Werner Almesberger
.\" Modified 2004-06-17 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
-.TH PIVOT_ROOT 2 2007-06-01 "Linux" "Linux Programmer's Manual"
+.TH PIVOT_ROOT 2 2012-07-13 "Linux" "Linux Programmer's Manual"
.SH NAME
pivot_root \- change the root file system
.SH SYNOPSIS
.BI "int pivot_root(const char *" new_root ", const char *" put_old );
+
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
.SH DESCRIPTION
.BR pivot_root ()
moves the root file system of the calling process to the
In this case,
\fI/proc/mounts\fP will show the mount point of the file system containing
\fInew_root\fP as root (\fI/\fP).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
\fIerrno\fP is set appropriately.
.SH VERSIONS
.BR pivot_root ()
was introduced in Linux 2.3.41.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR pivot_root ()
is Linux-specific and hence is not portable.
.SH NOTES
.BR pivot_root ()
may quickly lead to
insanity.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR chdir (2),
.BR chroot (2),
.BR stat (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 1997 Andries Brouwer (aeb@cwi.nl)
.\" and Copyright (C) 2006, Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Additions from Richard Gooch <rgooch@atnf.CSIRO.AU> and aeb, 971207
.\" 2006-03-13, mtk, Added ppoll() + various other rewordings
.\" 2006-07-01, mtk, Added POLLRDHUP + various other wording and
.\" formatting changes.
.\"
-.TH POLL 2 2012-05-05 "Linux" "Linux Programmer's Manual"
+.TH POLL 2 2012-08-17 "Linux" "Linux Programmer's Manual"
.SH NAME
poll, ppoll \- wait for some event on a file descriptor
.SH SYNOPSIS
is specified as NULL, then
.BR ppoll ()
can block indefinitely.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, a positive number is returned; this is
the number of structures which have nonzero
.I revents
The
.BR ppoll ()
library call was added in glibc 2.4.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR poll ()
conforms to POSIX.1-2001.
.BR ppoll ()
for
.BR poll ().
This constant is not provided in glibc.
-.SS "Linux Notes"
+
+For a discussion of what may happen if a file descriptor being monitored by
+.BR poll ()
+is closed in another thread, see
+.BR select (2).
+.SS Linux notes
The Linux
.BR ppoll ()
system call modifies its
See the discussion of spurious readiness notifications under the
BUGS section of
.BR select (2).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR select (2),
.BR select_tut (2),
.BR time (7)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 2003 Abhijit Menon-Sen <ams@wiw.org>
+.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 2005-04-08 mtk, noted kernel version and added BUGS
.\" 2010-10-09, mtk, document arm_fadvise64_64()
.TP
.B POSIX_FADV_DONTNEED
The specified data will not be accessed in the near future.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, an error number is returned.
.SH ERRORS
Library support has been provided since glibc version 2.2,
via the wrapper function
.BR posix_fadvise ().
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
Note that the type of the
.I len
.I len
was specified as 0, then this was interpreted literally as "zero bytes",
rather than as meaning "all bytes through to the end of the file".
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR readahead (2),
.BR sync_file_range (2),
.BR posix_fallocate (3),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 1998 Andries Brouwer (aeb@cwi.nl)
-.\" and Copyright (C) 2002 Michael Kerrisk <mtk.manpages@gmail.com>
+.\" and Copyright (C) 2002, 2006, 2008, 2012, 2013 Michael Kerrisk <mtk.manpages@gmail.com>
.\" and Copyright Guillem Jover <guillem@hadrons.org>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified Thu Nov 11 04:19:42 MET 1999, aeb: added PR_GET_PDEATHSIG
.\" Modified 27 Jun 02, Michael Kerrisk
.\" 2012-04 Cyrill Gorcunov, Document PR_SET_MM
.\" 2012-04-25 Michael Kerrisk, Document PR_TASK_PERF_EVENTS_DISABLE and
.\" PR_TASK_PERF_EVENTS_ENABLE
+.\" 2012-09-20 Kees Cook, update PR_SET_SECCOMP for mode 2
+.\" 2012-09-20 Kees Cook, document PR_SET_NO_NEW_PRIVS, PR_GET_NO_NEW_PRIVS
+.\" 2012-10-25 Michael Kerrisk, Document PR_SET_TIMERSLACK and
+.\" PR_GET_TIMERSLACK
+.\" 2013-01-10 Kees Cook, document PR_SET_PTRACER
+.\" 2012-02-04 Michael kerrisk, document PR_{SET,GET}_CHILD_SUBREAPER
.\"
-.\" FIXME: Document PR_SET_TIMERSLACK and PR_GET_TIMERSLACK (new in 2.6.28)
-.\" commit 6976675d94042fbd446231d1bd8b7de71a980ada
.\"
-.TH PRCTL 2 2012-04-23 "Linux" "Linux Programmer's Manual"
+.TH PRCTL 2 2013-02-25 "Linux" "Linux Programmer's Manual"
.SH NAME
prctl \- operations on a process
.SH SYNOPSIS
if file capabilities are not enabled in the kernel,
in which case bounding sets are not supported.
.TP
+.BR PR_SET_CHILD_SUBREAPER " (since Linux 3.4)"
+.\" commit ebec18a6d3aa1e7d84aab16225e87fd25170ec2b
+If
+.I arg2
+is nonzero,
+set the "child subreaper" attribute of the calling process;
+if
+.I arg2
+is zero, unset the attribute.
+When a process is marked as a child subreaper,
+all of the children that it creates, and their descendants,
+will be marked as having a subreaper.
+In effect, a subreaper fulfills the role of
+.BR init (1)
+for its descendant processes.
+Upon termination of a process
+that is orphaned (i.e., its immediate parent has already terminated)
+and marked as having a subreaper,
+the nearest still living ancestor subreaper
+will receive a
+.BR SIGCHLD
+signal and be able to
+.BR wait (2)
+on the process to discover its termination status.
+.TP
+.BR PR_GET_CHILD_SUBREAPER " (since Linux 3.4)"
+Return the "child subreaper" setting of the caller,
+in the location pointed to by
+.IR "(int\ *) arg2" .
+.TP
.BR PR_SET_DUMPABLE " (since Linux 2.3.20)"
Set the state of the flag determining whether core dumps are produced
-for this process upon delivery of a signal whose default behavior is
+for the calling process upon delivery of a signal whose default behavior is
to produce a core dump.
-(Normally this flag is set for a process by default, but it is cleared
+(Normally, this flag is set for a process by default, but it is cleared
when a set-user-ID or set-group-ID program is executed and also by
various system calls that manipulate process UIDs and GIDs).
In kernels up to and including 2.6.12,
in
.BR proc (5).)
Processes that are not dumpable can not be attached via
-.BR ptrace(2)
+.BR ptrace (2)
.BR PTRACE_ATTACH .
.TP
.BR PR_GET_DUMPABLE " (since Linux 2.3.20)"
"keep capabilities" flag.
.TP
.BR PR_SET_NAME " (since Linux 2.6.9)"
-Set the process name for the calling process,
+Set the process name for the calling thread,
using the value in the location pointed to by
.IR "(char\ *) arg2" .
The name can be up to 16 bytes long,
and should be null-terminated if it contains fewer bytes.
.TP
.BR PR_GET_NAME " (since Linux 2.6.11)"
-Return the process name for the calling process,
+Return the name for the calling thread,
in the buffer pointed to by
.IR "(char\ *) arg2" .
The buffer should allow space for up to 16 bytes;
the returned string will be null-terminated if it is shorter than that.
.TP
+.BR PR_SET_NO_NEW_PRIVS " (since Linux 3.5)"
+Set the calling process's
+.I no_new_privs
+bit to the value in
+.IR arg2 .
+With
+.I no_new_privs
+set to 1,
+.BR execve (2)
+promises not to grant privileges to do anything
+that could not have been done without the
+.BR execve (2)
+call (for example,
+rendering the set-user-ID and set-group-ID permission bits,
+and file capabilities non-functional).
+Once set, this bit cannot be unset.
+The setting of this bit is inherited by children created by
+.BR fork (2)
+and
+.BR clone (2),
+and preserved across
+.BR execve (2).
+
+For more information, see the kernel source file
+.IR Documentation/prctl/no_new_privs.txt .
+.TP
+.BR PR_GET_NO_NEW_PRIVS " (since Linux 3.5)"
+Return the value of the
+.I no_new_privs
+bit for the current process.
+A value of 0 indicates the regular
+.BR execve (2)
+behavior.
+A value of 1 indicates
+.BR execve (2)
+will operate in the privilege-restricting mode described above.
+.TP
.BR PR_SET_PDEATHSIG " (since Linux 2.1.57)"
Set the parent process death signal
of the calling process to \fIarg2\fP (either a signal value
parent dies.
This value is cleared for the child of a
.BR fork (2)
-and (since Linux 2.5.36 / 2.6.23)
-when executing a set-user_ID or set-group-ID binary.
+and (since Linux 2.4.36 / 2.6.23)
+when executing a set-user-ID or set-group-ID binary.
.TP
.BR PR_GET_PDEATHSIG " (since Linux 2.3.15)"
Return the current value of the parent process death signal,
in the location pointed to by
.IR "(int\ *) arg2" .
.TP
+.BR PR_SET_PTRACER " (since Linux 3.4)"
+.\" commit 2d514487faf188938a4ee4fb3464eeecfbdcf8eb
+.\" commit bf06189e4d14641c0148bea16e9dd24943862215
+This is only meaningful when the Yama LSM is enabled and in mode 1
+("restricted ptrace", visible via
+.IR /proc/sys/kernel/yama/ptrace_scope ).
+When a "ptracer process ID" is passed in \fIarg2\fP,
+the caller is declaring that the ptracer process can
+.BR ptrace (2)
+the calling process as if it were a direct process ancestor.
+Each
+.B PR_SET_PTRACER
+operation replaces the previous "ptracer process ID".
+Employing
+.B PR_SET_PTRACER
+with
+.I arg2
+set to 0 clears the caller's "ptracer process ID".
+If
+.I arg2
+is
+.BR PR_SET_PTRACER_ANY,
+the ptrace restrictions introduced by Yama are effectively disabled for the
+calling process.
+
+For further information, see the kernel source file
+.IR Documentation/security/Yama.txt .
+.TP
.BR PR_SET_SECCOMP " (since Linux 2.6.23)"
.\" See http://thread.gmane.org/gmane.linux.kernel/542632
.\" [PATCH 0 of 2] seccomp updates
.\" andrea@cpushare.com
-Set the secure computing mode for the calling thread.
-In the current implementation,
+Set the secure computing (seccomp) mode for the calling thread, to limit
+the available system calls.
+The seccomp mode is selected via
+.IR arg2 .
+(The seccomp constants are defined in
+.IR <linux/seccomp.h> .)
+
+With
.IR arg2
-must be 1.
-After the secure computing mode has been set to 1,
+set to
+.BR SECCOMP_MODE_STRICT
the only system calls that the thread is permitted to make are
.BR read (2),
.BR write (2),
Other system calls result in the delivery of a
.BR SIGKILL
signal.
-Secure computing mode is useful for number-crunching applications
+Strict secure computing mode is useful for number-crunching applications
that may need to execute untrusted byte code,
perhaps obtained by reading from a pipe or socket.
This operation is only available
-if the kernel is configured with CONFIG_SECCOMP enabled.
+if the kernel is configured with
+.B CONFIG_SECCOMP
+enabled.
+
+With
+.IR arg2
+set to
+.BR SECCOMP_MODE_FILTER " (since Linux 3.5)"
+the system calls allowed are defined by a pointer
+to a Berkeley Packet Filter passed in
+.IR arg3 .
+This argument is a pointer to
+.IR "struct sock_fprog" ;
+it can be designed to filter
+arbitrary system calls and system call arguments.
+This mode is only available if the kernel is configured with
+.B CONFIG_SECCOMP_FILTER
+enabled.
+
+If
+.BR SECCOMP_MODE_FILTER
+filters permit
+.BR fork (2),
+then the seccomp mode is inherited by children created by
+.BR fork (2);
+if
+.BR execve (2)
+is permitted, then the seccomp mode is preserved across
+.BR execve (2).
+If the filters permit
+.BR prctl ()
+calls, then additional filters can be added;
+they are run in order until the first non-allow result is seen.
+
+For further information, see the kernel source file
+.IR Documentation/prctl/seccomp_filter.txt .
.TP
.BR PR_GET_SECCOMP " (since Linux 2.6.23)"
Return the secure computing mode of the calling thread.
-Not very useful for the current implementation (mode equals 1),
-but may be useful for other possible future modes:
-if the caller is not in secure computing mode, this operation returns 0;
-if the caller is in secure computing mode, then the
+If the caller is not in secure computing mode, this operation returns 0;
+if the caller is in strict secure computing mode, then the
.BR prctl ()
call will cause a
.B SIGKILL
signal to be sent to the process.
+If the caller is in filter mode, and this system call is allowed by the
+seccomp filters, it returns 2.
This operation is only available
-if the kernel is configured with CONFIG_SECCOMP enabled.
+if the kernel is configured with
+.B CONFIG_SECCOMP
+enabled.
.TP
.BR PR_SET_SECUREBITS " (since Linux 2.6.26)"
Set the "securebits" flags of the calling thread to the value supplied in
See
.BR capabilities (7).
.TP
+.BR PR_GET_TID_ADDRESS " (since Linux 3.5)"
+.\" commit 300f786b2683f8bb1ec0afb6e1851183a479c86d
+Retrieve the
+.I clear_child_tid
+address set by
+.BR set_tid_address (2)
+and the
+.BR clone (2)
+.B CLONE_CHILD_CLEARTID
+flag, in the location pointed to by
+.IR "(int\ **)\ arg2" .
+This feature is available only if the kernel is built with the
+.BR CONFIG_CHECKPOINT_RESTORE
+option enabled.
+.TP
+.BR PR_SET_TIMERSLACK " (since Linux 2.6.28)"
+.\" See https://lwn.net/Articles/369549/
+.\" commit 6976675d94042fbd446231d1bd8b7de71a980ada
+Set the current timer slack for the calling thread to the nanosecond value
+supplied in
+.IR arg2 .
+If
+.I arg2
+is less than or equal to zero,
+.\" It seems that it's not possible to set the timer slack to zero;
+.\" The minimum value is 1? Seems a little strange.
+reset the current timer slack to the thread's default timer slack value.
+The timer slack is used by the kernel to group timer expirations
+for the calling thread that are close to one another;
+as a consequence, timer expirations for the thread may be
+up to the specified number of nanoseconds late (but will never expire early).
+Grouping timer expirations can help reduce system power consumption
+by minimizing CPU wake-ups.
+
+The timer expirations affected by timer slack are those set by
+.BR select (2),
+.BR pselect (2),
+.BR poll (2),
+.BR ppoll (2),
+.BR epoll_wait (2),
+.BR epoll_pwait (2),
+.BR clock_nanosleep (2),
+.BR nanosleep (2),
+and
+.BR futex (2)
+(and thus the library functions implemented via futexes, including
+.\" List obtained by grepping for futex usage in glibc source
+.BR pthread_cond_timedwait (3),
+.BR pthread_mutex_timedlock (3),
+.BR pthread_rwlock_timedrdlock (3),
+.BR pthread_rwlock_timedwrlock (3),
+and
+.BR sem_timedwait (3)).
+
+Timer slack is not applied to threads that are scheduled under
+a realtime scheduling policy (see
+.BR sched_setscheduler (2)).
+
+Each thread has two associated timer slack values:
+a "default" value, and a "current" value.
+The current value is the one that governs grouping
+of timer expirations.
+When a new thread is created,
+the two timer slack values are made the same as the current value
+of the creating thread.
+Thereafter, a thread can adjust its current timer slack value via
+.BR PR_SET_TIMERSLACK
+(the default value can't be changed).
+The timer slack values of
+.IR init
+(PID 1), the ancestor of all processes,
+are 50,000 nanoseconds (50 microseconds).
+The timer slack values are preserved across
+.BR execve (2).
+.TP
+.BR PR_GET_TIMERSLACK " (since Linux 2.6.28)"
+Return the current timer slack value of the calling thread.
+.TP
.BR PR_SET_TIMING " (since Linux 2.6.0-test4)"
Set whether to use (normal, traditional) statistical process timing or
accurate timestamp-based process timing, by passing
this process or another process.
Performance counters created by the calling process for other
processes are unaffected.
-For more information on performance counters, see the kernel source file
+For more information on performance counters, see the Linux kernel source file
.IR tools/perf/design.txt .
.IP
Originally called
.\" ========== END FIXME
.RE
.\"
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR PR_GET_DUMPABLE ,
.BR PR_GET_KEEPCAPS ,
+.BR PR_GET_NO_NEW_PRIVS ,
.BR PR_CAPBSET_READ ,
.BR PR_GET_TIMING ,
.BR PR_GET_SECUREBITS ,
is
.BR PR_SET_SECCOMP
or
-.BR PR_SET_SECCOMP ,
+.BR PR_GET_SECCOMP ,
and the kernel was not configured with
.BR CONFIG_SECCOMP .
.TP
resource limit to be exceeded.
.RE
.TP
+.B EINVAL
+.I option
+is
+.BR PR_SET_PTRACER
+and
+.I arg2
+is not 0,
+.BR PR_SET_PTRACER_ANY ,
+or the PID of an existing process.
+.TP
.B EPERM
.I option
is
.BR prctl ()
system call was introduced in Linux 2.1.57.
.\" The library interface was added in glibc 2.0.6
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This call is Linux-specific.
IRIX has a
.BR prctl ()
get the maximum number of processors the calling process can use,
find out whether a specified process is currently blocked,
get or set the maximum stack size, and so on.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR signal (2),
.BR core (5)
.\" Copyright (C) 1999 Joseph Samuel Myers.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PREAD 2 2012-04-30 "Linux" "Linux Programmer's Manual"
.SH NAME
The file referenced by
.I fd
must be capable of seeking.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, the number of bytes read or written is returned (zero
indicates that nothing was written, in the case of
.BR pwrite (),
C library support (including emulation using
.BR lseek (2)
on older kernels without the system calls) was added in glibc 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
On Linux, the underlying system calls were renamed
.BR pwrite ()
appends data to the end of the file, regardless of the value of
.IR offset .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR lseek (2),
.BR read (2),
.BR readv (2),
.\" and Copyright (C) 2012 Mike Frysinger <vapier@gentoo.org>
.\" and Copyright (C) 2012 Michael Kerrisk <mtk.man-pages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Commit fcf634098c00dd9cd247447368495f0b79be12d1
.\"
.BR ptrace (2)
.BR PTRACE_ATTACH
on the remote process.)
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR process_vm_readv ()
returns the number of bytes read and
.SH VERSIONS
These system calls were added in Linux 3.2.
Support is provided in glibc since version 2.15.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These system calls are nonstandard Linux extensions.
.SH NOTES
The data transfers performed by
return 0;
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR readv (2),
.BR writev (2)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1993 Michael Haardt <michael@moria.de>
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
.\"
.\" and Copyright (c) 2011, Denys Vlasenko <vda.linux@googlemail.com>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Fri Jul 23 23:47:18 1993 by Rik Faith <faith@cs.unc.edu>
.\" Modified Fri Jan 31 16:46:30 1997 by Eric S. Raymond <esr@thyrsus.com>
.\" (Thanks to Blaisorblade, Daniel Jacobowitz and others who helped.)
.\" 2011-09, major update by Denys Vlasenko <vda.linux@googlemail.com>
.\"
-.\" FIXME Linux 2.6.34 adds PTRACE_GETREGSET/PTRACE_SETREGSET
-.\" FIXME Linux 3.1 adds PTRACE_SEIZE, PTRACE_INTERRUPT,
-.\" and PTRACE_LISTEN.
-.\"
-.TH PTRACE 2 2012-04-26 "Linux" "Linux Programmer's Manual"
+.TH PTRACE 2 2013-02-16 "Linux" "Linux Programmer's Manual"
.SH NAME
ptrace \- process trace
.SH SYNOPSIS
followed (typically) by an
.BR execve (2).
Alternatively, one process may commence tracing another process using
-.BR PTRACE_ATTACH .
+.B PTRACE_ATTACH
+or
+.BR PTRACE_SEIZE .
.LP
While being traced, the tracee will stop each time a signal is delivered,
even if the signal is being ignored.
.I pid
specifies the thread ID of the tracee to be acted on.
For requests other than
-.B PTRACE_ATTACH
+.BR PTRACE_ATTACH ,
+.BR PTRACE_SEIZE ,
+.B PTRACE_INTERRUPT
and
.BR PTRACE_KILL ,
the tracee must be stopped.
In order to maintain the integrity of the kernel,
some modifications to the USER area are disallowed.
.\" FIXME In the preceding sentence, which modifications are disallowed,
-.\" and when they are disallowed, how does userspace discover that fact?
+.\" and when they are disallowed, how does user space discover that fact?
.TP
.BR PTRACE_GETREGS ", " PTRACE_GETFPREGS
Copy the tracee's general-purpose or floating-point registers,
.I data
is ignored and the registers are copied to the address
.IR addr .
+.B PTRACE_GETREGS
+and
+.B PTRACE_GETFPREGS
+are not present on all architectures.
+.TP
+.BR PTRACE_GETREGSET " (since Linux 2.6.34)"
+Read the tracee's registers.
+.I addr
+specifies, in an architecture-dependent way, the type of registers to be read.
+.B NT_PRSTATUS
+(with numerical value 1)
+usually results in reading of general-purpose registers.
+If the CPU has, for example,
+floating-point and/or vector registers, they can be retrieved by setting
+.I addr
+to the corresponding
+.B NT_foo
+constant.
+.I data
+points to a
+.BR "struct iovec" ,
+which describes the destination buffer's location and length.
+On return, the kernel modifies
+.B iov.len
+to indicate the actual number of bytes returned.
.TP
.BR PTRACE_GETSIGINFO " (since Linux 2.3.99-pre6)"
Retrieve information about the signal that caused the stop.
is ignored.)
.TP
.BR PTRACE_SETREGS ", " PTRACE_SETFPREGS
-Copy the tracee's general-purpose or floating-point registers,
+Modify the tracee's general-purpose or floating-point registers,
respectively, from the address
.I data
in the tracer.
.BR PTRACE_POKEUSER ,
some general-purpose register modifications may be disallowed.
.\" FIXME In the preceding sentence, which modifications are disallowed,
-.\" and when they are disallowed, how does userspace discover that fact?
+.\" and when they are disallowed, how does user space discover that fact?
.RI ( addr
is ignored.)
Note that SPARC systems have the meaning of
.I data
is ignored and the registers are copied from the address
.IR addr .
+.B PTRACE_SETREGS
+and
+.B PTRACE_SETFPREGS
+are not present on all architectures.
+.TP
+.BR PTRACE_SETREGSET " (since Linux 2.6.34)"
+Modify the tracee's registers.
+The meaning of
+.I addr
+and
+.I data
+is analogous to
+.BR PTRACE_GETREGSET .
.TP
.BR PTRACE_SETSIGINFO " (since Linux 2.3.99-pre6)"
Set signal information:
which are specified by the following flags:
.RS
.TP
-.BR PTRACE_O_TRACESYSGOOD " (since Linux 2.4.6)"
-When delivering system call traps, set bit 7 in the signal number
-(i.e., deliver
-.IR "SIGTRAP|0x80" ).
-This makes it easy for the tracer to distinguish
-normal traps from those caused by a system call.
-.RB ( PTRACE_O_TRACESYSGOOD
-may not work on all architectures.)
-.TP
-.BR PTRACE_O_TRACEFORK " (since Linux 2.5.46)"
-Stop the tracee at the next
-.BR fork (2)
-and automatically start tracing the newly forked process,
-which will start with a
-.BR SIGSTOP .
-A
-.BR waitpid (2)
-by the tracer will return a
-.I status
-value such that
-
-.nf
- status>>8 == (SIGTRAP | (PTRACE_EVENT_FORK<<8))
-.fi
-
-The PID of the new process can be retrieved with
-.BR PTRACE_GETEVENTMSG .
-.TP
-.BR PTRACE_O_TRACEVFORK " (since Linux 2.5.46)"
-Stop the tracee at the next
-.BR vfork (2)
-and automatically start tracing the newly vforked process,
-which will start with a
-.BR SIGSTOP .
-A
-.BR waitpid (2)
-by the tracer will return a
-.I status
-value such that
-
-.nf
- status>>8 == (SIGTRAP | (PTRACE_EVENT_VFORK<<8))
-.fi
-
-The PID of the new process can be retrieved with
-.BR PTRACE_GETEVENTMSG .
+.BR PTRACE_O_EXITKILL " (since Linux 3.8)"
+.\" commit 992fb6e170639b0849bace8e49bf31bd37c4123
+If a tracer sets this flag, a
+.B SIGKILL
+signal will be sent to every tracee if the tracer exits.
+This option is useful for ptrace jailers that
+want to ensure that tracees can never escape the tracer's control.
.TP
.BR PTRACE_O_TRACECLONE " (since Linux 2.5.46)"
Stop the tracee at the next
Since Linux 3.0, the former thread ID can be retrieved with
.BR PTRACE_GETEVENTMSG .
.TP
-.BR PTRACE_O_TRACEVFORKDONE " (since Linux 2.5.60)"
-Stop the tracee at the completion of the next
-.BR vfork (2).
-A
-.BR waitpid (2)
-by the tracer will return a
-.I status
-value such that
-
-.nf
- status>>8 == (SIGTRAP | (PTRACE_EVENT_VFORK_DONE<<8))
-.fi
-
-The PID of the new process can (since Linux 2.6.18) be retrieved with
-.BR PTRACE_GETEVENTMSG .
-.TP
.BR PTRACE_O_TRACEEXIT " (since Linux 2.5.60)"
Stop the tracee at exit.
A
is finished exiting.
Even though context is available,
the tracer cannot prevent the exit from happening at this point.
+.TP
+.BR PTRACE_O_TRACEFORK " (since Linux 2.5.46)"
+Stop the tracee at the next
+.BR fork (2)
+and automatically start tracing the newly forked process,
+which will start with a
+.BR SIGSTOP .
+A
+.BR waitpid (2)
+by the tracer will return a
+.I status
+value such that
+
+.nf
+ status>>8 == (SIGTRAP | (PTRACE_EVENT_FORK<<8))
+.fi
+
+The PID of the new process can be retrieved with
+.BR PTRACE_GETEVENTMSG .
+.TP
+.BR PTRACE_O_TRACESYSGOOD " (since Linux 2.4.6)"
+When delivering system call traps, set bit 7 in the signal number
+(i.e., deliver
+.IR "SIGTRAP|0x80" ).
+This makes it easy for the tracer to distinguish
+normal traps from those caused by a system call.
+.RB ( PTRACE_O_TRACESYSGOOD
+may not work on all architectures.)
+.TP
+.BR PTRACE_O_TRACEVFORK " (since Linux 2.5.46)"
+Stop the tracee at the next
+.BR vfork (2)
+and automatically start tracing the newly vforked process,
+which will start with a
+.BR SIGSTOP .
+A
+.BR waitpid (2)
+by the tracer will return a
+.I status
+value such that
+
+.nf
+ status>>8 == (SIGTRAP | (PTRACE_EVENT_VFORK<<8))
+.fi
+
+The PID of the new process can be retrieved with
+.BR PTRACE_GETEVENTMSG .
+.TP
+.BR PTRACE_O_TRACEVFORKDONE " (since Linux 2.5.60)"
+Stop the tracee at the completion of the next
+.BR vfork (2).
+A
+.BR waitpid (2)
+by the tracer will return a
+.I status
+value such that
+
+.nf
+ status>>8 == (SIGTRAP | (PTRACE_EVENT_VFORK_DONE<<8))
+.fi
+
+The PID of the new process can (since Linux 2.6.18) be retrieved with
+.BR PTRACE_GETEVENTMSG .
.RE
.TP
.BR PTRACE_GETEVENTMSG " (since Linux 2.5.46)"
.I data
argument is treated as for
.BR PTRACE_CONT .
-.RI ( addr
-is ignored;
-not supported on all architectures.)
+The
+.I addr
+argument is ignored.
+These requests are currently
+.\" As at 3.7
+supported only on x86.
+.TP
+.BR PTRACE_LISTEN " (since Linux 3.4)"
+Restart the stopped tracee, but prevent it from executing.
+The resulting state of the tracee is similar to a process which
+has been stopped by a
+.B SIGSTOP
+(or other stopping signal).
+See the "group-stop" subsection for additional information.
+.B PTRACE_LISTEN
+only works on tracees attached by
+.BR PTRACE_SEIZE .
.TP
.B PTRACE_KILL
Send the tracee a
.\" deprecation suggested by Oleg Nesterov. He prefers to deprecate it
.\" instead of describing (and needing to support) PTRACE_KILL's quirks.]
.TP
+.BR PTRACE_INTERRUPT " (since Linux 3.4)"
+Stop a tracee.
+If the tracee is running, it will stop with
+.BR PTRACE_EVENT_STOP .
+If the tracee is already stopped by a signal, or receives a signal
+in parallel with
+.BR PTRACE_INTERRUPT ,
+it may report a group-stop
+or a signal-delivery-stop instead of
+.BR PTRACE_EVENT_STOP .
+.B PTRACE_INTERRUPT
+only works on tracees attached by
+.BR PTRACE_SEIZE .
+.TP
.B PTRACE_ATTACH
Attach to the process specified in
.IR pid ,
.I data
are ignored.)
.TP
+.BR PTRACE_SEIZE " (since Linux 3.4)"
+Attach to the process specified in
+.IR pid ,
+making it a tracee of the calling process.
+Unlike
+.BR PTRACE_ATTACH ,
+.B PTRACE_SEIZE
+does not stop the process.
+Only a
+.BR PTRACE_SEIZE d
+process can accept
+.B PTRACE_INTERRUPT
+and
+.B PTRACE_LISTEN
+commands.
+.I addr
+must be zero.
+.I data
+contains a bit mask of ptrace options to activate immediately.
+.TP
.B PTRACE_DETACH
Restart the stopped tracee as for
.BR PTRACE_CONT ,
(The term "signal-delivery-stop" is explained below.)
.LP
.B SIGKILL
-operates similarly, with exceptions.
-No signal-delivery-stop is generated for
-.B SIGKILL
-and therefore the tracer can't suppress it.
+does not generate signal-delivery-stop and
+therefore the tracer can't suppress it.
.B SIGKILL
kills even within system calls
(syscall-exit-stop is not generated prior to death by
Example:
.nf
- kill(tracee, SIGKILL);
- waitpid(tracee, &status, __WALL | WNOHANG);
+ errno = 0;
+ ptrace(PTRACE_CONT, pid, 0L, 0L);
+ if (errno == ESRCH) {
+ /* tracee is dead */
+ r = waitpid(tracee, &status, __WALL | WNOHANG);
+ /* r can still be 0 here! */
+ }
.fi
.\" FIXME:
.\" waitid usage? WNOWAIT?
One typical scenario is that the tracer observes group-stop,
mistakes it for signal-delivery-stop, restarts the tracee with
- ptrace(PTRACE_rest, pid, 0, stopsig)
+ ptrace(PTRACE_restart, pid, 0, stopsig)
with the intention of injecting
.IR stopsig ,
.B SIGKILL
killed the tracee.)
.LP
-As of kernel 2.6.38,
+As of Linux 2.6.38,
after the tracer sees the tracee ptrace-stop and until it
restarts or kills it, the tracee will not run,
and will not send notifications (except
this would cause the
.B SIGCONT
signals to have no effect on the tracee.
+.LP
+Since Linux 3.4, there is a method to overcome this problem: instead of
+.BR PTRACE_CONT ,
+a
+.B PTRACE_LISTEN
+command can be used to restart a tracee in a way where it does not execute,
+but waits for a new event which it can report via
+.BR waitpid (2)
+(such as when
+it is restarted by a
+.BR SIGCONT ).
.SS PTRACE_EVENT stops
If the tracer sets
.B PTRACE_O_TRACE_*
or
.BR PTRACE_DETACH ed
to finish exiting.
+.TP
+.B PTRACE_EVENT_STOP
+Stop induced by
+.B PTRACE_INTERRUPT
+command.
.LP
.B PTRACE_GETSIGINFO
on
.TP
.IR si_code " <= 0"
.B SIGTRAP
-was delivered as a result of a userspace action,
+was delivered as a result of a user-space action,
for example, a system call
.RB ( tgkill (2),
.BR kill (2),
.SS Informational and restarting ptrace commands
Most ptrace commands (all except
.BR PTRACE_ATTACH ,
+.BR PTRACE_SEIZE ,
.BR PTRACE_TRACEME ,
+.BR PTRACE_INTERRUPT ,
and
.BR PTRACE_KILL )
require the tracee to be in a ptrace-stop, otherwise they fail with
ptrace(PTRACE_POKETEXT/POKEDATA/POKEUSER, pid, addr, long_val);
ptrace(PTRACE_GETREGS/GETFPREGS, pid, 0, &struct);
ptrace(PTRACE_SETREGS/SETFPREGS, pid, 0, &struct);
+ ptrace(PTRACE_GETREGSET, pid, NT_foo, &iov);
+ ptrace(PTRACE_SETREGSET, pid, NT_foo, &iov);
ptrace(PTRACE_GETSIGINFO, pid, 0, &siginfo);
ptrace(PTRACE_SETSIGINFO, pid, 0, &siginfo);
ptrace(PTRACE_GETEVENTMSG, pid, 0, &long_var);
.I cmd
is
.BR PTRACE_CONT ,
+.BR PTRACE_LISTEN ,
.BR PTRACE_DETACH ,
.BR PTRACE_SYSCALL ,
.BR PTRACE_SINGLESTEP ,
ptrace(PTRACE_ATTACH, pid, 0, 0);
-This also sends
+or
+
+ ptrace(PTRACE_SEIZE, pid, 0, PTRACE_O_flags);
+
+.B PTRACE_ATTACH
+sends
.B SIGSTOP
to this thread.
If the tracer wants this
return from the currently executing system call in the tracee,
as described in the "Signal injection and suppression" section.
.LP
+Since Linux 3.4,
+.B PTRACE_SEIZE
+can be used instead of
+.BR PTRACE_ATTACH .
+.B PTRACE_SEIZE
+does not stop the attached process. If you need to stop
+it after attach (or at any other time) without sending it any signals,
+use
+.B PTRACE_INTERRUPT
+command.
+.LP
The request
ptrace(PTRACE_TRACEME, 0, 0, 0);
If the tracee is restarted from signal-delivery-stop,
the pending signal is injected.
.SS execve(2) under ptrace
-.\" clone(2) THREAD_CLONE says:
+.\" clone(2) CLONE_THREAD says:
.\" If any of the threads in a thread group performs an execve(2),
.\" then all threads other than the thread group leader are terminated,
.\" and the new program is executed in the thread group leader.
whole multithreaded process exits).
If the tracer and the real parent are the same process,
the report is sent only once.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.B PTRACE_PEEK*
requests return the requested data,
The specified process does not exist, or is not currently being traced
by the caller, or is not stopped
(for requests that require a stopped tracee).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD.
.SH NOTES
Although arguments to
as a variadic function with only the
.I request
argument fixed.
-This means that unneeded trailing arguments may be omitted,
-though doing so makes use of undocumented
-.BR gcc (1)
-behavior.
+It is recommended to always supply four arguments,
+even if the requested operation does not use them,
+setting unused/ignored arguments to
+.I 0L
+or
+.IR "(void\ *)\ 0".
.LP
In Linux kernels before 2.6.26,
.\" See commit 00cd5c37afd5f431ac186dd131705048c0a11fdb
from an
.BR inotify (7)
file descriptor.
-.SH "SEE ALSO"
+The usual symptom of this bug is that when you attach to
+a quiescent process with the command
+
+ strace -p <process-ID>
+
+then, instead of the usual
+and expected one-line output such as
+.nf
+
+ restart_syscall(<... resuming interrupted call ...>_
+
+.fi
+or
+.nf
+
+ select(6, [5], NULL, [5], NULL_
+
+.fi
+('_' denotes the cursor position), you observe more than one line.
+For example:
+.nf
+
+ clock_gettime(CLOCK_MONOTONIC, {15370, 690928118}) = 0
+ epoll_wait(4,_
+
+.fi
+What is not visible here is that the process was blocked in
+.BR epoll_wait (2)
+before
+.BR strace (1)
+has attached to it.
+Attaching caused
+.BR epoll_wait (2)
+to return to user space with the error
+.BR EINTR .
+In this particular case, the program reacted to
+.B EINTR
+by checking the current time, and then executing
+.BR epoll_wait (2)
+again.
+(Programs which do not expect such "stray"
+.BR EINTR
+errors may behave in an unintended way upon an
+.BR strace (1)
+attach.)
+.SH SEE ALSO
.BR gdb (1),
.BR strace (1),
.BR clone (2),
--- /dev/null
+.so man2/unimplemented.2
.\" Copyright (C) 1996 Free Software Foundation, Inc.
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" This file is distributed according to the GNU General Public License.
-.\" See the file COPYING in the top level source directory for details.
+.\" %%%LICENSE_END
.\"
.\" 2006-02-09, some reformatting by Luc Van Oostenryck; some
.\" reformatting and rewordings by mtk
.\"
-.TH QUERY_MODULE 2 2007-06-03 "Linux" "Linux Programmer's Manual"
+.TH QUERY_MODULE 2 2013-01-27 "Linux" "Linux Programmer's Manual"
.SH NAME
query_module \- query the kernel for various bits pertaining to modules
.SH SYNOPSIS
.BI "int query_module(const char *" name ", int " which ", void *" buf ,
.BI " size_t " bufsize ", size_t *" ret );
.fi
+
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
.SH DESCRIPTION
+.BR Note :
+This system call is present only in kernels before Linux 2.6.
+
.BR query_module ()
requests information from the kernel about loadable modules.
The returned information is placed in the buffer pointed to by
.BR MOD_RUNNING ,
.BR MOD_AUTOCLEAN ,
etc., that indicates the current status of the module
-(see the kernel source file
+(see the Linux kernel source file
.IR include/linux/module.h ).
.I ret
is set to the size of the
.I module_info
structure.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned and
.I errno
.TP
.B ENOSYS
.BR query_module ()
-is not supported in this version of the kernel.
-.SH "CONFORMING TO"
-.BR query_module ()
-is Linux-specific.
-.SH NOTES
+is not supported in this version of the kernel
+(e.g., the kernel is version 2.6 or later).
+.SH VERSIONS
This system call is only present on Linux up until kernel 2.4;
it was removed in Linux 2.6.
.\" Removed in Linux 2.5.48
-Some of the information that was available via
+.SH CONFORMING TO
+.BR query_module ()
+is Linux-specific.
+.SH NOTES
+Some of the information that was formerly available via
.BR query_module ()
can be obtained from
.IR /proc/modules ,
.IR /proc/kallsyms ,
-and
-.IR /sys/modules .
-.SH "SEE ALSO"
+and the files under the directory
+.IR /sys/module .
+
+Glibc does not provide a wrapper for this system call;
+in the unlikely event that you need to use it on an old kernel, use
+.BR syscall (2).
+.SH SEE ALSO
.BR create_module (2),
.BR delete_module (2),
.BR get_kernel_syms (2),
-.BR init_module (2)
+.BR init_module (2),
+.BR lsmod (8),
+.BR modinfo (8)
.\" A few pieces copyright (c) 1996 Andries Brouwer (aeb@cwi.nl)
.\" and copyright 2010 (c) Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH QUOTACTL 2 2010-06-16 "Linux" "Linux Programmer's Manual"
.SH NAME
.in +4n
.nf
-/* uint64_t is an unsigned 64-bit integer;
- uint32_t is an unsigned 32-bit integer */
+/* uint64_t is an unsigned 64\-bit integer;
+ uint32_t is an unsigned 32\-bit integer */
struct dqblk { /* Definition since Linux 2.4.22 */
uint64_t dqb_bhardlimit; /* absolute limit on disk
.in +4n
.nf
-/* uint64_t is an unsigned 64-bit integer;
- uint32_t is an unsigned 32-bit integer */
+/* uint64_t is an unsigned 64\-bit integer;
+ uint32_t is an unsigned 32\-bit integer */
struct dqinfo { /* Defined since kernel 2.4.22 */
uint64_t dqi_bgrace; /* Time before block soft limit
.TP
.B ESRCH
Specified quota format was not found.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR quota (1),
.BR getrlimit (2),
.BR quotacheck (8),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 1992 Drew Eckhardt;
.\" 1993 Michael Haardt, Ian Jackson.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified Sat Jul 24 00:06:00 1993 by Rik Faith <faith@cs.unc.edu>
.\" Modified Wed Jan 17 16:02:32 1996 by Michael Haardt
.\" Modified Sat Jul 12 20:45:39 1997 by Michael Haardt
.\" <michael@cantor.informatik.rwth-aachen.de>
.\"
-.TH READ 2 2009-02-23 "Linux" "Linux Programmer's Manual"
+.TH READ 2 2013-02-12 "Linux" "Linux Programmer's Manual"
.SH NAME
read \- read from a file descriptor
.SH SYNOPSIS
.I fd
into the buffer starting at
.IR buf .
-.PP
+
+On files that support seeking,
+the read operation commences at the current file offset,
+and the file offset is incremented by the number of bytes read.
+If the current file offset is at or past the end of file,
+no bytes are read, and
+.BR read ()
+returns zero.
+
If
.I count
is zero,
.BR read ()
-returns zero and has no other results.
+.I may
+detect the errors described below.
+In the absence of any errors,
+or if
+.BR read ()
+does not check for errors, a
+.BR read ()
+with a
+.I count
+of 0 returns zero and has no other effects.
+
If
.I count
is greater than
.BR SSIZE_MAX ,
the result is unspecified.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, the number of bytes read is returned (zero indicates end of
file), and the file position is advanced by this number.
It is not an error if this number is smaller than the number of bytes
.B EIO
I/O error.
This will happen for example when the process is in a
-background process group, tries to read from its controlling tty,
+background process group, tries to read from its controlling terminal,
and either it is ignoring or blocking
.B SIGTTIN
or its process group
set to
.BR EINTR )
or to return the number of bytes already read.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
.SH NOTES
On NFS file systems, reading small amounts of data will only update the
UNIX semantics can be obtained by disabling client
side attribute caching, but in most situations this will substantially
increase server load and decrease performance.
-.PP
-Many file systems and disks were considered to be fast enough that the
-implementation of
-.B O_NONBLOCK
-was deemed unnecessary.
-So,
-.B O_NONBLOCK
-may not be available on files
-and/or disks.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR close (2),
.BR fcntl (2),
.BR ioctl (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 2004, Michael Kerrisk
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 2004-05-40 Created by Michael Kerrisk <mtk.manpages@gmail.com>
.\" 2004-10-05 aeb, minor correction
The current file offset of the open file referred to by
.I fd
is left unchanged.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR readahead ()
returns 0; on failure, \-1 is returned, with
.BR readahead ()
system call appeared in Linux 2.4.13;
glibc support has been provided since version 2.3.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The
.BR readahead ()
system call is Linux-specific, and its use should be avoided
in portable applications.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR lseek (2),
.BR madvise (2),
.BR mmap (2),
.\" Copyright (C) 1995 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Written 11 June 1995 by Andries Brouwer <aeb@cwi.nl>
.\" Modified 22 July 1995 by Michael Chastain <mec@duracef.shout.net>:
.\" In 1.3.X, returns only one entry each time; return value is different.
.\" Modified 2004-12-01, mtk, fixed headers listed in SYNOPSIS
.\"
-.TH READDIR 2 2008-10-02 "Linux" "Linux Programmer's Manual"
+.TH READDIR 2 2012-07-13 "Linux" "Linux Programmer's Manual"
.SH NAME
readdir \- read directory entry
.SH SYNOPSIS
.BI "int readdir(unsigned int " fd ", struct old_linux_dirent *" dirp ","
.BI " unsigned int " count );
.fi
+
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
.SH DESCRIPTION
This is not the function you are interested in.
Look at
not counting the terminating null byte.
.I d_name
is a null-terminated filename.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, 1 is returned.
On end of directory, 0 is returned.
On error, \-1 is returned, and
.TP
.B ENOTDIR
File descriptor does not refer to a directory.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This system call is Linux-specific.
.SH NOTES
Glibc does not provide a wrapper for this system call; call it using
You will need to define the
.I old_linux_dirent
structure yourself.
-.SH "SEE ALSO"
+However, probably you should use
+.BR readdir (3)
+instead.
+.SH SEE ALSO
.BR getdents (2),
.BR readdir (3)
.\" And Copyright (C) 2011 Guillem Jover <guillem@hadrons.org>
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)readlink.2 6.8 (Berkeley) 3/10/91
.\"
It will truncate the contents (to a length of
.I bufsiz
characters), in case the buffer is too small to hold all of the contents.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR readlink ()
returns the number of bytes placed in
.TP
.B ENOTDIR
A component of the path prefix is not a directory.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.4BSD
.RB ( readlink ()
first appeared in 4.2BSD),
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR readlink (1),
.BR lstat (2),
.BR readlinkat (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 2006, Michael Kerrisk
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\"
+.\" %%%LICENSE_END
.\"
.TH READLINKAT 2 2012-05-04 "Linux" "Linux Programmer's Manual"
.SH NAME
is absolute, then
.I dirfd
is ignored.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR readlinkat ()
returns the number of bytes placed in
.BR readlinkat ()
was added to Linux in kernel 2.6.16;
library support was added to glibc in version 2.4.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
.SH NOTES
See
.BR openat (2)
for an explanation of the need for
.BR readlinkat ().
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR openat (2),
.BR readlink (2),
.BR path_resolution (7)
.\" Copyright (C) 2007, 2010 Michael Kerrisk <mtk.manpages@gmail.com>
.\" and Copyright (c) 1993 by Thomas Koenig (ig25@rz.uni-karlsruhe.de)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
+.\"
.\" Modified Sat Jul 24 18:34:44 1993 by Rik Faith (faith@cs.unc.edu)
.\" Merged readv.[23], 2002-10-17, aeb
.\" 2007-04-30 mtk, A fairly major rewrite to fix errors and
The file referred to by
.I fd
must be capable of seeking.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR readv ()
and
and
.BR pwritev ()
first appeared in Linux 2.6.30; library support was added in glibc 2.10.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR readv (),
.BR writev ():
4.4BSD (these system calls first appeared in 4.2BSD), POSIX.1-2001.
.BR pwritev ():
nonstandard, but present also on the modern BSDs.
.SH NOTES
-.SS Linux Notes
+.SS Linux notes
POSIX.1-2001 allows an implementation to place a limit on
the number of items that can be passed in
.IR iov .
nwritten = writev(STDOUT_FILENO, iov, 2);
.fi
.in
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR pread (2),
.BR read (2),
.BR write (2)
.\" Copyright (c) 1998 Andries Brouwer (aeb@cwi.nl), 24 September 1998
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
+.\"
.\" Modified, 27 May 2004, Michael Kerrisk <mtk.manpages@gmail.com>
.\" Added notes on capability requirements
.\"
anything at present (2.1.122), but the type of reboot can be
determined by kernel command-line arguments ("reboot=...") to be
either warm or cold, and either hard or through the BIOS.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
For the values of
.I cmd
that stop or restart the system,
.SH ERRORS
.TP
.B EFAULT
-Problem with getting userspace data under
+Problem with getting user-space data under
.BR LINUX_REBOOT_CMD_RESTART2 .
.TP
.B EINVAL
the
.B CAP_SYS_BOOT
capability is required.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR reboot ()
is Linux-specific,
and should not be used in programs intended to be portable.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sync (2),
.BR bootparam (7),
.BR capabilities (7),
.\" Copyright (c) 1983, 1990, 1991 The Regents of the University of California.
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" $Id: recv.2,v 1.3 1999/05/13 11:33:38 freitag Exp $
.\"
.\" Modified 1998,1999 by Andi Kleen
.\" 2001-06-19 corrected SO_EE_OFFENDER, bug report by James Hawtin
.\"
-.TH RECV 2 2011-09-16 "Linux" "Linux Programmer's Manual"
+.TH RECV 2 2012-12-21 "Linux" "Linux Programmer's Manual"
.SH NAME
recv, recvfrom, recvmsg \- receive a message from a socket
.SH SYNOPSIS
For raw
.RB ( AF_PACKET ),
Internet datagram (since Linux 2.4.27/2.6.8),
-and netlink (since Linux 2.6.22) sockets:
+netlink (since Linux 2.6.22) and UNIX datagram (since Linux 3.4) sockets:
return the real length of the packet or datagram,
even when it was longer than the passed buffer.
Not implemented for UNIX domain
.B MSG_ERRQUEUE
indicates that no data was received but an extended error from the socket
error queue.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
These calls return the number of bytes received, or \-1
if an error occurred.
The return value will be 0 when the
The argument
.I sockfd
does not refer to a socket.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.4BSD (these function calls first appeared in 4.2BSD),
POSIX.1-2001.
.LP
.\" across architectures, but socklen_t is always 32 bits.
See
-.BR recvmmsg(2)
+.BR recvmmsg (2)
for information about a Linux-specific system call
that can be used to receive multiple datagrams in a single call.
.SH EXAMPLE
.BR recvfrom ()
is shown in
.BR getaddrinfo (3).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fcntl (2),
.BR getsockopt (2),
.BR read (2),
.\" Copyright (C) 2011 by Andi Kleen <andi@firstfloor.org>
.\" and Copyright (c) 2011 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.\" FIXME: This page could be improved with an example program.
+.\" Syscall added in following commit
+.\" commit a2e2725541fad72416326798c2d7fa4dafb7d337
+.\" Author: Arnaldo Carvalho de Melo <acme@redhat.com>
+.\" Date: Mon Oct 12 23:40:10 2009 -0700
.\"
-.TH RECVMMSG 2 2012-05-02 "Linux" "Linux Programmer's Manual"
+.TH RECVMMSG 2 2012-12-24 "Linux" "Linux Programmer's Manual"
.SH NAME
recvmmsg \- receive multiple messages on a socket
.SH SYNOPSIS
.BR recvmsg (2),
with the following addition:
.TP
-.B MSG_WAITFORONE
+.BR MSG_WAITFORONE " (since Linux 2.6.34)"
Turns on
.B MSG_DONTWAIT
after the first message has been received.
.SH VERSIONS
The
.BR recvmmsg ()
-system call was added in Linux 2.6.32.
+system call was added in Linux 2.6.33.
Support in glibc was added in version 2.12.
.SH CONFORMING TO
.BR recvmmsg ()
is Linux-specific.
+.SH EXAMPLE
+.PP
+The following program uses
+.BR recvmmsg ()
+to receive multiple messages on a socket and stores
+them in multiple buffers.
+The call returns if all buffers are filled or if the
+timeout specified has expired.
+
+The following snippet periodically generates UDP datagrams
+containing a random number:
+.in +4n
+.nf
+
+.RB "$" " while true; do echo $RANDOM > /dev/udp/127.0.0.1/1234; "
+.B " sleep 0.25; done"
+.fi
+.in
+
+These datagrams are read by the example application, which
+can give the following output:
+.in +4n
+.nf
+
+.RB "$" " ./a.out"
+5 messages received
+1 11782
+2 11345
+3 304
+4 13514
+5 28421
+.fi
+.in
+.SS Program source
+\&
+.nf
+#define _GNU_SOURCE
+#include <netinet/ip.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <sys/socket.h>
+
+int
+main(void)
+{
+#define VLEN 10
+#define BUFSIZE 200
+#define TIMEOUT 1
+ int sockfd, retval, i;
+ struct sockaddr_in sa;
+ struct mmsghdr msgs[VLEN];
+ struct iovec iovecs[VLEN];
+ char bufs[VLEN][BUFSIZE+1];
+ struct timespec timeout;
+
+ sockfd = socket(AF_INET, SOCK_DGRAM, 0);
+ if (sockfd == \-1) {
+ perror("socket()");
+ exit(EXIT_FAILURE);
+ }
+
+ sa.sin_family = AF_INET;
+ sa.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
+ sa.sin_port = htons(1234);
+ if (bind(sockfd, (struct sockaddr *) &sa, sizeof(sa)) == \-1) {
+ perror("bind()");
+ exit(EXIT_FAILURE);
+ }
+
+ memset(msgs, 0, sizeof(msgs));
+ for (i = 0; i < VLEN; i++) {
+ iovecs[i].iov_base = bufs[i];
+ iovecs[i].iov_len = BUFSIZE;
+ msgs[i].msg_hdr.msg_iov = &iovecs[i];
+ msgs[i].msg_hdr.msg_iovlen = 1;
+ }
+
+ timeout.tv_sec = TIMEOUT;
+ timeout.tv_nsec = 0;
+
+ retval = recvmmsg(sockfd, msgs, VLEN, 0, &timeout);
+ if (retval == \-1) {
+ perror("recvmmsg()");
+ exit(EXIT_FAILURE);
+ }
+
+ printf("%d messages received\\n", retval);
+ for (i = 0; i < retval; i++) {
+ bufs[i][msgs[i].msg_len] = 0;
+ printf("%d %s", i+1, bufs[i]);
+ }
+ exit(EXIT_SUCCESS);
+}
+.fi
.SH SEE ALSO
.BR clock_gettime (2),
.BR recvmsg (2),
.\" Copyright (C) 2003, Michael Kerrisk (mtk.manpages@gmail.com)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 2003-12-10 Initial creation, Michael Kerrisk <mtk.manpages@gmail.com>
.\" 2004-10-28 aeb, corrected prototype, prot must be 0
but all flags other than
.B MAP_NONBLOCK
are ignored.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR remap_file_pages ()
returns 0.
.BR remap_file_pages ()
system call appeared in Linux 2.5.46;
glibc support was added in version 2.3.3.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The
.BR remap_file_pages ()
system call is Linux-specific.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getpagesize (2),
.BR mmap (2),
.BR mmap2 (2),
-.\"
-.\" Extended attributes system calls manual pages
-.\"
.\" Copyright (C) Andreas Gruenbacher, February 2001
.\" Copyright (C) Silicon Graphics Inc, September 2001
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
-.TH REMOVEXATTR 2 2001-12-01 "Linux" "Linux Programmer's Manual"
+.TH REMOVEXATTR 2 2013-01-19 "Linux" "Linux Programmer's Manual"
.SH NAME
removexattr, lremovexattr, fremovexattr \- remove an extended attribute
.SH SYNOPSIS
On failure, \-1 is returned and
.I errno
is set appropriately.
+.SH ERRORS
+.TP
+.B ENOATTR
+The named attribute does not exist.
+.RB ( ENOATTR
+is defined to be a synonym for
+.BR ENODATA
+in
+.IR <attr/xattr.h> .)
+.TP
+.B ENOTSUP
+Extended attributes are not supported by the file system, or are disabled.
.PP
-If the named attribute does not exist,
-.I errno
-is set to
-.BR ENOATTR .
-.PP
-If extended attributes are not supported by the file system, or are disabled,
-.I errno
-is set to
-.BR ENOTSUP .
-.PP
-The errors documented for the
+In addition, the errors documented in
.BR stat (2)
-system call are also applicable here.
+can also occur.
.SH VERSIONS
These system calls have been available on Linux since kernel 2.4;
glibc support is provided since version 2.3.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These system calls are Linux-specific.
.\" .SH AUTHORS
.\" Andreas Gruenbacher,
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 1992 Drew Eckhardt;
.\" 1993 Michael Haardt;
.\" 1993,1995 Ian Jackson.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified Sat Jul 24 00:35:52 1993 by Rik Faith <faith@cs.unc.edu>
.\" Modified Thu Jun 4 12:21:13 1998 by Andries Brouwer <aeb@cwi.nl>
.\" Modified Thu Mar 3 09:49:35 2005 by Michael Haardt <michael@moria.de>
.\" 2007-03-25, mtk, added various text to DESCRIPTION.
.\"
-.TH RENAME 2 2009-03-30 "Linux" "Linux Programmer's Manual"
+.TH RENAME 2 2013-01-27 "Linux" "Linux Programmer's Manual"
.SH NAME
rename \- change the name or location of a file
.SH SYNOPSIS
refers to a symbolic link the link is renamed; if
.I newpath
refers to a symbolic link the link will be overwritten.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
if the system cannot otherwise
handle such situations.)
.TP
+.B EDQUOT
+The user's quota of disk blocks on the file system has been exhausted.
+.TP
.B EFAULT
.IR oldpath " or " newpath " points outside your accessible address space."
.TP
.BR rename ()
does not work across different mount points,
even if the same file system is mounted on both.)
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD, C89, C99, POSIX.1-2001.
.SH BUGS
On NFS file systems, you can not assume that if the operation
See
.BR link (2)
for a similar problem.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mv (1),
.BR chmod (2),
.BR link (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 2006, Michael Kerrisk
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\"
+.\" %%%LICENSE_END
.\"
.TH RENAMEAT 2 2012-05-04 "Linux" "Linux Programmer's Manual"
.SH NAME
except that a relative pathname is interpreted relative
to the directory referred to by the file descriptor
.IR newdirfd .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR renameat ()
returns 0.
.BR renameat ()
was added to Linux in kernel 2.6.16;
library support was added to glibc in version 2.4.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
.SH NOTES
See
.BR openat (2)
for an explanation of the need for
.BR renameat ().
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR openat (2),
.BR rename (2),
.BR path_resolution (7)
-.\"
.\" Copyright (C) 2006 Red Hat, Inc. All Rights Reserved.
.\" Written by David Howells (dhowells@redhat.com)
.\"
+.\" %%%LICENSE_START(GPLv2+_SW_ONEPARA)
.\" This program is free software; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License
.\" as published by the Free Software Foundation; either version
.\" 2 of the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.TH REQUEST_KEY 2 2010-02-25 Linux "Linux Key Management Calls"
.SH NAME
-request_key \- Request a key from the kernel's key management facility
+request_key \- request a key from the kernel's key management facility
.SH SYNOPSIS
.nf
.B #include <keyutils.h>
is set, this function will attempt to look further afield.
In such a case, the
.I callout_info
-is passed to a userspace service such as
+is passed to a user-space service such as
.B /sbin/request\-key
to generate the key.
.P
On success
.BR request_key ()
returns the serial number of the key it found.
-On error, the value
-.B -1
+On error, the value \-1
will be returned and errno will have been set to an appropriate error.
.SH ERRORS
.TP
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 1992 Drew Eckhardt;
.\" 1993 Michael Haardt, Ian Jackson.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified 1993-07-24 by Rik Faith <faith@cs.unc.edu>
.\" Modified 1997-01-31 by Eric S. Raymond <esr@thyrsus.com>
.SH DESCRIPTION
.BR rmdir ()
deletes a directory, which must be empty.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.B EROFS
.I pathname
refers to a directory on a read-only file system.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
.SH BUGS
Infelicities in the protocol underlying NFS can cause the unexpected
disappearance of directories which are still being used.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR rm (1),
.BR rmdir (1),
.BR chdir (2),
.\" Copyright (c) 2002, 2011 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH RT_SIGQUEUEINFO 2 2011-09-18 "Linux" "Linux Programmer's Manual"
+.TH RT_SIGQUEUEINFO 2 2012-07-13 "Linux" "Linux Programmer's Manual"
.SH NAME
rt_sigqueueinfo, rt_tgsigqueueinfo \- queue a signal and data
.SH SYNOPSIS
.BI "int rt_tgsigqueueinfo(pid_t " tgid ", pid_t " tid ", int " sig ,
.BI " siginfo_t *" uinfo );
.fi
+
+.IR Note :
+There are no glibc wrappers for these system calls; see NOTES.
.SH DESCRIPTION
The
.BR rt_sigqueueinfo ()
.I si_code
This must be one of the
.B SI_*
-codes in the kernel source file
+codes in the Linux kernel source file
.IR include/asm-generic/siginfo.h ,
with the restriction that the code must be negative
(i.e., cannot be
and
.IR tid ,
a thread in that thread group.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these system calls return 0.
On error, they return \-1 and
.I errno
The
.BR rt_tgsigqueueinfo ()
system call was added to Linux in version 2.6.31.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These system calls are Linux-specific.
.SH NOTES
Since these system calls are not intended for application use,
.BR kill (2),
the null signal (0) can be used to check if the specified process
or thread exists.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR kill (2),
.BR sigaction (2),
.BR sigprocmask (2),
--- /dev/null
+.\" Copyright IBM Corp. 2012
+.\" Author: Jan Glauber <jang@linux.vnet.ibm.com>
+.\" Copyright (c) 2012, IBM Corp.
+.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
+.\" This is free documentation; you can redistribute it and/or
+.\" modify it under the terms of the GNU General Public License as
+.\" published by the Free Software Foundation; either version 2 of
+.\" the License, or (at your option) any later version.
+.\"
+.\" The GNU General Public License's references to "object code"
+.\" and "executables" are to be interpreted as the output of any
+.\" document formatting or typesetting system, including
+.\" intermediate and printed output.
+.\"
+.\" This manual is distributed in the hope that it will be useful,
+.\" but WITHOUT ANY WARRANTY; without even the implied warranty of
+.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+.\" GNU General Public License for more details.
+.\"
+.\" You should have received a copy of the GNU General Public
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
+.\"
+.TH S390_RUNTIME_INSTR 2 2012-12-17 "Linux Programmer's Manual"
+.SH NAME
+s390_runtime_instr \- enable/disable s390 CPU run-time instrumentation
+.SH SYNOPSIS
+.nf
+.B #include <asm/runtime_instr.h>
+
+.BI "int s390_runtime_instr(int " command ", int " signum ");
+.fi
+.SH DESCRIPTION
+The
+.BR s390_runtime_instr ()
+system call starts or stops CPU run-time instrumentation for the
+calling thread.
+
+The
+.IR command
+argument controls whether run-time instrumentation is started
+.RB ( S390_RUNTIME_INSTR_START ,
+1) or stopped
+.RB ( S390_RUNTIME_INSTR_STOP ,
+2) for the calling thread.
+
+The
+.IR signum
+argument specifies the number of a real-time signal.
+The real-time signal is sent to the thread if the run-time instrumentation
+buffer is full or if the run-time-instrumentation-halted interrupt
+occurred.
+.SH RETURN VALUE
+On success,
+.BR s390_runtime_instr ()
+returns 0 and enables the thread for
+run-time instrumentation by assigning the thread a default run-time
+instrumentation control block.
+The caller can then read and modify the control block and start the run-time
+instrumentation.
+On error, \-1 is returned and
+.IR errno
+is set to one of the error codes listed below.
+.SH ERRORS
+.TP
+.B EINVAL
+The value specified in
+.IR command
+is not a valid command or the value specified in
+.IR signum
+is not a real-time signal number.
+.TP
+.B ENOMEM
+Allocating memory for the run-time instrumentation control block failed.
+.TP
+.B EOPNOTSUPP
+The run-time instrumentation facility is not available.
+.SH VERSIONS
+This system call is available since Linux 3.7.
+.SH CONFORMING TO
+This Linux-specific system call is only available on the s390 architecture.
+The run-time instrumentation facility is available beginning with System z EC12.
+.SH NOTES
+Glibc does not provide a wrapper for this system call, use
+.BR syscall (2)
+to call it.
+.SH SEE ALSO
+.BR syscall (2),
+.BR signal (7)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) Tom Bjorkholm & Markus Kuhn, 1996
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 1996-04-01 Tom Bjorkholm <tomb@mydata.se>
.\" First version written
are available define
.B _POSIX_PRIORITY_SCHEDULING
in \fI<unistd.h>\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR sched_get_priority_max ()
and
.TP
.B EINVAL
The argument \fIpolicy\fP does not identify a defined scheduling policy.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
+.ad l
+.nh
.BR sched_getaffinity (2),
.BR sched_getparam (2),
.BR sched_getscheduler (2),
.BR sched_setscheduler (2)
.PP
.I Programming for the real world \- POSIX.4
-by Bill O. Gallmeister, O'Reilly & Associates, Inc., ISBN 1-56592-074-0
+by Bill O. Gallmeister, O'Reilly & Associates, Inc., ISBN 1-56592-074-0.
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) Tom Bjorkholm & Markus Kuhn, 1996
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 1996-04-01 Tom Bjorkholm <tomb@mydata.se>
.\" First version written
.\" The round-robin time quantum value is not alterable under Linux
.\" 1.3.81.
.\"
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR sched_rr_get_interval ()
returns 0.
.SH ERRORS
.TP
.B EFAULT
-Problem with copying information to userspace.
+Problem with copying information to user space.
.TP
.B EINVAL
Invalid pid.
.B ESRCH
Could not find a process with the ID
.IR pid .
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
POSIX systems on which
.B _POSIX_PRIORITY_SCHEDULING
in
.IR <unistd.h> .
-.SS Linux Notes
+.SS Linux notes
POSIX does not specify any mechanism for controlling the size of the
round-robin time quantum.
Older Linux kernels provide a (nonportable) method of doing this.
.\" returns with error
.\" ENOSYS, because SCHED_RR has not yet been fully implemented and tested
.\" properly.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sched_setscheduler (2)
has a description of the Linux scheduling scheme.
.PP
.I Programming for the real world \- POSIX.4
-by Bill O. Gallmeister, O'Reilly & Associates, Inc., ISBN 1-56592-074-0
+by Bill O. Gallmeister, O'Reilly & Associates, Inc., ISBN 1-56592-074-0.
-.\" man2/sched_setaffinity.2 - sched_setaffinity and sched_getaffinity man page
-.\"
.\" Copyright (C) 2002 Robert Love
.\" and Copyright (C) 2006 Michael Kerrisk
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 2002-11-19 Robert Love <rml@tech9.net> - initial version
.\" 2004-04-20 mtk - fixed description of return value
.\" 2008-11-12, mtk, removed CPU_*() macro descriptions to a
.\" separate CPU_SET(3) page.
.\"
-.TH SCHED_SETAFFINITY 2 2010-11-06 "Linux" "Linux Programmer's Manual"
+.TH SCHED_SETAFFINITY 2 2013-02-11 "Linux" "Linux Programmer's Manual"
.SH NAME
sched_setaffinity, sched_getaffinity \- \
set and get a process's CPU affinity mask
If
.I pid
is zero, then the mask of the calling process is returned.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR sched_setaffinity ()
and
.I cpusetsize
argument was removed, but was then restored in glibc 2.3.4, with type
.IR size_t .
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These system calls are Linux-specific.
-.SH "NOTES"
+.SH NOTES
After a call to
.BR sched_setaffinity (),
the set of CPUs on which the process will actually run is
.I cpumask_t
data type that is used internally by the kernel to
represent the CPU set bit mask.
-.SH "SEE ALSO"
+.SH SEE ALSO
+.ad l
+.nh
+.BR taskset (1),
.BR clone (2),
.BR getcpu (2),
.BR getpriority (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) Tom Bjorkholm & Markus Kuhn, 1996
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 1996-04-01 Tom Bjorkholm <tomb@mydata.se>
.\" First version written
.\" revision
.\" Modified 2004-05-27 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
-.TH SCHED_SETPARAM 2 2006-03-23 "Linux" "Linux Programmer's Manual"
+.TH SCHED_SETPARAM 2 2013-02-12 "Linux" "Linux Programmer's Manual"
.SH NAME
sched_setparam, sched_getparam \- set and get scheduling parameters
.SH SYNOPSIS
are available define
.B _POSIX_PRIORITY_SCHEDULING
in \fI<unistd.h>\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR sched_setparam ()
and
.TP
.B ESRCH
The process whose ID is \fIpid\fP could not be found.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
-.SH "SEE ALSO"
+.SH NOTES
+.PP
+Scheduling parameters are in fact per-thread
+attributes on Linux;
+see
+.BR sched_setscheduler (2).
+.SH SEE ALSO
+.ad l
+.nh
.BR getpriority (2),
.BR nice (2),
.BR sched_get_priority_max (2),
.BR capabilities (7)
.PP
.I Programming for the real world \- POSIX.4
-by Bill O. Gallmeister, O'Reilly & Associates, Inc., ISBN 1-56592-074-0
+by Bill O. Gallmeister, O'Reilly & Associates, Inc., ISBN 1-56592-074-0.
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) Tom Bjorkholm, Markus Kuhn & David A. Wheeler 1996-1999
.\" and Copyright (C) 2007 Carsten Emde <Carsten.Emde@osadl.org>
.\" and Copyright (C) 2008 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 1996-04-01 Tom Bjorkholm <tomb@mydata.se>
.\" First version written
.\"
.\" Worth looking at: http://rt.wiki.kernel.org/index.php
.\"
-.TH SCHED_SETSCHEDULER 2 2011-09-19 "Linux" "Linux Programmer's Manual"
+.TH SCHED_SETSCHEDULER 2 2013-02-12 "Linux" "Linux Programmer's Manual"
.SH NAME
sched_setscheduler, sched_getscheduler \-
set and get scheduling policy/parameters
If \fIpid\fP equals zero, the policy of the
calling process will be retrieved.
.\"
-.SS Scheduling Policies
+.SS Scheduling policies
The scheduler is the kernel component that decides which runnable process
will be executed by the CPU next.
Each process has an associated scheduling policy and a \fIstatic\fP
The scheduling policy only determines the
ordering within the list of runnable processes with equal static
priority.
-.SS SCHED_FIFO: First In-First Out scheduling
+.SS SCHED_FIFO: First in-first out scheduling
\fBSCHED_FIFO\fP can only be used with static priorities higher than
0, which means that when a \fBSCHED_FIFO\fP processes becomes runnable,
it will always immediately preempt any currently running
process runs until either it is blocked by an I/O request, it is
preempted by a higher priority process, or it calls
.BR sched_yield (2).
-.SS SCHED_RR: Round Robin scheduling
+.SS SCHED_RR: Round-robin scheduling
\fBSCHED_RR\fP is a simple enhancement of \fBSCHED_FIFO\fP.
Everything
described above for \fBSCHED_FIFO\fP also applies to \fBSCHED_RR\fP,
A \fBSCHED_RR\fP process that has
been preempted by a higher priority process and subsequently resumes
execution as a running process will complete the unexpired portion of
-its round robin time quantum.
+its round-robin time quantum.
The length of the time quantum can be
retrieved using
.BR sched_rr_get_interval (2).
are available define
.B _POSIX_PRIORITY_SCHEDULING
in \fI<unistd.h>\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR sched_setscheduler ()
returns zero.
.TP
.B ESRCH
The process whose ID is \fIpid\fP could not be found.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001 (but see BUGS below).
The \fBSCHED_BATCH\fP and \fBSCHED_IDLE\fP policies are Linux-specific.
.SH NOTES
the real or effective user ID of the calling process must
match the real user ID or the save set-user-ID of the target process.
.PP
+The scheduling policy and parameters are in fact per-thread
+attributes on Linux.
+The value returned from a call to
+.BR gettid (2)
+can be passed in the argument
+.IR pid .
+Specifying
+.I pid
+as 0 will operate on the attribute for the calling thread,
+and passing the value returned from a call to
+.BR getpid (2)
+will operate on the attribute for the main thread of the thread group.
+(If you are using the POSIX threads API, then use
+.BR pthread_setschedparam (3),
+.BR pthread_getschedparam (3),
+and
+.BR pthread_setschedprio (3),
+instead of the
+.BR sched_* (2)
+system calls.)
+.PP
Originally, Standard Linux was intended as a general-purpose operating
system being able to handle background processes, interactive
applications, and less demanding real-time applications (applications that
.in
.PP
and can be downloaded from
-.IR http://www.kernel.org/pub/linux/kernel/projects/rt/ .
+.UR http://www.kernel.org\:/pub\:/linux\:/kernel\:/projects\:/rt/
+.UE .
Without the patches and prior to their full inclusion into the mainline
kernel, the kernel configuration offers only the three preemption classes
.BR sched_setscheduler ()
does not conform to this requirement,
since it always returns 0 on success.
-.SH "SEE ALSO"
+.SH SEE ALSO
+.ad l
+.nh
+.BR chrt (1),
.BR getpriority (2),
.BR mlock (2),
.BR mlockall (2),
.BR setpriority (2),
.BR capabilities (7),
.BR cpuset (7)
+.ad j
.PP
.I Programming for the real world \- POSIX.4
-by Bill O. Gallmeister, O'Reilly & Associates, Inc., ISBN 1-56592-074-0
+by Bill O. Gallmeister, O'Reilly & Associates, Inc., ISBN 1-56592-074-0.
.PP
-The kernel source file
.I Documentation/scheduler/sched-rt-group.txt
+in the Linux kernel source tree
(since kernel 2.6.25).
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) Tom Bjorkholm & Markus Kuhn, 1996
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 1996-04-01 Tom Bjorkholm <tomb@mydata.se>
.\" First version written
causes the calling thread to relinquish the CPU.
The thread is moved to the end of the queue for its static
priority and a new thread gets to run.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR sched_yield ()
returns 0.
In the Linux implementation,
.BR sched_yield ()
always succeeds.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
If the calling thread is the only thread in the highest
schedulable threads are still held by the caller),
since doing so will result in unnecessary context switches,
which will degrade system performance.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sched_setscheduler (2)
-for a description of Linux scheduling.
+for a description of Linux scheduling
.PP
.I Programming for the real world \- POSIX.4
-by Bill O. Gallmeister, O'Reilly & Associates, Inc., ISBN 1-56592-074-0
+by Bill O. Gallmeister, O'Reilly & Associates, Inc., ISBN 1-56592-074-0.
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is copyright (C) 1992 Drew Eckhardt,
.\" copyright (C) 1995 Michael Shields.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified 1993-07-24 by Rik Faith <faith@cs.unc.edu>
.\" Modified 1995-05-18 by Jim Van Zandt <jrv@vanzandt.mv.com>
.\" 2005-03-11, mtk, modified pselect() text (it is now a system
.\" call in 2.6.16.
.\"
-.TH SELECT 2 2012-05-02 "Linux" "Linux Programmer's Manual"
+.TH SELECT 2 2012-08-17 "Linux" "Linux Programmer's Manual"
.SH NAME
select, pselect, FD_CLR, FD_ISSET, FD_SET, FD_ZERO \-
synchronous I/O multiplexing
.BR select ()
and
.BR pselect ()
-is identical, with three differences:
+is identical, other than these three differences:
.TP
(i)
.BR select ()
sigset_t origmask;
- sigprocmask(SIG_SETMASK, &sigmask, &origmask);
+ pthread_sigmask(SIG_SETMASK, &sigmask, &origmask);
ready = select(nfds, &readfds, &writefds, &exceptfds, timeout);
- sigprocmask(SIG_SETMASK, &origmask, NULL);
+ pthread_sigmask(SIG_SETMASK, &origmask, NULL);
.fi
.PP
The reason that
with the desired
.IR sigmask ,
avoiding the race.)
-.SS "The timeout"
+.SS The timeout
The time structures involved are defined in
.I <sys/time.h>
and look like
.\" On BSD, when a timeout occurs, the file descriptor bits are not changed.
.\" - it is certainly true that:
.\" Linux follows SUSv2 and sets the bit masks to zero upon a timeout.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR select ()
and
Prior to this,
.BR pselect ()
was emulated in glibc (but see BUGS).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR select ()
conforms to POSIX.1-2001 and
4.4BSD
.B _GNU_SOURCE
is defined.
Since glibc 2.2.2 the requirements are as shown in the SYNOPSIS.
-.SS "Linux Notes"
+.SS Multithreaded applications
+If a file descriptor being monitored by
+.BR select ()
+is closed in another thread, the result is unspecified.
+On some UNIX systems,
+.BR select ()
+unblocks and returns, with an indication that the file descriptor is ready
+(a subsequent I/O operation will likely fail with an error,
+unless another the file descriptor reopened between the time
+.BR select ()
+returned and the I/O operations was performed).
+On Linux (and some other systems),
+closing the file descriptor in another thread has no effect on
+.BR select ().
+In summary, any application that relies on a particular behavior
+in this scenario must be considered buggy.
+.SS Linux notes
The
.BR pselect ()
interface described in this page is implemented by glibc.
The underlying Linux system call is named
.BR pselect6 ().
-This system call has somewhat different behavior from the gibc
+This system call has somewhat different behavior from the glibc
wrapper function.
The Linux
this is the behavior required by POSIX.1-2001.
The final argument of the
-.BR pselect6()
+.BR pselect6 ()
system call is not a
.I "sigset_t\ *"
pointer, but is instead a structure of the form:
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
-For a tutorial with discussion and examples, see
-.BR select_tut (2).
-.LP
-For vaguely related stuff, see
+.SH SEE ALSO
.BR accept (2),
.BR connect (2),
.BR poll (2),
.BR write (2),
.BR epoll (7),
.BR time (7)
+
+For a tutorial with discussion and examples, see
+.BR select_tut (2).
.\" This manpage is copyright (C) 2001 Paul Sheer.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" very minor changes, aeb
.\"
.\" various other changes
.\" 2008-01-26, mtk, substantial changes and rewrites
.\"
-.TH SELECT_TUT 2 2010-06-10 "Linux" "Linux Programmer's Manual"
+.TH SELECT_TUT 2 2012-08-03 "Linux" "Linux Programmer's Manual"
.SH NAME
select, pselect, FD_CLR, FD_ISSET, FD_SET, FD_ZERO \-
synchronous I/O multiplexing
.BR pselect ()
will then behave just like
.BR select ().
-.SS Combining Signal and Data Events
+.SS Combining signal and data events
.BR pselect ()
is useful if you are waiting for a signal as well as
for file descriptor(s) to become ready for I/O.
descriptor, while another file descriptor is unused though ready for I/O.
.BR select ()
efficiently copes with this situation.
-.SS Select Law
+.SS Select law
Many people who try to use
.BR select ()
come across behavior that is
.\" Having no file descriptors set is a useful
.\" way to sleep the process with subsecond precision by using the timeout.
.\" (See further on.)
-.SS Usleep Emulation
+.SS Usleep emulation
On systems that do not have a
.BR usleep (3)
function, you can call
}
yes = 1;
if (setsockopt(s, SOL_SOCKET, SO_REUSEADDR,
- (char *) &yes, sizeof(yes)) == \-1) {
+ &yes, sizeof(yes)) == \-1) {
perror("setsockopt");
close(s);
return \-1;
int buf2_avail, buf2_written;
if (argc != 4) {
- fprintf(stderr, "Usage\\n\\tfwd <listen-port> "
- "<forward-to-port> <forward-to-ip-address>\\n");
+ fprintf(stderr, "Usage\\n\\tfwd <listen\-port> "
+ "<forward\-to\-port> <forward\-to\-ip\-address>\\n");
exit(EXIT_FAILURE);
}
.\" Copyright 1993 Giorgio Ciucci (giorgio@crcc.it)
.\" and Copyright 2004, 2005 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified Tue Oct 22 17:53:56 1996 by Eric S. Raymond <esr@thyrsus.com>
.\" Modified Fri Jun 19 10:59:15 1998 by Andries Brouwer <aeb@cwi.nl>
.\" Added semid_ds and ipc_perm structure definitions
.\" 2005-08-02, mtk: Added IPC_INFO, SEM_INFO, SEM_STAT descriptions.
.\"
-.TH SEMCTL 2 2009-09-27 "Linux" "Linux Programmer's Manual"
+.TH SEMCTL 2 2012-05-31 "Linux" "Linux Programmer's Manual"
.SH NAME
semctl \- semaphore control operations
.SH SYNOPSIS
.PP
The
.I ipc_perm
-structure is defined in \fI<sys/ipc.h>\fP as follows
+structure is defined as follows
(the highlighted fields are settable using
.BR IPC_SET ):
.PP
.BR semop (2)
calls in other processes to proceed, then those processes are woken up.
The calling process must have alter permission on the semaphore set.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On failure
.BR semctl ()
returns \-1
is to be set (for some semaphore of the set) is less than 0
or greater than the implementation limit
.BR SEMVMX .
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001.
.\" SVr4 documents more error conditions EINVAL and EOVERFLOW.
.SH NOTES
+The inclusion of
+.I <sys/types.h>
+and
+.I <sys/ipc.h>
+isn't required on Linux or by any version of POSIX.
+However,
+some old implementations required the inclusion of these header files,
+and the SVID also documented their inclusion.
+Applications intended to be portable to such old systems may need
+to include these header files.
+.\" Like Linux, the FreeBSD man pages still document
+.\" the inclusion of these header files.
+
The
.BR IPC_INFO ,
.B SEM_STAT
For greater portability it is best to always call
.BR semctl ()
with four arguments.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ipc (2),
.BR semget (2),
.BR semop (2),
.\" Copyright 1993 Giorgio Ciucci (giorgio@crcc.it)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified Tue Oct 22 17:54:56 1996 by Eric S. Raymond <esr@thyrsus.com>
.\" Modified 1 Jan 2002, Martin Schulze <joey@infodrom.org>
.\" Rewrote BUGS note about semget()'s failure to initialize
.\" semaphore values
.\"
-.TH SEMGET 2 2004-05-27 "Linux" "Linux Programmer's Manual"
+.TH SEMGET 2 2012-05-31 "Linux" "Linux Programmer's Manual"
.SH NAME
semget \- get a semaphore set identifier
.SH SYNOPSIS
If the semaphore set already exists, the permissions are
verified.
.\" and a check is made to see if it is marked for destruction.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
If successful, the return value will be the semaphore set identifier
(a nonnegative integer), otherwise \-1
is returned, with
or the system wide maximum number of semaphores
.RB ( SEMMNS ),
would be exceeded.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001.
.\" SVr4 documents additional error conditions EFBIG, E2BIG, EAGAIN,
.\" ERANGE, EFAULT.
.SH NOTES
+The inclusion of
+.I <sys/types.h>
+and
+.I <sys/ipc.h>
+isn't required on Linux or by any version of POSIX.
+However,
+some old implementations required the inclusion of these header files,
+and the SVID also documented their inclusion.
+Applications intended to be portable to such old systems may need
+to include these header files.
+.\" Like Linux, the FreeBSD man pages still document
+.\" the inclusion of these header files.
+
.B IPC_PRIVATE
isn't a flag field but a
.I key_t
.BR semctl (2)
.B IPC_STAT
operation can be used to avoid races.)
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR semctl (2),
.BR semop (2),
.BR ftok (3),
.\" Copyright 1993 Giorgio Ciucci (giorgio@crcc.it)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified 1996-10-22, Eric S. Raymond <esr@thyrsus.com>
.\" Modified 2002-01-08, Michael Kerrisk <mtk.manpages@gmail.com>
.\" 2005-04-08, mtk, Noted kernel version numbers for semtimedop()
.\" 2007-07-09, mtk, Added an EXAMPLE code segment.
.\"
-.TH SEMOP 2 2012-05-10 "Linux" "Linux Programmer's Manual"
+.TH SEMOP 2 2012-08-27 "Linux" "Linux Programmer's Manual"
.SH NAME
semop, semtimedop \- semaphore operations
.SH SYNOPSIS
unsigned short semval; /* semaphore value */
unsigned short semzcnt; /* # waiting for zero */
unsigned short semncnt; /* # waiting for increase */
-pid_t sempid; /* process that did last op */
+pid_t sempid; /* ID of process that did last op */
.sp
.in -4n
.fi
.RI ( semval ).
Furthermore, if
.B SEM_UNDO
-is specified for this operation, the system updates the process undo count
+is specified for this operation, the system updates the undo count
.RI ( semadj )
for this semaphore.
-This operation can always proceed\(emit never forces a process to wait.
+This operation can always proceed\(emit never forces a thread to wait.
The calling process must have alter permission on the semaphore set.
.PP
If
is performed).
Otherwise
.I semzcnt
-(the count of processes waiting until this semaphore's value becomes zero)
-is incremented by one and the process sleeps until
+(the count of threads waiting until this semaphore's value becomes zero)
+is incremented by one and the thread sleeps until
one of the following occurs:
.IP \(bu 3
.I semval
set to
.BR EIDRM .
.IP \(bu
-The calling process catches a signal:
+The calling thread catches a signal:
the value of
.I semzcnt
is decremented and
.IR semval ,
and, if
.B SEM_UNDO
-is specified for this operation, the system updates the process undo count
+is specified for this operation, the system updates the undo count
.RI ( semadj )
for this semaphore.
If the absolute value of
is performed).
Otherwise
.I semncnt
-(the counter of processes waiting for this semaphore's value to increase)
-is incremented by one and the process sleeps until
+(the counter of threads waiting for this semaphore's value to increase)
+is incremented by one and the thread sleeps until
one of the following occurs:
.IP \(bu 3
.I semval
.I semval
and, if
.B SEM_UNDO
-is specified for this operation, the system updates the process undo count
+is specified for this operation, the system updates the undo count
.RI ( semadj )
for this semaphore.
.IP \(bu
set to
.BR EIDRM .
.IP \(bu
-The calling process catches a signal:
+The calling thread catches a signal:
the value of
.I semncnt
is decremented and
.I sempid
value for each semaphore specified in the array pointed to by
.I sops
-is set to the process ID of the calling process.
+is set to the caller's process ID.
In addition, the
.I sem_otime
.\" and
.BR semtimedop ()
behaves identically to
.BR semop ()
-except that in those cases were the calling process would sleep,
+except that in those cases where the calling thread would sleep,
the duration of that sleep is limited by the amount of elapsed
time specified by the
.I timespec
.BR semtimedop ()
behaves exactly like
.BR semop ().
-.SH "RETURN VALUE"
+.SH RETURN VALUE
If successful
.BR semop ()
and
The semaphore set was removed.
.TP
.B EINTR
-While blocked in this system call, the process caught a signal; see
+While blocked in this system call, the thread caught a signal; see
.BR signal (7).
.TP
.B EINVAL
Glibc support for
.BR semtimedop ()
first appeared in version 2.3.3.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001.
.\" SVr4 documents additional error conditions EINVAL, EFBIG, ENOSPC.
.SH NOTES
+The inclusion of
+.I <sys/types.h>
+and
+.I <sys/ipc.h>
+isn't required on Linux or by any version of POSIX.
+However,
+some old implementations required the inclusion of these header files,
+and the SVID also documented their inclusion.
+Applications intended to be portable to such old systems may need
+to include these header files.
+.\" Like Linux, the FreeBSD man pages still document
+.\" the inclusion of these header files.
+
The
.I sem_undo
structures of a process aren't inherited by the child produced by
termination to proceed immediately.
In kernels 2.6.x, x <= 10, there is a bug that in some circumstances
-prevents a process that is waiting for a semaphore value to become
+prevents a thread that is waiting for a semaphore value to become
zero from being woken up when the value does actually become zero.
This bug is fixed in kernel 2.6.11.
.\" The bug report:
exit(EXIT_FAILURE);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
+.BR clone (2),
.BR semctl (2),
.BR semget (2),
.BR sigaction (2),
.\" Copyright (c) 1983, 1991 The Regents of the University of California.
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" Modified 1993-07-24 by Rik Faith <faith@cs.unc.edu>
.\" Modified 1996-10-22 by Eric S. Raymond <esr@thyrsus.com>
.\" Send file descriptors and user credentials using the
.\" msg_control* fields.
.\" The flags returned in msg_flags.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these calls return the number of characters sent.
On error, \-1 is returned, and
.I errno
unless
.B MSG_NOSIGNAL
is set.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.4BSD, SVr4, POSIX.1-2001.
These function calls appeared in 4.2BSD.
.LP
.\" across architectures, but socklen_t is always 32 bits.
See
-.BR sendmmsg(2)
+.BR sendmmsg (2)
for information about a Linux-specific system call
that can be used to transmit multiple datagrams in a single call.
.SH BUGS
.BR sendto ()
is shown in
.BR getaddrinfo (3).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fcntl (2),
.BR getsockopt (2),
.BR recv (2),
.\" This man page is Copyright (C) 1998 Pawel Krawczyk.
+.\"
+.\" %%%LICENSE_START(VERBATIM_ONE_PARA)
.\" Permission is granted to distribute possibly modified copies
.\" of this page provided the header is included verbatim,
.\" and in case of nontrivial modification author and date
.\" of the modification is added to the header.
+.\" %%%LICENSE_END
+.\"
.\" $Id: sendfile.2,v 1.5 1999/05/18 11:54:11 freitag Exp $
.\" 2000-11-19 bert hubert <ahu@ds9a.nl>: in_fd cannot be socket
.\"
If it is a regular file, then
.BR sendfile ()
changes the file offset appropriately.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
If the transfer was successful, the number of bytes written to
.I out_fd
is returned.
The include file
.I <sys/sendfile.h>
is present since glibc 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
Not specified in POSIX.1-2001, or other standards.
Other UNIX systems implement
.BR splice (2)
call supports transferring data between arbitrary files
(e.g., a pair of sockets).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mmap (2),
.BR open (2),
.BR socket (2),
.\" Stephan Mueller <stephan.mueller@atsec.com>
.\" in turn based on Andi Kleen's recvmmsg.2 page.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.\" FIXME Adding an example program would improve this page
-.\"
-.TH SENDMMSG 2 2012-02-27 "Linux" "Linux Programmer's Manual"
+.TH SENDMMSG 2 2012-12-16 "Linux" "Linux Programmer's Manual"
.SH NAME
sendmmsg \- send multiple messages on a socket
.SH SYNOPSIS
.\" For error handling an application using sendmmsg needs to retry at
.\" the first unsent message, so capping is simpler and requires less
.\" application logic than returning EINVAL.
+.SH EXAMPLE
+The example below uses
+.BR sendmmsg ()
+to send
+.I onetwo
+and
+.I three
+in two distinct UDP datagrams using one system call.
+The contents of the first datagram originates from a pair of buffers.
+
+.nf
+#define _GNU_SOURCE
+#include <netinet/ip.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <sys/types.h>
+#include <sys/socket.h>
+
+int
+main(void)
+{
+ int sockfd;
+ struct sockaddr_in sa;
+ struct mmsghdr msg[2];
+ struct iovec msg1[2], msg2;
+ int retval;
+
+ sockfd = socket(AF_INET, SOCK_DGRAM, 0);
+ if (sockfd == \-1) {
+ perror("socket()");
+ exit(EXIT_FAILURE);
+ }
+
+ sa.sin_family = AF_INET;
+ sa.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
+ sa.sin_port = htons(1234);
+ if (connect(sockfd, (struct sockaddr *) &sa, sizeof(sa)) == \-1) {
+ perror("connect()");
+ exit(EXIT_FAILURE);
+ }
+
+ memset(msg1, 0, sizeof(msg1));
+ msg1[0].iov_base = "one";
+ msg1[0].iov_len = 3;
+ msg1[1].iov_base = "two";
+ msg1[1].iov_len = 3;
+
+ memset(&msg2, 0, sizeof(msg2));
+ msg2.iov_base = "three";
+ msg2.iov_len = 5;
+
+ memset(msg, 0, sizeof(msg));
+ msg[0].msg_hdr.msg_iov = msg1;
+ msg[0].msg_hdr.msg_iovlen = 2;
+
+ msg[1].msg_hdr.msg_iov = &msg2;
+ msg[1].msg_hdr.msg_iovlen = 1;
+
+ retval = sendmmsg(sockfd, msg, 2, 0);
+ if (retval == \-1)
+ perror("sendmmsg()");
+ else
+ printf("%d messages sent\\n", retval);
+
+ exit(0);
+}
+.fi
.SH SEE ALSO
.BR recvmmsg (2),
.BR sendmsg (2),
.\" Copyright 2003,2004 Andi Kleen, SuSE Labs.
.\" and Copyright 2007 Lee Schermerhorn, Hewlett Packard
.\"
+.\" %%%LICENSE_START(VERBATIM_PROF)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 2006-02-03, mtk, substantial wording changes and other improvements
.\" 2007-08-27, Lee Schermerhorn <Lee.Schermerhorn@hp.com>
.\" Copyright (C) 2003 Free Software Foundation, Inc.
-.\" This file is distributed according to the GNU General Public License.
-.\" See the file COPYING in the top level source directory for details.
-.\"
.\" Author: Kent Yoder
.\"
-.TH SET_THREAD_AREA 2 2008-11-27 "Linux" "Linux Programmer's Manual"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
+.\" This file is distributed according to the GNU General Public License.
+.\" %%%LICENSE_END
+.\"
+.TH SET_THREAD_AREA 2 2012-07-13 "Linux" "Linux Programmer's Manual"
.SH NAME
-set_thread_area \- Set a Thread Local Storage (TLS) area
-.SH "SYNOPSIS"
+set_thread_area \- set a thread local storage (TLS) area
+.SH SYNOPSIS
.B #include <linux/unistd.h>
.br
.B #include <asm/ldt.h>
.sp
.BI "int set_thread_area(struct user_desc *" u_info );
-.SH "DESCRIPTION"
+
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
+.SH DESCRIPTION
.BR set_thread_area ()
-sets an entry in the current thread's Thread Local Storage (TLS) array.
+sets an entry in the current thread's thread-local storage (TLS) array.
The TLS array entry set by
.BR set_thread_area ()
corresponds to the value of
finds a free TLS entry, the value of
.I u_info\->entry_number
is set upon return to show which entry was changed.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR set_thread_area ()
returns 0 on success, and \-1 on failure, with
.I errno
set appropriately.
-.SH "ERRORS"
+.SH ERRORS
.TP
.B EINVAL
\fIu_info\->entry_number\fP is out of bounds.
.TP
.B ESRCH
A free TLS entry could not be located.
-.SH "VERSIONS"
+.SH VERSIONS
A version of
.BR set_thread_area ()
first appeared in Linux 2.5.29.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR set_thread_area ()
is Linux-specific and should not be used in programs that are intended
to be portable.
.SH NOTES
-Glibc does not provide a wrapper for this system call;
-call it using
+Glibc does not provide a wrapper for this system call,
+since it is generally intended only for use by threading libraries.
+In the unlikely event that you want to call it directly, use
.BR syscall (2).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR get_thread_area (2)
.\" Copyright (C) 2004 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH SET_TID_ADDRESS 2 2004-09-10 "Linux" "Linux Programmer's Manual"
+.TH SET_TID_ADDRESS 2 2012-07-19 "Linux" "Linux Programmer's Manual"
.SH NAME
set_tid_address \- set pointer to thread ID
.SH SYNOPSIS
.BI "long set_tid_address(int *" tidptr );
.fi
.SH DESCRIPTION
-The kernel keeps for each process two values called
+For each process, the kernel maintains two attributes (addresses) called
.I set_child_tid
and
-.I clear_child_tid
-that are NULL by default.
-.SS set_child_tid
+.IR clear_child_tid .
+These two attributes contain the value NULL by default.
+.TP
+.I set_child_tid
If a process is started using
.BR clone (2)
with the
.B CLONE_CHILD_SETTID
flag,
.I set_child_tid
-is set to
-.IR child_tidptr ,
-the fifth argument of that system call.
-.LP
+is set to the value passed in the
+.I ctid
+argument of that system call.
+.IP
When
.I set_child_tid
is set, the very first thing the new process does
is writing its PID at this address.
-.SS clear_child_tid
+.TP
+.I clear_child_tid
If a process is started using
.BR clone (2)
with the
.B CLONE_CHILD_CLEARTID
flag,
.I clear_child_tid
-is set to
-.IR child_tidptr ,
-the fifth argument of that system call.
+is set to the value passed in the
+.I ctid
+argument of that system call.
.LP
The system call
.BR set_tid_address ()
value for the calling process to
.IR tidptr .
.LP
-When
+When a process whose
+.I clear_child_tid
+is not NULL terminates, then,
+if the process is sharing memory with other processes or threads,
+then 0 is written at the address specified in
.I clear_child_tid
-is set, and the process exits, and the process was sharing memory
-with other processes or threads, then 0 is written at this address,
-and a
-.I futex(child_tidptr, FUTEX_WAKE, 1, NULL, NULL, 0);
-call is done.
-(That is, wake a single process waiting on this futex.)
-Errors are ignored.
-.SH "RETURN VALUE"
+and the kernel performs the following operation:
+
+ futex(clear_child_tid, FUTEX_WAKE, 1, NULL, NULL, 0);
+
+The effect of this operation is to wake a single process that
+is performing a futex wait on the memory location.
+Errors from the futex wake operation are ignored.
+.SH RETURN VALUE
.BR set_tid_address ()
always returns the PID of the calling process.
.SH ERRORS
.SH VERSIONS
This call is present since Linux 2.5.48.
Details as given here are valid since Linux 2.5.49.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This system call is Linux-specific.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR clone (2),
.BR futex (2)
-.so man2/getcontext.2
+.so man3/getcontext.3
.\" Copyright (C) 2001 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" [should really be seteuid.3]
.\" Modified, 27 May 2004, Michael Kerrisk <mtk.manpages@gmail.com>
.\" Added notes on capability requirements
.\"
-.TH SETEUID 2 2009-10-17 "Linux" "Linux Programmer's Manual"
+.TH SETEUID 2 2012-07-02 "Linux" "Linux Programmer's Manual"
.SH NAME
seteuid, setegid \- set effective user or group ID
.SH SYNOPSIS
.\" equals \-1, nothing is changed.
.\" (This is an artifact of the implementation in glibc of seteuid()
.\" using setresuid(2).)
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.IR egid )
is not the real user (group) ID, the effective user (group) ID,
or the saved set-user-ID (saved set-group-ID).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD, POSIX.1-2001.
.SH NOTES
Setting the effective user (group) ID to the
Under glibc 2.1 and later it is equivalent to
.BI setresuid(\-1, " euid" ", \-1)"
and hence does not change the saved set-user-ID.
-Similar remarks hold for
-.BR setegid ().
+Analogous remarks hold for
+.BR setegid (),
+with the difference that the change in implementation from
+.BI setregid(\-1, " egid" )
+to
+.BI setresgid(\-1, " egid" ", \-1)"
+occurred in glibc 2.2 or 2.3 (dependeing on the hardware architecture).
According to POSIX.1,
.BR seteuid ()
.RI ( egid )
to be the same value as the current effective user (group) ID,
and some implementations do not permit this.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR geteuid (2),
.BR setresuid (2),
.BR setreuid (2),
.\" Copyright (C) 1995, Thomas K. Dyas <tdyas@eden.rutgers.edu>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Created 1995-08-06 Thomas K. Dyas <tdyas@eden.rutgers.edu>
.\" Modified 2000-07-01 aeb
matches either the real group ID, effective group ID,
saved set-group-ID, or the current value of
.IR fsgid .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, the previous value of
.I fsgid
is returned.
This system call is present in Linux since version 1.2.
.\" This system call is present since Linux 1.1.44
.\" and in libc since libc 4.7.6.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR setfsgid ()
is Linux-specific and should not be used in programs intended
to be portable.
should be returned when the call fails (because the caller lacks the
.B CAP_SETGID
capability).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR kill (2),
.BR setfsuid (2),
.BR capabilities (7),
.\" Copyright (C) 1995, Thomas K. Dyas <tdyas@eden.rutgers.edu>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Created 1995-08-06 Thomas K. Dyas <tdyas@eden.rutgers.edu>
.\" Modified 2000-07-01 aeb
matches either the real user ID, effective user ID, saved set-user-ID, or
the current value of
.IR fsuid .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, the previous value of
.I fsuid
is returned.
This system call is present in Linux since version 1.2.
.\" This system call is present since Linux 1.1.44
.\" and in libc since libc 4.7.6.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR setfsuid ()
is Linux-specific and should not be used in programs intended
to be portable.
should be returned when the call fails (because the caller lacks the
.B CAP_SETUID
capability).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR kill (2),
.BR setfsgid (2),
.BR capabilities (7),
.\" Copyright (C), 1994, Graeme W. Wilford. (Wilf.)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Fri Jul 29th 12:56:44 BST 1994 Wilf. <G.Wilford@ee.surrey.ac.uk>
.\" Modified 1997-01-31 by Eric S. Raymond <esr@thyrsus.com>
to drop all of its group
privileges, do some un-privileged work, and then reengage the original
effective group ID in a secure manner.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.I gid
does not match the real group ID or saved set-group-ID of
the calling process.
+.SH CONFORMING TO
+SVr4, POSIX.1-2001.
.SH NOTES
The original Linux
.BR setgid ()
The glibc
.BR setgid ()
wrapper function transparently deals with the variation across kernel versions.
-.SH "CONFORMING TO"
-SVr4, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getgid (2),
.BR setegid (2),
.BR setregid (2),
.\" Copyright (C) 2011, Eric Biederman <ebiederm@xmission.com>
+.\" and Copyright (C) 2011, 2012, Michael Kerrisk <mtk.manpages@gamil.com>
+.\"
+.\" %%%LICENSE_START(GPLv2_ONELINE)
.\" Licensed under the GPLv2
+.\" %%%LICENSE_END
.\"
-.TH SETNS 2 2012-05-04 "Linux" "Linux Programmer's Manual"
+.TH SETNS 2 2013-01-01 "Linux" "Linux Programmer's Manual"
.SH NAME
setns \- reassociate thread with a namespace
.SH SYNOPSIS
.BR clone (2)
can be changed using
.BR setns ().
-.SH BUGS
-The PID namespace and the mount namespace are not currently supported.
-(See the descriptions of
-.BR CLONE_NEWPID
-and
-.BR CLONE_NEWNS
-in
-.BR clone (2).)
+.SH EXAMPLE
+The program below takes two or more arguments.
+The first argument specifies the pathname of a namespace file in an existing
+.I /proc/[pid]/ns/
+directory.
+The remaining arguments specify a command and its arguments.
+The program opens the namespace file, joins that namespace using
+.BR setns (),
+and executes the specified command inside that namespace.
+
+The following shell session demonstrates the use of this program
+(compiled as a binary named
+.IR ns_exec )
+in conjunction with the
+.BR CLONE_NEWUTS
+example program in the
+.BR clone (2)
+man page (complied as a binary named
+.IR newuts ).
+
+We begin by executing the example program in
+.BR clone (2)
+in the background.
+That program creates a child in a separate UTS namespace.
+The child changes the hostname in its namespace,
+and then both processes display the hostnames in their UTS namespaces,
+so that we can see that they are different.
+
+.nf
+.in +4n
+$ \fBsu\fP # Need privilege for namespace operations
+Password:
+# \fB./newuts bizarro &\fP
+[1] 3549
+clone() returned 3550
+uts.nodename in child: bizarro
+uts.nodename in parent: antero
+# \fBuname -n\fP # Verify hostname in the shell
+antero
+.in
+.fi
+
+We then run the program shown below,
+using it to execute a shell.
+Inside that shell, we verify that the hostname is the one
+set by the child created by the first program:
+
+.nf
+.in +4n
+# \fB./ns_exec /proc/3550/ns/uts /bin/bash\fP
+# \fBuname -n\fP # Executed in shell started by ns_exec
+bizarro
+.in
+.fi
+.SS Program source
+.nf
+#define _GNU_SOURCE
+#include <fcntl.h>
+#include <sched.h>
+#include <unistd.h>
+#include <stdlib.h>
+#include <stdio.h>
+
+#define errExit(msg) do { perror(msg); exit(EXIT_FAILURE); \\
+ } while (0)
+
+int
+main(int argc, char *argv[])
+{
+ int fd;
+
+ if (argc < 3) {
+ fprintf(stderr, "%s /proc/PID/ns/FILE cmd args...\\n", argv[0]);
+ exit(EXIT_FAILURE);
+ }
+
+ fd = open(argv[1], O_RDONLY); /* Get descriptor for namespace */
+ if (fd == \-1)
+ errExit("open");
+
+ if (setns(fd, 0) == \-1) /* Join that namespace */
+ errExit("setns");
+
+ execvp(argv[2], &argv[2]); /* Execute a command in namespace */
+ errExit("execvp");
+}
+.fi
.SH SEE ALSO
.BR clone (2),
.BR fork (2),
.\" and Copyright (C) 2007, Michael Kerrisk <mtk.manpages@gmail.com>
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)getpgrp.2 6.4 (Berkeley) 3/10/91
.\"
.I pid
argument, is equivalent to
.IR "getpgid(pid)" .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR setpgid ()
and
.BR setpgid ():
.I pid
is not the calling process and not a child of the calling process.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR setpgid ()
and the version of
.BR getpgrp ()
of the process group or is a member of a process group
in a different session (see also
.BR credentials (7)).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getuid (2),
.BR setsid (2),
.BR tcgetpgrp (3),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 1997 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified, 2003-05-26, Michael Kerrisk, <mtk.manpages@gmail.com>
.TH SETRESUID 2 2010-11-22 "Linux" "Linux Programmer's Manual"
of the calling process (and always modifies the file system GID
to be the same as the effective GID),
with the same restrictions for unprivileged processes.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
capability) and tried to change the IDs to values that are not permitted.
.SH VERSIONS
These calls are available under Linux since Linux 2.1.44.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These calls are nonstandard;
they also appear on HP-UX and some of the BSDs.
.SH NOTES
and
.BR setresgid ()
wrapper functions transparently deal with the variations across kernel versions.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getresuid (2),
.BR getuid (2),
.BR setfsgid (2),
.\" Copyright (c) 1983, 1991 The Regents of the University of California.
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)setregid.2 6.4 (Berkeley) 3/10/91
.\"
.BR setregid ()
sets real and effective group ID's of the calling process,
and all of the above holds with "group" instead of "user".
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
or (ii) setting one to the value of the other or (iii) setting the
effective user (group) ID to the value of the
saved set-user-ID (saved set-group-ID) was specified.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001, 4.3BSD (the
.BR setreuid ()
and
and
.BR setregid ()
wrapper functions transparently deal with the variations across kernel versions.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getgid (2),
.BR getuid (2),
.BR seteuid (2),
.\" Copyright Michael Haardt (michael@cantor.informatik.rwth-aachen.de)
.\" Sat Aug 27 20:43:50 MET DST 1994
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Sun Sep 11 19:19:05 1994 <faith@cs.unc.edu>
.\" Modified Mon Mar 25 10:19:00 1996 <aeb@cwi.nl> (merged a few
.\" tiny changes from a man page by Charles Livingston).
.\" Modified Sun Jul 21 14:45:46 1996 <aeb@cwi.nl>
.\"
-.TH SETSID 2 2008-12-03 "Linux" "Linux Programmer's Manual"
+.TH SETSID 2 2013-02-11 "Linux" "Linux Programmer's Manual"
.SH NAME
setsid \- creates a session and sets the process group ID
.SH SYNOPSIS
process group leader.
The calling process is the leader of the new
session, the process group leader of the new process group, and has no
-controlling tty.
+controlling terminal.
The process group ID and session ID of the calling
process are set to the PID of the calling process.
The calling process will be the only process in
this new process group and in this new session.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, the (new) session ID of the calling process is returned.
On error,
.I "(pid_t)\ \-1"
Thus, in particular,
.BR setsid ()
fails if the calling process is already a process group leader.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001.
.SH NOTES
A child created via
.BR _exit (2),
and have the child do
.BR setsid ().
-.SH "SEE ALSO"
+.SH SEE ALSO
+.BR setsid (1),
.BR getsid (2),
.BR setpgid (2),
.BR setpgrp (2),
.\" Copyright (C), 1994, Graeme W. Wilford (Wilf).
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Fri Jul 29th 12:56:44 BST 1994 Wilf. <G.Wilford@ee.surrey.ac.uk>
.\" Changes inspired by patch from Richard Kettlewell
.BR setuid ().
You can accomplish this with
.BR seteuid (2).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
capability) and
.I uid
does not match the real UID or saved set-user-ID of the calling process.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001.
Not quite compatible with the 4.4BSD call, which
sets all of the real, saved, and effective user IDs.
The glibc
.BR setuid ()
wrapper function transparently deals with the variation across kernel versions.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getuid (2),
.BR seteuid (2),
.BR setfsuid (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1992 Drew Eckhardt (drew@cs.colorado.edu), March 28, 1992
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified by Michael Haardt <michael@moria.de>
.\" Modified Sun Jul 25 10:14:13 1993 by Rik Faith <faith@cs.unc.edu>
Any user process, even a process with superuser permission,
will receive
.BR EPERM .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR setup ()
always returns \-1 for a user process.
.SH ERRORS
Always, for a user process.
.SH VERSIONS
Since Linux 2.1.121, no such function exists anymore.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This function is Linux-specific, and should not be used in programs
intended to be portable, or indeed in any programs at all.
.SH NOTES
-.\"
-.\" Extended attributes system calls manual pages
-.\"
.\" Copyright (C) Andreas Gruenbacher, February 2001
.\" Copyright (C) Silicon Graphics Inc, September 2001
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
-.TH SETXATTR 2 2001-12-31 "Linux" "Linux Programmer's Manual"
+.TH SETXATTR 2 2013-01-19 "Linux" "Linux Programmer's Manual"
.SH NAME
setxattr, lsetxattr, fsetxattr \- set an extended attribute value
.SH SYNOPSIS
On failure, \-1 is returned and
.I errno
is set appropriately.
-.PP
-If
+.SH ERRORS
+.TP
+.B EDQUOT
+Disk quota limits meant that
+there is insufficient space remaining to store the extended attribute.
+.TP
+.B EEXIST
.B XATTR_CREATE
-is specified, and the attribute exists already,
-.I errno
-is set to
-.BR EEXIST .
-If
+was specified, and the attribute exists already.
+.TP
+.B ENOATTR
.B XATTR_REPLACE
-is specified, and the attribute does not exist,
-.I errno
-is set to
-.BR ENOATTR .
-.PP
-If there is insufficient space remaining to store the extended attribute,
-.I errno
-is set to either
-.BR ENOSPC ,
-or
-.B EDQUOT
-if quota enforcement was the cause.
-.PP
-If extended attributes are not supported by the file system, or are disabled,
+was specified, and the attribute does not exist.
+.RB ( ENOATTR
+is defined to be a synonym for
+.BR ENODATA
+in
+.IR <attr/xattr.h> .)
+.TP
+.B ENOSPC
+There is insufficient space remaining to store the extended attribute.
+.TP
+.B ENOTSUP
+Extended attributes are not supported by the file system, or are disabled,
.I errno
is set to
.BR ENOTSUP .
.PP
-The errors documented for the
+In addition, the errors documented in
.BR stat (2)
-system call are also applicable here.
+can also occur.
.SH VERSIONS
These system calls have been available on Linux since kernel 2.4;
glibc support is provided since version 2.3.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These system calls are Linux-specific.
.\" .SH AUTHORS
.\" Andreas Gruenbacher,
'\" t
.\" Copyright (c) 2007 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH SGETMASK 2 2007-07-05 "Linux" "Linux Programmer's Manual"
+.TH SGETMASK 2 2012-07-13 "Linux" "Linux Programmer's Manual"
.SH NAME
sgetmask, ssetmask \- manipulation of signal mask (obsolete)
.SH SYNOPSIS
.B "long sgetmask(void);"
.sp
.BI "long ssetmask(long " newmask );
+
+.IR Note :
+There are no glibc wrappers for these system calls; see NOTES.
.SH DESCRIPTION
These system calls are obsolete.
.IR "Do not use them" ;
.SH CONFORMING TO
These system calls are Linux-specific.
.SH NOTES
-Glibc does not provide wrappers for these system calls; use
+Glibc does not provide wrappers for these obsolete system calls;
+in the unlikely event that you want to call them, use
.BR syscall (2).
These system calls are unaware of signal numbers greater than 31
.\" and Copyright 1993 Giorgio Ciucci <giorgio@crcc.it>
.\" and Copyright 2004, 2005 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified 1993-07-28, Rik Faith <faith@cs.unc.edu>
.\" Modified 1993-11-28, Giorgio Ciucci <giorgio@crcc.it>
.\" attaches to a segment that has already been marked for deletion.
.\" 2005-08-02, mtk: Added IPC_INFO, SHM_INFO, SHM_STAT descriptions.
.\"
-.TH SHMCTL 2 2008-08-07 "Linux" "Linux Programmer's Manual"
+.TH SHMCTL 2 2012-05-31 "Linux" "Linux Programmer's Manual"
.SH NAME
shmctl \- shared memory control
.SH SYNOPSIS
.PP
The
.I ipc_perm
-structure is defined in \fI<sys/ipc.h>\fP as follows
+structure is defined as follows
(the highlighted fields are settable using
.BR IPC_SET ):
.PP
.\" be applied to a segment, regardless of ownership of the segment.
.\" This was a botch-up in the move to RLIMIT_MEMLOCK, and was fixed
.\" in 2.6.10. MTK, May 2005
-.SH "RETURN VALUE"
+.SH RETURN VALUE
A successful
.B IPC_INFO
or
(Since Linux 2.6.9, this error can also occur if the
.B RLIMIT_MEMLOCK
is 0 and the caller is not privileged.)
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001.
.\" SVr4 documents additional error conditions EINVAL,
.\" ENOENT, ENOSPC, ENOMEM, EEXIST. Neither SVr4 nor SVID documents
.\" an EIDRM error condition.
.SH NOTES
+The inclusion of
+.I <sys/types.h>
+and
+.I <sys/ipc.h>
+isn't required on Linux or by any version of POSIX.
+However,
+some old implementations required the inclusion of these header files,
+and the SVID also documented their inclusion.
+Applications intended to be portable to such old systems may need
+to include these header files.
+.\" Like Linux, the FreeBSD man pages still document
+.\" the inclusion of these header files.
+
The
.BR IPC_INFO ,
.B SHM_STAT
.B IPC_64
flag in
.IR cmd .)
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mlock (2),
.BR setrlimit (2),
.BR shmget (2),
.\" Copyright (c) 1993 Luigi P. Bai (lpb@softint.com) July 28, 1993
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified Wed Jul 28 10:57:35 1993, Rik Faith <faith@cs.unc.edu>
.\" Modified Sun Nov 28 16:43:30 1993, Rik Faith <faith@cs.unc.edu>
.\" Language and formatting clean-ups
.\" Added notes on /proc files
.\"
-.TH SHMGET 2 2006-05-02 "Linux" "Linux Programmer's Manual"
+.TH SHMGET 2 2012-05-31 "Linux" "Linux Programmer's Manual"
.SH NAME
shmget \- allocates a shared memory segment
.SH SYNOPSIS
.TP
.BR SHM_HUGETLB " (since Linux 2.6)"
Allocate the segment using "huge pages."
-See the kernel source file
+See the Linux kernel source file
.I Documentation/vm/hugetlbpage.txt
for further information.
.TP
.PP
If the shared memory segment already exists, the permissions are
verified, and a check is made to see if it is marked for destruction.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
A valid segment identifier,
.IR shmid ,
is returned on success, \-1 on error.
flag was specified, but the caller was not privileged (did not have the
.B CAP_IPC_LOCK
capability).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001.
.\" SVr4 documents an additional error condition EEXIST.
.B SHM_HUGETLB
is a nonportable Linux extension.
.SH NOTES
+The inclusion of
+.I <sys/types.h>
+and
+.I <sys/ipc.h>
+isn't required on Linux or by any version of POSIX.
+However,
+some old implementations required the inclusion of these header files,
+and the SVID also documented their inclusion.
+Applications intended to be portable to such old systems may need
+to include these header files.
+.\" Like Linux, the FreeBSD man pages still document
+.\" the inclusion of these header files.
+
.B IPC_PRIVATE
isn't a flag field but a
.I key_t
The implementation has no specific limits for the per-process maximum
number of shared memory segments
.RB ( SHMSEG ).
-.SS Linux Notes
+.SS Linux notes
Until version 2.3.30 Linux would return
.B EIDRM
for a
was perhaps unfortunate,
.B IPC_NEW
would more clearly show its function.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR shmat (2),
.BR shmctl (2),
.BR shmdt (2),
.\" Copyright 1993 Giorgio Ciucci (giorgio@crcc.it)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified Sun Nov 28 17:06:19 1993, Rik Faith (faith@cs.unc.edu)
.\" with material from Luigi P. Bai (lpb@softint.com)
.\"
.\" FIXME . Add an example program to this page.
.\" FIXME Linux 2.6.9 added SHM_EXEC, which should be documented
-.TH SHMOP 2 2008-06-03 "Linux" "Linux Programmer's Manual"
+.TH SHMOP 2 2013-02-12 "Linux" "Linux Programmer's Manual"
.SH NAME
shmat, shmdt \- shared memory operations
.SH SYNOPSIS
Upon
.BR _exit (2)
all attached shared memory segments are detached from the process.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success
.BR shmat ()
returns the address of the attached shared memory segment; on error
.B CAP_IPC_OWNER
capability.
.TP
+.B EIDRM
+\fIshmid\fP points to a removed identifier.
+.TP
.B EINVAL
Invalid
.I shmid
.\" The following since 2.6.17-rc1:
.I shmaddr
is not aligned on a page boundary.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001.
.\" SVr4 documents an additional error condition EMFILE.
The implementation places no intrinsic limit on the per-process maximum
number of shared memory segments
.RB ( SHMSEG ).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR brk (2),
.BR mmap (2),
.BR shmctl (2),
.\" Copyright (c) 1983, 1991 The Regents of the University of California.
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" $Id: shutdown.2,v 1.1.1.1 1999/03/21 22:52:23 freitag Exp $
.\"
.\" Modified Tue Oct 22 22:04:51 1996 by Eric S. Raymond <esr@thyrsus.com>
.\" Modified 1998 by Andi Kleen
.\"
-.TH SHUTDOWN 2 2008-12-03 "Linux" "Linux Programmer's Manual"
+.TH SHUTDOWN 2 2012-09-06 "Linux" "Linux Programmer's Manual"
.SH NAME
shutdown \- shut down part of a full-duplex connection
.SH SYNOPSIS
is
.BR SHUT_RDWR ,
further receptions and transmissions will be disallowed.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.I sockfd
is not a valid descriptor.
.TP
+.B EINVAL
+An invalid value was specified in
+.IR how
+(but see BUGS).
+.TP
.B ENOTCONN
The specified socket is not connected.
.TP
.B ENOTSOCK
.I sockfd
is a file, not a socket.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001, 4.4BSD (the
.BR shutdown ()
function call first appeared in 4.2BSD).
respectively, and are defined in
.I <sys/socket.h>
since glibc-2.1.91.
-.SH "SEE ALSO"
+.SH BUGS
+As currently implemented,
+checks for the validity of
+.I how
+are done in domain-specific code, and not all domains perform these checks.
+.\" FIXME
+.\" https://bugzilla.kernel.org/show_bug.cgi?id=47111
+Most notably, UNIX domain sockets simply ignore invalid values;
+this may change in the future.
+.SH SEE ALSO
.BR connect (2),
.BR socket (2),
.BR socket (7)
.\" and Copyright 2004, 2005 Michael Kerrisk <mtk.manpages@gmail.com>
.\" based on work by faith@cs.unc.edu
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified, aeb, 960424
.\" Modified Fri Jan 31 17:31:20 1997 by Eric S. Raymond <esr@thyrsus.com>
.\" 2010-06-11 Andi Kleen, add hwpoison signal extensions
.\" 2010-06-11 mtk, improvements to discussion of various siginfo_t fields.
.\"
-.TH SIGACTION 2 2012-04-26 "Linux" "Linux Programmer's Manual"
+.TH SIGACTION 2 2013-02-12 "Linux" "Linux Programmer's Manual"
.SH NAME
sigaction \- examine and change a signal action
.SH SYNOPSIS
.ad l
.BR sigaction ():
_POSIX_C_SOURCE\ >=\ 1 || _XOPEN_SOURCE || _POSIX_SOURCE
+
+.IR siginfo_t :
+_POSIX_C_SOURCE >= 199309L
.ad b
.SH DESCRIPTION
The
(cast to \fIvoid\ *\fP) as its third argument.
(Commonly, the handler function doesn't make any use of the third argument.
See
-.BR getcontext (2)
+.BR getcontext (3)
for further information about
.IR ucontext_t .)
.PP
This flag is only meaningful when establishing a signal handler.
.TP
.BR SA_RESETHAND
-Restore the signal action to the default state once the signal handler
-has been called.
+Restore the signal action to the default upon entry to the signal handler.
This flag is only meaningful when establishing a signal handler.
.B SA_ONESHOT
is an obsolete, nonstandard synonym for this flag.
for a discussion of system call restarting.
.TP
.BR SA_SIGINFO " (since Linux 2.2)"
-The signal handler takes 3 arguments, not one.
+The signal handler takes three arguments, not one.
In this case,
.I sa_sigaction
should be set instead of
.B POLL_HUP
device disconnected
.RE
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR sigaction ()
returns 0 on success and \-1 on error.
.SH ERRORS
is made to change the action for
.BR SIGKILL " or " SIGSTOP ", "
which cannot be caught or ignored.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001, SVr4.
.\" SVr4 does not document the EINTR condition.
.SH NOTES
.I sa_handler
with second argument of type
.IR "struct sigcontext".
-See the relevant kernel sources for details.
+See the relevant Linux kernel sources for details.
This use is obsolete now.
.SH BUGS
In kernels up to and including 2.6.13, specifying
.SH EXAMPLE
See
.BR mprotect (2).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR kill (1),
.BR kill (2),
.BR killpg (2),
'\" t
.\" Copyright (c) 2001, Michael Kerrisk (mtk.manpages@gmail.com)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" aeb, various minor fixes
.TH SIGALTSTACK 2 2010-09-26 "Linux" "Linux Programmer's Manual"
.TP
.B SS_DISABLE
The alternate signal stack is currently disabled.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR sigaltstack ()
returns 0 on success, or \-1 on failure with
\fIerrno\fP set to indicate the error.
An attempt was made to change the alternate signal stack while
it was active (i.e., the process was already executing
on the current alternate signal stack).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SUSv2, SVr4, POSIX.1-2001.
.SH NOTES
The most common usage of an alternate signal stack is to handle the
/* Handle error */;
.fi
.in
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR execve (2),
.BR setrlimit (2),
.BR sigaction (2),
.\" based on work by Rik Faith <faith@cs.unc.edu>
.\" and Mike Battersby <mike@starbug.apana.org.au>.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified 2004-11-19, mtk:
.\" added pointer to sigaction.2 for details of ignoring SIGCHLD
.\" various sections.
.\" 2008-07-11, mtk: rewrote and expanded portability discussion.
.\"
-.TH SIGNAL 2 2012-05-05 "Linux" "Linux Programmer's Manual"
+.TH SIGNAL 2 2013-02-09 "Linux" "Linux Programmer's Manual"
.SH NAME
signal \- ANSI C signal handling
.SH SYNOPSIS
and
.B SIGSTOP
cannot be caught or ignored.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR signal ()
returns the previous value of the signal handler, or
.B SIG_ERR
.B EINVAL
.I signum
is invalid.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C89, C99, POSIX.1-2001.
.SH NOTES
The effects of
the disposition of the signal would be reset to
.BR SIG_DFL ,
and the system did not block delivery of further instances of the signal.
+This is equivalent to calling
+.BR sigaction (2)
+with the following flags:
+
+ sa.sa_flags = SA_RESETHAND | SA_NODEFER;
+
System V also provides these semantics for
.BR signal ().
This was bad because the signal might be delivered again
Furthermore, rapid deliveries of the same signal could
result in recursive invocations of the handler.
-BSD improved on this situation by changing the semantics of
-signal handling
-(but, unfortunately, silently changed the semantics
-when establishing a handler with
-.BR signal ()).
+BSD improved on this situation, but unfortunately also
+changed the semantics of the existing
+.BR signal ()
+interface while doing so.
On BSD, when a signal handler is invoked,
the signal disposition is not reset,
and further instances of the signal are blocked from
being delivered while the handler is executing.
+Furthermore, certain blocking system calls are automatically
+restarted if interrupted by a signal handler (see
+.BR signal (7)).
+The BSD semantics are equivalent to calling
+.BR sigaction (2)
+with the following flags:
+
+ sa.sa_flags = SA_RESTART;
The situation on Linux is as follows:
.IP * 2
then
.BR signal ()
provides BSD semantics.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR kill (1),
.BR alarm (2),
.BR kill (2),
.\" Copyright (C) 2008 Michael Kerrisk <mtk.manpages@gmail.com>
.\" starting from a version by Davide Libenzi <davidel@xmailserver.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_SW_3_PARA)
.\" This program is free software; you can redistribute it and/or modify
.\" it under the terms of the GNU General Public License as published by
.\" the Free Software Foundation; either version 2 of the License, or
.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
.\" GNU General Public License for more details.
.\"
-.\" You should have received a copy of the GNU General Public License
-.\" along with this program; if not, write to the Free Software
-.\" Foundation, Inc., 59 Temple Place, Suite 330, Boston,
-.\" MA 02111-1307 USA
+.\" You should have received a copy of the GNU General Public
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.TH SIGNALFD 2 2009-01-13 Linux "Linux Programmer's Manual"
.SH NAME
uint64_t ssi_stime; /* System CPU time consumed (SIGCHLD) */
uint64_t ssi_addr; /* Address that generated signal
(for hardware-generated signals) */
+.\" FIXME Since Linux 2.6.37 there is 'uint16_t ssi_addr_lsb'
+.\" which is not yet documented
uint8_t pad[\fIX\fP]; /* Pad size to 128 bytes (allow for
additional fields in the future) */
};
(i.e., the entire thread group).
(A thread will not be able to read signals that are directed
to other threads in the process.)
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR signalfd ()
returns a signalfd file descriptor;
}
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR eventfd (2),
.BR poll (2),
.BR read (2),
.\" based on earlier work by faith@cs.unc.edu and
.\" Mike Battersby <mib@deakin.edu.au>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 2005-09-15, mtk, Created new page by splitting off from sigaction.2
.\"
thread (i.e., the signals which have been raised while blocked).
The mask of pending signals is returned in
.IR set .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR sigpending ()
returns 0 on success and \-1 on error.
.SH ERRORS
.B EFAULT
.I set
points to memory which is not a valid part of the process address space.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
See
.BR sigpending ()
which means that information about pending real-time signals
is not correctly returned.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR kill (2),
.BR sigaction (2),
.BR signal (2),
.\" based on earlier work by faith@cs.unc.edu and
.\" Mike Battersby <mib@deakin.edu.au>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 2005-09-15, mtk, Created new page by splitting off from sigaction.2
.\"
.BR sigprocmask ()
is unspecified in a multithreaded process; see
.BR pthread_sigmask (3).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR sigprocmask ()
returns 0 on success and \-1 on error.
.SH ERRORS
The value specified in
.I how
was invalid.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
It is not possible to block
See
.BR sigsetops (3)
for details on manipulating signal sets.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR kill (2),
.BR pause (2),
.BR sigaction (2),
.\" Copyright (C) 1995, Thomas K. Dyas <tdyas@eden.rutgers.edu>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Created Sat Aug 21 1995 Thomas K. Dyas <tdyas@eden.rutgers.edu>
.\" Modified Tue Oct 22 22:09:03 1996 by Eric S. Raymond <esr@thyrsus.com>
and restores the process's context (registers, processor flags),
so that the process directly resumes execution
at the point where it was interrupted by the signal.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR sigreturn ()
never returns.
.SH FILES
/usr/src/linux/arch/i386/kernel/signal.c
.br
/usr/src/linux/arch/alpha/kernel/entry.S
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR sigreturn ()
is specific to Linux and should not be used in programs intended to be
portable.
Better yet, the specific use of the
.I __unused
argument varies depending on the architecture.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR kill (2),
.BR sigaltstack (2),
.BR signal (2),
.\" based on earlier work by faith@cs.unc.edu and
.\" Mike Battersby <mib@deakin.edu.au>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 2005-09-15, mtk, Created new page by splitting off from sigaction.2
.\"
specifying these signals in
.IR mask ,
has no effect on the process's signal mask.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR sigsuspend ()
always returns \-1, normally with the error
.BR EINTR .
.TP
.B EINTR
The call was interrupted by a signal.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
.PP
See
.BR sigsetops (3)
for details on manipulating signal sets.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR kill (2),
.BR pause (2),
.BR sigaction (2),
.\" Copyright (c) 2002 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH SIGWAITINFO 2 2012-05-02 "Linux" "Linux Programmer's Manual"
+.TH SIGWAITINFO 2 2012-07-21 "Linux" "Linux Programmer's Manual"
.SH NAME
sigwaitinfo, sigtimedwait \- synchronously wait for queued signals
.SH SYNOPSIS
.BR sigwaitinfo ()
suspends execution of the calling thread until one of the signals in
.I set
-is delivered.
+is pending
(If one of the signals in
.I set
is already pending for the calling thread,
.BR sigwaitinfo ()
-will return immediately with information about that signal.)
+will return immediately.)
.BR sigwaitinfo ()
-removes the delivered signal from the set of pending
+removes the signal from the set of pending
signals and returns the signal number as its function result.
If the
.I info
argument is not NULL,
-then it returns a structure of type
+then the buffer that it points to is used to return a structure of type
.I siginfo_t
(see
.BR sigaction (2))
containing information about the signal.
.PP
-Signals returned via
+If multiple signals in
+.I set
+are pending for the caller, the signal that is retrieved by
.BR sigwaitinfo ()
-are delivered in the usual order; see
+is determined according to the usual ordering rules; see
.BR signal (7)
for further details.
.PP
if none of the signals in
.I set
was pending.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, both
.BR sigwaitinfo ()
and
.B EAGAIN
No signal in
.I set
-was delivered within the
+was became pending within the
.I timeout
period specified to
.BR sigtimedwait ().
.B EINVAL
.I timeout
was invalid.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
In normal usage, the calling program blocks the signals in
via a prior call to
.BR sigprocmask (2)
(so that the default disposition for these signals does not occur if they
-are delivered between successive calls to
+become pending between successive calls to
.BR sigwaitinfo ()
or
.BR sigtimedwait ())
and does not establish handlers for these signals.
In a multithreaded program,
-the signal should be blocked in all threads to prevent
-the signal being delivered to a thread other than the one calling
+the signal should be blocked in all threads, in order to prevent
+the signal being treated according to its default disposition in
+a thread other than the one calling
.BR sigwaitinfo ()
or
.BR sigtimedwait ()).
or
.BR sigtimedwait (),
then exactly one of the threads will actually receive the
-signal if it is delivered to the process as a whole;
+signal if it becomes pending for the process as a whole;
which of the threads receives the signal is indeterminate.
POSIX leaves the meaning of a NULL value for the
.BR sigwaitinfo ()
is a library function implemented on top of
.BR sigtimedwait ().
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR kill (2),
.BR sigaction (2),
.BR signal (2),
.\" Copyright (c) 1983, 1991 The Regents of the University of California.
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" $Id: socket.2,v 1.4 1999/05/13 11:33:42 freitag Exp $
.\"
and
.BR getsockopt (2)
are used to set and get options, respectively.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, a file descriptor for the new socket is returned.
On error, \-1 is returned, and
.I errno
supported within this domain.
.PP
Other errors may be generated by the underlying protocol modules.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.4BSD, POSIX.1-2001.
The
.BR PF_INET ,
and so on, while
.BR AF_UNIX ,
-.BR PF_INET ,
+.BR AF_INET ,
and so on are used for address
families.
However, already the BSD man page promises: "The protocol
.BR socket ()
is shown in
.BR getaddrinfo (3).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR accept (2),
.BR bind (2),
.BR connect (2),
.BR tcp (7),
.BR udp (7),
.BR unix (7)
-.PP
+
\(lqAn Introductory 4.3BSD Interprocess Communication Tutorial\(rq
-is reprinted in
-.I UNIX Programmer's Supplementary Documents Volume 1.
-.PP
-\(lqBSD Interprocess Communication Tutorial\(rq
-is reprinted in
+and
+\(lqBSD Interprocess Communication Tutorial\(rq,
+reprinted in
.I UNIX Programmer's Supplementary Documents Volume 1.
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1995 Michael Chastain (mec@shell.portal.com), 15 April 1995.
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Tue Oct 22 22:11:53 1996 by Eric S. Raymond <esr@thyrsus.com>
-.TH SOCKETCALL 2 2007-06-28 "Linux" "Linux Programmer's Manual"
+.TH SOCKETCALL 2 2012-10-16 "Linux" "Linux Programmer's Manual"
.SH NAME
socketcall \- socket system calls
.SH SYNOPSIS
User programs should call the appropriate functions by their usual names.
Only standard library implementors and kernel hackers need to know about
.BR socketcall ().
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This call is specific to Linux, and should not be used in programs
intended to be portable.
.SH NOTES
-On a few architectures, for example ia64, there is no
+On a some architectures\(emfor example, x86-64 and ARM\(emthere is no
.BR socketcall ()
system call; instead
.BR socket (2),
.BR accept (2),
.BR bind (2),
and so on really are implemented as separate system calls.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR accept (2),
.BR bind (2),
.BR connect (2),
.\" Copyright (c) 1983, 1991 The Regents of the University of California.
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)socketpair.2 6.4 (Berkeley) 3/10/91
.\"
and
.IR sv [1].
The two sockets are indistinguishable.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.TP
.B EPROTONOSUPPORT
The specified protocol is not supported on this machine.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.4BSD, POSIX.1-2001.
The
.BR socketpair ()
and this header file is not required on Linux.
However, some historical (BSD) implementations required this header
file, and portable applications are probably wise to include it.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR pipe (2),
.BR read (2),
.BR socket (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 2006 Jens Axboe
.\" and Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH SPLICE 2 2012-05-04 "Linux" "Linux Programmer's Manual"
.SH NAME
.BR splice ()
system call first appeared in Linux 2.6.17;
library support was added to glibc in version 2.5.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This system call is Linux-specific.
.SH NOTES
The three system calls
.BR vmsplice (2),
and
.BR tee (2),
-provide userspace programs with full control over an arbitrary
+provide user-space programs with full control over an arbitrary
kernel buffer, implemented within the kernel using the same type
of buffer that is used for a pipe.
In overview, these system calls perform the following tasks:
.\" Copyright (c) International Business Machines Corp., 2006
.\"
+.\" %%%LICENSE_START(GPLv2+_SW_3_PARA)
.\" This program is free software; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
.\" the GNU General Public License for more details.
.\"
-.\" You should have received a copy of the GNU General Public License
-.\" along with this program; if not, write to the Free Software
-.\" Foundation, Inc., 59 Temple Place, Suite 330, Boston,
-.\" MA 02111-1307 USA
+.\" You should have received a copy of the GNU General Public
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" HISTORY:
.\" 2005-09-28, created by Arnd Bergmann <arndb@de.ibm.com>
.\" 2007-07-10, some polishing by mtk
.\" 2007-09-28, updates for newer kernels by Jeremy Kerr <jk@ozlabs.org>
.\"
-.TH SPU_CREATE 2 2007-12-20 Linux "Linux Programmer's Manual"
+.TH SPU_CREATE 2 2012-08-05 Linux "Linux Programmer's Manual"
.SH NAME
spu_create \- create a new spu context
.SH SYNOPSIS
.BI "int spu_create(const char *" pathname ", int " flags ", mode_t " mode ","
.BI " int " neighbor_fd ");"
.fi
+
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
.SH DESCRIPTION
The
.BR spu_create ()
is meant to be used from libraries that implement a more abstract
interface to SPUs, not to be used from regular applications.
See
-.I http://www.bsc.es/projects/deepcomputing/linuxoncell/
+.UR http://www.bsc.es\:/projects\:/deepcomputing\:/linuxoncell/
+.UE
for the recommended libraries.
.SH EXAMPLE
See
.\" Copyright (c) International Business Machines Corp., 2006
.\"
+.\" %%%LICENSE_START(GPLv2+_SW_3_PARA)
.\" This program is free software; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
.\" the GNU General Public License for more details.
.\"
-.\" You should have received a copy of the GNU General Public License
-.\" along with this program; if not, write to the Free Software
-.\" Foundation, Inc., 59 Temple Place, Suite 330, Boston,
-.\" MA 02111-1307 USA
+.\" You should have received a copy of the GNU General Public
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" HISTORY:
.\" 2005-09-28, created by Arnd Bergmann <arndb@de.ibm.com>
.\" 2007-09-28, updates for newer kernels, added example
.\" by Jeremy Kerr <jk@ozlabs.org>
.\"
-.TH SPU_RUN 2 2007-11-25 Linux "Linux Programmer's Manual"
+.TH SPU_RUN 2 2012-08-05 Linux "Linux Programmer's Manual"
.SH NAME
spu_run \- execute an SPU context
.SH SYNOPSIS
.BI "int spu_run(int " fd ", unsigned int *" npc \
", unsigned int *" event ");"
.fi
+
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
.SH DESCRIPTION
The
.BR spu_run ()
is meant to be used from libraries that implement a more abstract
interface to SPUs, not to be used from regular applications.
See
-.I http://www.bsc.es/projects/deepcomputing/linuxoncell/
+.UR http://www.bsc.es\:/projects\:/deepcomputing\:/linuxoncell/
+.UE
for the recommended libraries.
.SH EXAMPLE
The following is an example of running a simple, one-instruction SPU
'\" t
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1992 Drew Eckhardt (drew@cs.colorado.edu), March 28, 1992
.\" Parts Copyright (c) 1995 Nicolai Langfeldt (janl@ifi.uio.no), 1/1/95
.\" and Copyright (c) 2007 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified by Michael Haardt <michael@moria.de>
.\" Modified 1993-07-24 by Rik Faith <faith@cs.unc.edu>
.\" 2007-06-08 mtk: Added example program
.\" 2007-07-05 mtk: Added details on underlying system call interfaces
.\"
-.TH STAT 2 2012-05-07 "Linux" "Linux Programmer's Manual"
+.TH STAT 2 2012-11-11 "Linux" "Linux Programmer's Manual"
.SH NAME
stat, fstat, lstat \- get file status
.SH SYNOPSIS
in that directory can be renamed or deleted only by the owner
of the file, by the owner of the directory, and by a privileged
process.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
is not a directory.
.TP
.B EOVERFLOW
-.RB ( stat ())
.I path
-refers to a file whose size cannot be represented in the type
-.IR off_t .
-This can occur when an application compiled on a 32-bit platform without
+or
+.I fd
+refers to a file whose size, inode number,
+or number of blocks cannot be represented in, respectively, the types
+.IR off_t ,
+.IR ino_t ,
+or
+.IR blkcnt_t .
+This error can occur when, for example,
+an application compiled on a 32-bit platform without
.I -D_FILE_OFFSET_BITS=64
calls
.BR stat ()
on a file whose size exceeds
.I (1<<31)-1
-bits.
-.SH "CONFORMING TO"
+bytes.
+.SH CONFORMING TO
These system calls conform to SVr4, 4.3BSD, POSIX.1-2001.
.\" SVr4 documents additional
.\" .BR fstat ()
etc.
The
.BR S_IF*
-constants are present in POSIX.1-2011 and later.
+constants are present in POSIX.1-2001 and later.
The
.BR S_ISLNK ()
.BR S_IRUSR ,
.BR S_IWUSR ,
.BR S_IXUSR .
-.SS "Other Systems"
+.SS Other systems
Values that have been (or are) in use on various systems:
.ad l
.TS
9000 S_IFNWK n 110000 network special (HP-UX)
a000 S_IFLNK l@ 120000 symbolic link (BSD)
b000 S_IFSHAD 130000 T{
-Solaris shadow inode for ACL (not seen by userspace)
+Solaris shadow inode for ACL (not seen by user space)
T}
c000 S_IFSOCK s= 140000 socket (BSD; also "S_IFSOC" on VxFS)
d000 S_IFDOOR D> 150000 Solaris door
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR access (2),
.BR chmod (2),
.BR chown (2),
.\" Copyright (C) 2003 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified 2003-08-17 by Walter Harms
.\" Modified 2004-06-23 by Michael Kerrisk <mtk.manpages@gmail.com>
.BR fstatfs ()
returns the same information about an open file referenced by descriptor
.IR fd .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.TP
.B EOVERFLOW
Some values were too large to be represented in the returned struct.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
Linux-specific.
The Linux
.BR statfs ()
can be used as second argument to the
.BR sysfs (2)
system call.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR stat (2),
.BR statvfs (2),
.BR path_resolution (7)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1992 Drew Eckhardt (drew@cs.colorado.edu), March 28, 1992
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified by Michael Haardt <michael@moria.de>
.\" Modified 1993-07-24 by Rik Faith <faith@cs.unc.edu>
Epoch, 1970-01-01 00:00:00 +0000 (UTC).
.BR stime ()
may only be executed by the superuser.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
Under Linux the
.B CAP_SYS_TIME
privilege is required.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR date (1),
.BR settimeofday (2),
.BR capabilities (7)
.\" Copyright (c) 2010 Michael Kerrisk <mtk.manpages@gmail.com>
.\" based on a proposal from Stephan Mueller <smueller@atsec.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Various pieces of text taken from the kernel source and the commentary
.\" in kernel commit fa28237cfcc5827553044cbd6ee52e33692b0faa
.\" both written by Paul Mackerras <paulus@samba.org>
.\"
-.TH SUBPAGE_PROT 2 2010-10-30 "Linux" "Linux Programmer's Manual"
+.TH SUBPAGE_PROT 2 2012-07-13 "Linux" "Linux Programmer's Manual"
.SH NAME
subpage_prot \- define a subpage protection for an address range
.SH SYNOPSIS
.BI "long subpage_prot(unsigned long " addr ", unsigned long " len ,
.BI " uint32_t *" map ");
.fi
+
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
.SH DESCRIPTION
The PowerPC-specific
.BR subpage_prot ()
.SH CONFORMING TO
This system call is Linux-specific.
.SH NOTES
+Glibc does not provide a wrapper for this system call; call it using
+.BR syscall (2).
+
Normal page protections (at the 64-kB page level) also apply;
the subpage protection mechanism is an additional constraint,
so putting 0 in a 2-bit field won't allow writes to a page that is otherwise
.\" the affected segment, not the whole process.
.SH SEE ALSO
.BR mprotect (2),
-.BR syscall (2);
-.br
-the kernel source file
-.IR Documentation/vm/hugetlbpage.txt .
+.BR syscall (2)
+
+.IR Documentation/vm/hugetlbpage.txt
+in the Linux kernel source tree
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1992 Drew Eckhardt (drew@cs.colorado.edu), March 28, 1992
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified by Michael Haardt <michael@moria.de>
.\" Modified 1993-07-24 by Rik Faith <faith@cs.unc.edu>
.PP
As of Linux 1.3.6, the kernel usually follows these rules,
but there are exceptions.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
capability.
Alternatively, the maximum number of swap files are already in use;
see NOTES below.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are Linux-specific and should not be used in programs
intended to be portable.
The second
entire swap area when
.BR swapon ()
is called, even if that flag bit is not set.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mkswap (8),
.BR swapoff (8),
.BR swapon (8)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 1992 Drew Eckhardt;
.\" 1993 Michael Haardt, Ian Jackson.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified 1993-07-24 by Rik Faith
.\" Modified 1996-04-26 by Nick Duffek <nsd@bbc.com>
.\" Modified 1997-01-31 by Eric S. Raymond <esr@thyrsus.com>
.\" Modified 2004-06-23 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
-.TH SYMLINK 2 2010-09-20 "Linux" "Linux Programmer's Manual"
+.TH SYMLINK 2 2013-01-27 "Linux" "Linux Programmer's Manual"
.SH NAME
symlink \- make a new name for a file
.SH SYNOPSIS
exists it will
.I not
be overwritten.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
(See also
.BR path_resolution (7).)
.TP
+.B EDQUOT
+The user's quota of resources on the file system has been exhausted.
+The resources could be inodes or disk blocks, depending on the file
+system implementation.
+.TP
.B EEXIST
.I newpath
already exists.
.B EROFS
.I newpath
is on a read-only file system.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
.\" SVr4 documents additional error codes EDQUOT and ENOSYS.
.\" See
file (unless it also has other hard links).
If this behavior is not desired, use
.BR link (2).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ln (1),
.BR lchown (2),
.BR link (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 2006, Michael Kerrisk
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\"
+.\" %%%LICENSE_END
.\"
.TH SYMLINKAT 2 2012-05-04 "Linux" "Linux Programmer's Manual"
.SH NAME
is absolute, then
.I newdirfd
is ignored.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR symlinkat ()
returns 0.
.BR symlinkat ()
was added to Linux in kernel 2.6.16;
library support was added to glibc in version 2.4.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
.SH NOTES
See
.BR openat (2)
for an explanation of the need for
.BR symlinkat ().
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR openat (2),
.BR symlink (2),
.BR path_resolution (7),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1992 Drew Eckhardt (drew@cs.colorado.edu), March 28, 1992
.\" and Copyright (c) 2011 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified by Michael Haardt <michael@moria.de>
.\" Modified Sat Jul 24 12:02:47 1993 by Rik Faith <faith@cs.unc.edu>
.BR syncfs ()
first appeared in Linux 2.6.39;
library support was added to glibc in version 2.14.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR sync ():
SVr4, 4.3BSD, POSIX.1-2001.
However, since version 1.3.20 Linux does actually wait.
(This still does not guarantee data integrity: modern disks have
large caches.)
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR bdflush (2),
.BR fdatasync (2),
.BR fsync (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 2006 Andrew Morton <akpm@osdl.org>
.\" and Copyright 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 2006-07-05 Initial creation, Michael Kerrisk based on
.\" Andrew Morton's comments in fs/sync.c
refers to something other than a regular file, a block device,
a directory, or a symbolic link.
.\" FIXME . (bug?) Actually, how can 'fd' refer to a symbolic link (S_ISLNK)?
-.\" (In userspace at least) it isn't possible to obtain a file descriptor
+.\" (In user space at least) it isn't possible to obtain a file descriptor
.\" for a symbolic link.
.SH VERSIONS
.BR sync_file_range ()
appeared on Linux in kernel 2.6.17.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This system call is Linux-specific, and should be avoided
in portable programs.
.SH NOTES
.BR sync_file_range2 ()
under the name
.BR sync_file_range ().
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fdatasync (2),
.BR fsync (2),
.BR msync (2),
.\" Copyright (c) 1980, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)syscall.2 8.1 (Berkeley) 6/16/93
.\"
.\" 2002-03-20 Christoph Hellwig <hch@infradead.org>
.\" - adopted for Linux
.\"
-.TH SYSCALL 2 2007-07-26 "Linux" "Linux Programmer's Manual"
+.TH SYSCALL 2 2012-08-14 "Linux" "Linux Programmer's Manual"
.SH NAME
syscall \- indirect system call
.SH SYNOPSIS
.fi
.SH DESCRIPTION
.BR syscall ()
-performs the system call whose assembly language
+is a small library function that invokes
+the system call whose assembly language
interface has the specified
.I number
with the specified arguments.
-Symbolic constants for system calls can be found in the header file
+Employing
+.BR syscall ()
+is useful, for example,
+when invoking a system call that has no wrapper function in the C library.
+
+.BR syscall ()
+saves CPU registers before making the system call,
+restores the registers upon return from the system call,
+and stores any error code returned by the system call in
+.BR errno (3)
+if an error occurs.
+
+Symbolic constants for system call numbers can be found in the header file
.IR <sys/syscall.h> .
.SH RETURN VALUE
The return value is defined by the system call being invoked.
pid_t tid;
tid = syscall(SYS_gettid);
+ tid = syscall(SYS_tgkill, getpid(), tid);
}
.fi
.SH SEE ALSO
.\" Modifications for 2.2 and 2.4 Copyright (C) 2002 Ian Redfern
.\" <redferni@logica.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH SYSCALLS 2 2012-03-23 "Linux" "Linux Programmer's Manual"
+.TH SYSCALLS 2 2013-03-10 "Linux" "Linux Programmer's Manual"
.SH NAME
syscalls \- Linux system calls
.SH SYNOPSIS
wrapper function checks which of those system calls
are provided by the kernel and determines which should be employed.
.SS System call list
-Below is a list of those system calls that are common to most platforms.
+Below is a list of the Linux system calls.
In the list, the
.I Kernel
column indicates the kernel version
When this is so, the version where the system call appeared
in both of the major kernel series is listed.
.PP
-The list of system calls that are available as at kernel 3.1
+The list of system calls that are available as at kernel 3.5
(or in a few cases only on older kernels) is as follows:
.\"
.\" Looking at scripts/checksyscalls.sh in the kernel source is
-.\" instructive about i386 specifics.
+.\" instructive about x86 specifics.
.\"
.ad l
.TS
\fBSystem call\fP \fBKernel\fP \fBNotes\fP
\fB_llseek\fP(2) 1.2
-\fB_newselect\fP(2)
-\fB_sysctl\fP(2)
-\fBaccept\fP(2)
+\fB_newselect\fP(2) 2.0
+\fB_sysctl\fP(2) 2.0
+\fBaccept\fP(2) 2.0 See notes on \fBsocketcall\fP(2)
\fBaccept4\fP(2) 2.6.28
-\fBaccess\fP(2)
-\fBacct\fP(2)
+\fBaccess\fP(2) 1.0
+\fBacct\fP(2) 1.0
\fBadd_key\fP(2) 2.6.11
-\fBadjtimex\fP(2)
-\fBalarm\fP(2)
+\fBadjtimex\fP(2) 1.0
+\fBalarm\fP(2) 1.0
\fBalloc_hugepages\fP(2) 2.5.36 Removed in 2.5.44
-\fBbdflush\fP(2) T{
+\fBbdflush\fP(2) 1.2 T{
Deprecated (does nothing) since 2.6
T}
-\fBbind\fP(2)
-\fBbrk\fP(2)
-\fBcacheflush\fP(2) 1.2 Not on i386
+\fBbind\fP(2) 2.0 See notes on \fBsocketcall\fP(2)
+\fBbrk\fP(2) 1.0
+\fBcacheflush\fP(2) 1.2 Not on x86
\fBcapget\fP(2) 2.2
\fBcapset\fP(2) 2.2
-\fBchdir\fP(2)
-\fBchmod\fP(2)
-\fBchown\fP(2)
+\fBchdir\fP(2) 1.0
+\fBchmod\fP(2) 1.0
+\fBchown\fP(2) 2.2 T{
+See \fBchown\fP(2) for version details
+T}
\fBchown32\fP(2) 2.4
-\fBchroot\fP(2)
+\fBchroot\fP(2) 1.0
\fBclock_adjtime\fP(2) 2.6.39
\fBclock_getres\fP(2) 2.6
\fBclock_gettime\fP(2) 2.6
\fBclock_nanosleep\fP(2) 2.6
\fBclock_settime\fP(2) 2.6
-\fBclone\fP(2)
-\fBclose\fP(2)
-\fBconnect\fP(2)
-\fBcreat\fP(2)
+\fBclone\fP(2) 1.0
+\fBclose\fP(2) 1.0
+\fBconnect\fP(2) 2.0 See notes on \fBsocketcall\fP(2)
+\fBcreat\fP(2) 1.0
\fBcreate_module\fP(2) Removed in 2.6
-\fBdelete_module\fP(2)
-\fBdup\fP(2)
-\fBdup2\fP(2)
+\fBdelete_module\fP(2) 1.0
+\fBdup\fP(2) 1.0
+\fBdup2\fP(2) 1.0
\fBdup3\fP(2) 2.6.27
\fBepoll_create\fP(2) 2.6
\fBepoll_create1\fP(2) 2.6.27
\fBepoll_wait\fP(2) 2.6
\fBeventfd\fP(2) 2.6.22
\fBeventfd2\fP(2) 2.6.27
-\fBexecve\fP(2)
-\fBexit\fP(2)
+\fBexecve\fP(2) 1.0
+\fBexit\fP(2) 1.0
\fBexit_group\fP(2) 2.6
\fBfaccessat\fP(2) 2.6.16
\fBfadvise64\fP(2) 2.6
\fBfanotify_mark\fP(2) 2.6.37
.\" The fanotify calls were added in Linux 2.6.36,
.\" but disabled while the API was finalized.
-\fBfchdir\fP(2)
-\fBfchmod\fP(2)
+\fBfchdir\fP(2) 1.0
+\fBfchmod\fP(2) 1.0
\fBfchmodat\fP(2) 2.6.16
-\fBfchown\fP(2)
+\fBfchown\fP(2) 1.0
\fBfchown32\fP(2) 2.4
\fBfchownat\fP(2) 2.6.16
-\fBfcntl\fP(2)
+\fBfcntl\fP(2) 1.0
\fBfcntl64\fP(2) 2.4
-\fBfdatasync\fP(2)
+\fBfdatasync\fP(2) 2.0
\fBfgetxattr\fP(2) 2.6; 2.4.18
+\fBfinit_module\fP(2) 3.8
\fBflistxattr\fP(2) 2.6; 2.4.18
\fBflock\fP(2) 2.0
-\fBfork\fP(2)
+\fBfork\fP(2) 1.0
\fBfree_hugepages\fP(2) 2.5.36 Removed in 2.5.44
\fBfremovexattr\fP(2) 2.6; 2.4.18
\fBfsetxattr\fP(2) 2.6; 2.4.18
-\fBfstat\fP(2)
+\fBfstat\fP(2) 1.0
\fBfstat64\fP(2) 2.4
\fBfstatat64\fP(2) 2.6.16
-\fBfstatfs\fP(2)
+\fBfstatfs\fP(2) 1.0
\fBfstatfs64\fP(2) 2.6
-\fBfsync\fP(2)
-\fBftruncate\fP(2)
+\fBfsync\fP(2) 1.0 1.0
+\fBftruncate\fP(2) 1.0
\fBftruncate64\fP(2) 2.4
\fBfutex\fP(2) 2.6
\fBfutimesat\fP(2) 2.6.16
\fBgetcwd\fP(2) 2.2
\fBgetdents\fP(2) 2.0
\fBgetdents64\fP(2) 2.4
-\fBgetegid\fP(2)
+\fBgetegid\fP(2) 1.0
\fBgetegid32\fP(2) 2.4
-\fBgeteuid\fP(2)
+\fBgeteuid\fP(2) 1.0
\fBgeteuid32\fP(2) 2.4
-\fBgetgid\fP(2)
+\fBgetgid\fP(2) 1.0
\fBgetgid32\fP(2) 2.4
-\fBgetgroups\fP(2)
+\fBgetgroups\fP(2) 1.0
\fBgetgroups32\fP(2) 2.4
-\fBgetitimer\fP(2)
-\fBgetpeername\fP(2)
-\fBgetpagesize\fP(2) 2.0 Not on i386
-\fBgetpgid\fP(2)
-\fBgetpgrp\fP(2)
-\fBgetpid\fP(2)
-\fBgetppid\fP(2)
-\fBgetpriority\fP(2)
+\fBgetitimer\fP(2) 1.0
+\fBgetpeername\fP(2) 2.0 See notes on \fBsocketcall\fP(2)
+\fBgetpagesize\fP(2) 2.0 Not on x86
+\fBgetpgid\fP(2) 1.0
+\fBgetpgrp\fP(2) 1.0
+\fBgetpid\fP(2) 1.0
+\fBgetppid\fP(2) 1.0
+\fBgetpriority\fP(2) 1.0
\fBgetresgid\fP(2) 2.2
\fBgetresgid32\fP(2) 2.4
\fBgetresuid\fP(2) 2.2
\fBgetresuid32\fP(2) 2.4
-\fBgetrlimit\fP(2)
-\fBgetrusage\fP(2)
+\fBgetrlimit\fP(2) 1.0
+\fBgetrusage\fP(2) 1.0
\fBgetsid\fP(2) 2.0
-\fBgetsockname\fP(2)
-\fBgetsockopt\fP(2)
+\fBgetsockname\fP(2) 2.0 See notes on \fBsocketcall\fP(2)
+\fBgetsockopt\fP(2) 2.0 See notes on \fBsocketcall\fP(2)
\fBgettid\fP(2) 2.4.11
-\fBgettimeofday\fP(2)
-\fBgetuid\fP(2)
+\fBgettimeofday\fP(2) 1.0
+\fBgetuid\fP(2) 1.0
\fBgetuid32\fP(2) 2.4
.\" \fBgetunwind\fP(2) 2.4.8 ia64; DEPRECATED
\fBgetxattr\fP(2) 2.6; 2.4.18
-\fBinit_module\fP(2)
+\fBinit_module\fP(2) 1.0
\fBinotify_add_watch\fP(2) 2.6.13
\fBinotify_init\fP(2) 2.6.13
\fBinotify_init1\fP(2) 2.6.27
\fBio_getevents\fP(2) 2.6
\fBio_setup\fP(2) 2.6
\fBio_submit\fP(2) 2.6
-\fBioctl\fP(2)
-\fBioperm\fP(2)
-\fBiopl\fP(2)
+\fBioctl\fP(2) 1.0
+\fBioperm\fP(2) 1.0
+\fBiopl\fP(2) 1.0
\fBioprio_get\fP(2) 2.6.13
\fBioprio_set\fP(2) 2.6.13
-\fBipc\fP(2)
+\fBipc\fP(2) 1.0
.\" Implements System V IPC calls
+\fBkcmp\fP(2) 3.5
+\fBkern_features\fP(2) 3.7 Sparc64
\fBkexec_load\fP(2) 2.6.13
.\" The entry in the syscall table was reserved starting in 2.6.7
.\" Was named sys_kexec_load() from 2.6.7 to 2.6.16
\fBkeyctl\fP(2) 2.6.11
-\fBkill\fP(2)
-\fBlchown\fP(2) 2.2
+\fBkill\fP(2) 1.0
+\fBlchown\fP(2) 1.0 T{
+See \fBchown\fP(2) for version details
+T}
\fBlchown32\fP(2) 2.4
\fBlgetxattr\fP(2) 2.6; 2.4.18
-\fBlink\fP(2)
+\fBlink\fP(2) 1.0
\fBlinkat\fP(2) 2.6.16
-\fBlisten\fP(2)
+\fBlisten\fP(2) 2.0 See notes on \fBsocketcall\fP(2)
\fBlistxattr\fP(2) 2.6; 2.4.18
\fBllistxattr\fP(2) 2.6; 2.4.18
\fBlookup_dcookie\fP(2) 2.6
\fBlremovexattr\fP(2) 2.6; 2.4.18
-\fBlseek\fP(2)
+\fBlseek\fP(2) 1.0
\fBlsetxattr\fP(2) 2.6; 2.4.18
-\fBlstat\fP(2)
+\fBlstat\fP(2) 1.0
\fBlstat64\fP(2) 2.4
\fBmadvise\fP(2) 2.4
\fBmadvise1\fP(2) 2.4
.\" \fBmemory_ordering\fP(2) ??? Sparc64
\fBmigrate_pages\fP(2) 2.6.16
\fBmincore\fP(2) 2.4
-\fBmkdir\fP(2)
+\fBmkdir\fP(2) 1.0
\fBmkdirat\fP(2) 2.6.16
-\fBmknod\fP(2)
+\fBmknod\fP(2) 1.0
\fBmknodat\fP(2) 2.6.16
-\fBmlock\fP(2)
-\fBmlockall\fP(2)
-\fBmmap\fP(2)
+\fBmlock\fP(2) 2.0
+\fBmlockall\fP(2) 2.0
+\fBmmap\fP(2) 1.0
\fBmmap2\fP(2) 2.4
-\fBmodify_ldt\fP(2)
-\fBmount\fP(2)
+\fBmodify_ldt\fP(2) 1.0
+\fBmount\fP(2) 1.0
\fBmove_pages\fP(2) 2.6.18
-\fBmprotect\fP(2)
+\fBmprotect\fP(2) 1.0
\fBmq_getsetattr\fP(2) 2.6.6
.\" Implements \fBmq_getattr\fP(3) and \fBmq_setattr\fP(3)
\fBmq_notify\fP(2) 2.6.6
\fBmq_open\fP(2) 2.6.6
\fBmq_timedreceive\fP(2) 2.6.6
\fBmq_timedsend\fP(2) 2.6.6
-\fBmq_unlink\fP(2)
+\fBmq_unlink\fP(2) 2.6.6
\fBmremap\fP(2) 2.0
-\fBmsgctl\fP(2)
-\fBmsgget\fP(2)
-\fBmsgrcv\fP(2)
-\fBmsgsnd\fP(2)
+\fBmsgctl\fP(2) 2.0 See notes on \fBipc\fP(2)
+\fBmsgget\fP(2) 2.0 See notes on \fBipc\fP(2)
+\fBmsgrcv\fP(2) 2.0 See notes on \fBipc\fP(2)
+\fBmsgsnd\fP(2) 2.0 See notes on \fBipc\fP(2)
\fBmsync\fP(2) 2.0
.\" \fBmultiplexer\fP(2) ?? __NR_multiplexer reserved on
.\" PowerPC, but unimplemented?
-\fBmunlock\fP(2)
-\fBmunlockall\fP(2)
-\fBmunmap\fP(2)
+\fBmunlock\fP(2) 2.0
+\fBmunlockall\fP(2) 2.0
+\fBmunmap\fP(2) 1.0
\fBname_to_handle_at\fP(2) 2.6.39
\fBnanosleep\fP(2) 2.0
\fBnfsservctl\fP(2) 2.2 Removed in 3.1
-\fBnice\fP(2)
-\fBoldfstat\fP(2)
-\fBoldlstat\fP(2)
-\fBoldolduname\fP(2)
-\fBoldstat\fP(2)
-\fBolduname\fP(2)
-\fBopen\fP(2)
+\fBnice\fP(2) 1.0
+\fBoldfstat\fP(2) 1.0
+\fBoldlstat\fP(2) 1.0
+\fBoldolduname\fP(2) 1.0
+\fBoldstat\fP(2) 1.0
+\fBolduname\fP(2) 1.0
+\fBopen\fP(2) 1.0
\fBopen_by_handle_at\fP(2) 2.6.39
\fBopenat\fP(2) 2.6.16
-\fBpause\fP(2)
-\fBpciconfig_iobase\fP(2) 2.2.15; 2.4 Not on i386
-.\" Alpha, PowerPC, ARM; not i386
-\fBpciconfig_read\fP(2) 2.0.26; 2.2 Not on i386
-.\" , PowerPC, ARM; not i386
-\fBpciconfig_write\fP(2) 2.0.26; 2.2 Not on i386
-.\" , PowerPC, ARM; not i386
+\fBpause\fP(2) 1.0
+\fBpciconfig_iobase\fP(2) 2.2.15; 2.4 Not on x86
+.\" Alpha, PowerPC, ARM; not x86
+\fBpciconfig_read\fP(2) 2.0.26; 2.2 Not on x86
+.\" , PowerPC, ARM; not x86
+\fBpciconfig_write\fP(2) 2.0.26; 2.2 Not on x86
+.\" , PowerPC, ARM; not x86
\fBperf_event_open\fP(2) 2.6.31 T{
Was called perf_counter_open() in 2.6.31; renamed in 2.6.32
T}
\fBpersonality\fP(2) 1.2
-.\" \fBperfctr\fP(2) ??? Sparc32, Sparc64
-.\" \fBperfmonctl\fP(2) ??? ia64
-\fBpipe\fP(2)
+\fBperfctr\fP(2) 2.2 Sparc; removed in 2.6.34
+.\" commit c7d5a0050773e98d1094eaa9f2a1a793fafac300 removed perfctr()
+\fBperfmonctl\fP(2) 2.4 ia64
+\fBpipe\fP(2) 1.0
\fBpipe2\fP(2) 2.6.27
\fBpivot_root\fP(2) 2.4
-\fBpoll\fP(2) 2.2
+\fBpoll\fP(2) 2.0.36; 2.2
+\fBppc_rtas\fP(2) PowerPC only
\fBppoll\fP(2) 2.6.16
\fBprctl\fP(2) 2.2
\fBpread64\fP(2) T{
T}
\fBpreadv\fP(2) 2.6.30
\fBprlimit\fP(2) 2.6.36
-\fBprocess_vm_readv(2)\fP 3.2
-\fBprocess_vm_writev(2)\fP 3.2
+\fBprocess_vm_readv\fP(2) 3.2
+\fBprocess_vm_writev\fP(2) 3.2
\fBpselect6\fP(2) 2.6.16
.\" Implements \fBpselect\fP(2)
-\fBptrace\fP(2)
+\fBptrace\fP(2) 1.0
\fBpwrite64\fP(2) T{
Added as "pwrite" in 2.2; renamed "pwrite64" in 2.6
T}
\fBpwritev\fP(2) 2.6.30
\fBquery_module\fP(2) 2.2 Removed in 2.6
-\fBquotactl\fP(2)
-\fBread\fP(2)
+\fBquotactl\fP(2) 1.0
+\fBread\fP(2) 1.0
\fBreadahead\fP(2) 2.4.13
-\fBreaddir\fP(2)
+\fBreaddir\fP(2) 1.0
.\" Supersedes \fBgetdents\fP(2)
-\fBreadlink\fP(2)
+\fBreadlink\fP(2) 1.0
\fBreadlinkat\fP(2) 2.6.16
\fBreadv\fP(2) 2.0
-\fBreboot\fP(2)
-\fBrecv\fP(2)
-\fBrecvfrom\fP(2)
-\fBrecvmsg\fP(2)
+\fBreboot\fP(2) 1.0
+\fBrecv\fP(2) 2.0 See notes on \fBsocketcall\fP(2)
+\fBrecvfrom\fP(2) 2.0 See notes on \fBsocketcall\fP(2)
+\fBrecvmsg\fP(2) 2.0 See notes on \fBsocketcall\fP(2)
\fBrecvmmsg\fP(2) 2.6.33
\fBremap_file_pages\fP(2) 2.6
\fBremovexattr\fP(2) 2.6; 2.4.18
-\fBrename\fP(2)
+\fBrename\fP(2) 1.0
\fBrenameat\fP(2) 2.6.16
\fBrequest_key\fP(2) 2.6.11
\fBrestart_syscall\fP(2) 2.6
-\fBrmdir\fP(2)
+\fBrmdir\fP(2) 1.0
\fBrt_sigaction\fP(2) 2.2
\fBrt_sigpending\fP(2) 2.2
\fBrt_sigprocmask\fP(2) 2.2
\fBrt_sigsuspend\fP(2) 2.2
\fBrt_sigtimedwait\fP(2) 2.2
\fBrt_tgsigqueueinfo\fP(2) 2.6.31
+\fBs390_runtime_instr\fP(2) 3.7 s390 only
\fBsched_get_priority_max\fP(2) 2.0
\fBsched_get_priority_min\fP(2) 2.0
\fBsched_getaffinity\fP(2) 2.6
\fBsched_setparam\fP(2) 2.0
\fBsched_setscheduler\fP(2) 2.0
\fBsched_yield\fP(2) 2.0
-\fBselect\fP(2)
-\fBsemctl\fP(2)
-\fBsemget\fP(2)
-\fBsemop\fP(2)
+\fBselect\fP(2) 1.0
+\fBsemctl\fP(2) 2.0 See notes on \fBipc\fP(2)
+\fBsemget\fP(2) 2.0 See notes on \fBipc\fP(2)
+\fBsemop\fP(2) 2.0 See notes on \fBipc\fP(2)
\fBsemtimedop\fP(2) 2.6; 2.4.22
-\fBsend\fP(2)
+\fBsend\fP(2) 2.0 See notes on \fBsocketcall\fP(2)
\fBsendfile\fP(2) 2.2
\fBsendfile64\fP(2) 2.6; 2.4.19
\fBsendmmsg\fP(2) 3.0
-\fBsendmsg\fP(2)
-\fBsendto\fP(2)
+\fBsendmsg\fP(2) 2.0 See notes on \fBsocketcall\fP(2)
+\fBsendto\fP(2) 2.0 See notes on \fBsocketcall\fP(2)
\fBset_mempolicy\fP(2) 2.6.6
\fBset_robust_list\fP(2) 2.6.17
\fBset_thread_area\fP(2) 2.6
\fBset_tid_address\fP(2) 2.6
-\fBset_zone_reclaim\fP(2) 2.6.13 T{
-Removed in 2.6.16 (was never available to userspace)
-T}
.\" See http://lkml.org/lkml/2005/8/1/83
.\" "[PATCH] remove sys_set_zone_reclaim()"
-\fBsetdomainname\fP(2)
+\fBsetdomainname\fP(2) 1.0
\fBsetfsgid\fP(2) 1.2
\fBsetfsgid32\fP(2) 2.4
\fBsetfsuid\fP(2) 1.2
\fBsetfsuid32\fP(2) 2.4
-\fBsetgid\fP(2)
+\fBsetgid\fP(2) 1.0
\fBsetgid32\fP(2) 2.4
-\fBsetgroups\fP(2)
+\fBsetgroups\fP(2) 1.0
\fBsetgroups32\fP(2) 2.4
-\fBsethostname\fP(2)
-\fBsetitimer\fP(2)
+\fBsethostname\fP(2) 1.0
+\fBsetitimer\fP(2) 1.0
\fBsetns\fP(2) 3.0
-\fBsetpgid\fP(2)
-\fBsetpriority\fP(2)
-\fBsetregid\fP(2)
+\fBsetpgid\fP(2) 1.0
+\fBsetpriority\fP(2) 1.0
+\fBsetregid\fP(2) 1.0
\fBsetregid32\fP(2) 2.4
\fBsetresgid\fP(2) 2.2
\fBsetresgid32\fP(2) 2.4
\fBsetresuid\fP(2) 2.2
\fBsetresuid32\fP(2) 2.4
-\fBsetreuid\fP(2)
+\fBsetreuid\fP(2) 1.0
\fBsetreuid32\fP(2) 2.4
-\fBsetrlimit\fP(2)
-\fBsetsid\fP(2)
-\fBsetsockopt\fP(2)
-\fBsettimeofday\fP(2)
-\fBsetuid\fP(2)
+\fBsetrlimit\fP(2) 1.0
+\fBsetsid\fP(2) 1.0
+\fBsetsockopt\fP(2) 2.0 See notes on \fBsocketcall\fP(2)
+\fBsettimeofday\fP(2) 1.0
+\fBsetuid\fP(2) 1.0
\fBsetuid32\fP(2) 2.4
\fBsetup\fP(2) Removed in 2.2
\fBsetxattr\fP(2) 2.6; 2.4.18
-\fBsgetmask\fP(2)
-\fBshmat\fP(2)
-\fBshmctl\fP(2)
-\fBshmdt\fP(2)
-\fBshmget\fP(2)
-\fBshutdown\fP(2)
-\fBsigaction\fP(2)
+\fBsgetmask\fP(2) 1.0
+\fBshmat\fP(2) 2.0 See notes on \fBipc\fP(2)
+\fBshmctl\fP(2) 2.0 See notes on \fBipc\fP(2)
+\fBshmdt\fP(2) 2.0 See notes on \fBipc\fP(2)
+\fBshmget\fP(2) 2.0 See notes on \fBipc\fP(2)
+\fBshutdown\fP(2) 2.0 See notes on \fBsocketcall\fP(2)
+\fBsigaction\fP(2) 1.0
\fBsigaltstack\fP(2) 2.2
-\fBsignal\fP(2)
+\fBsignal\fP(2) 1.0
\fBsignalfd\fP(2) 2.6.22
\fBsignalfd4\fP(2) 2.6.27
-\fBsigpending\fP(2)
-\fBsigprocmask\fP(2)
-\fBsigreturn\fP(2)
-\fBsigsuspend\fP(2)
-\fBsocket\fP(2)
-\fBsocketcall\fP(2)
+\fBsigpending\fP(2) 1.0
+\fBsigprocmask\fP(2) 1.0
+\fBsigreturn\fP(2) 1.0
+\fBsigsuspend\fP(2) 1.0
+\fBsocket\fP(2) 2.0 See notes on \fBsocketcall\fP(2)
+\fBsocketcall\fP(2) 1.0
.\" Implements BSD socket calls
-\fBsocketpair\fP(2)
+\fBsocketpair\fP(2) 2.0 See notes on \fBsocketcall\fP(2)
\fBsplice\fP(2) 2.6.17
\fBspu_create\fP(2) 2.6.16 PowerPC only
\fBspu_run\fP(2) 2.6.16 PowerPC only
-\fBssetmask\fP(2)
-\fBstat\fP(2)
+\fBssetmask\fP(2) 1.0
+\fBstat\fP(2) 1.0
\fBstat64\fP(2) 2.4
-\fBstatfs\fP(2)
+\fBstatfs\fP(2) 1.0
\fBstatfs64\fP(2) 2.6
-\fBstime\fP(2)
+\fBstime\fP(2) 1.0
\fBsubpage_prot\fP(2) 2.6.25 PowerPC if
CONFIG_PPC_64K_PAGES
-\fBswapoff\fP(2)
-\fBswapon\fP(2)
-\fBsymlink\fP(2)
+\fBswapoff\fP(2) 1.0
+\fBswapon\fP(2) 1.0
+\fBsymlink\fP(2) 1.0
\fBsymlinkat\fP(2) 2.6.16
-\fBsync\fP(2)
+\fBsync\fP(2) 1.0
\fBsync_file_range\fP(2) 2.6.17
\fBsync_file_range2\fP(2) 2.6.22 T{
Architecture-specific variant of \fBsync_file_range\fP(2)
.\" \fBsys_debug_setcontext\fP(2) ??? PowerPC if CONFIG_PPC32
\fBsyncfs\fP(2) 2.6.39
\fBsysfs\fP(2) 1.2
-\fBsysinfo\fP(2)
-\fBsyslog\fP(2)
+\fBsysinfo\fP(2) 1.0
+\fBsyslog\fP(2) 1.0
.\" glibc interface is \fBklogctl\fP(3)
\fBtee\fP(2) 2.6.17
\fBtgkill\fP(2) 2.6
-\fBtime\fP(2)
+\fBtime\fP(2) 1.0
\fBtimer_create\fP(2) 2.6
\fBtimer_delete\fP(2) 2.6
\fBtimer_getoverrun\fP(2) 2.6
\fBtimerfd_create\fP(2) 2.6.25
\fBtimerfd_gettime\fP(2) 2.6.25
\fBtimerfd_settime\fP(2) 2.6.25
-\fBtimes\fP(2)
+\fBtimes\fP(2) 1.0
\fBtkill\fP(2) 2.6; 2.4.22
-\fBtruncate\fP(2)
+\fBtruncate\fP(2) 1.0
\fBtruncate64\fP(2) 2.4
\fBugetrlimit\fP(2) 2.4
-\fBumask\fP(2)
-\fBumount\fP(2)
+\fBumask\fP(2) 1.0
+\fBumount\fP(2) 1.0
.\" sys_oldumount() -- __NR_umount
\fBumount2\fP(2) 2.2
.\" sys_umount() -- __NR_umount2
-\fBuname\fP(2)
-\fBunlink\fP(2)
+\fBuname\fP(2) 1.0
+\fBunlink\fP(2) 1.0
\fBunlinkat\fP(2) 2.6.16
\fBunshare\fP(2) 2.6.16
-\fBuselib\fP(2)
-\fBustat\fP(2)
-\fButime\fP(2)
+\fBuselib\fP(2) 1.0
+\fBustat\fP(2) 1.0
+\fButime\fP(2) 1.0
\fButimensat\fP(2) 2.6.22
\fButimes\fP(2) 2.2
-\fBvfork\fP(2)
-\fBvhangup\fP(2)
-\fBvm86old\fP(2)
-.\" Superseded by \fBvm86\fP(2)
+\fButrap_install\fP(2) 2.2 Sparc
+\fBvfork\fP(2) 2.2
+\fBvhangup\fP(2) 1.0
+\fBvm86old\fP(2) 1.0 Was "vm86"; renamed in 2.0.28/2.2
+\fBvm86\fP(2) 2.0.28; 2.2
\fBvmsplice\fP(2) 2.6.17
-\fBwait4\fP(2)
+\fBwait4\fP(2) 1.0
\fBwaitid\fP(2) 2.6.10
-\fBwaitpid\fP(2)
-\fBwrite\fP(2)
+\fBwaitpid\fP(2) 1.0
+\fBwrite\fP(2) 1.0
\fBwritev\fP(2) 2.0
.TE
.ad
.PP
-On many platforms, including i386, socket calls are all multiplexed
+On many platforms, including x86-32, socket calls are all multiplexed
(via glibc wrapper functions) through
.BR socketcall (2)
and similarly System V IPC calls are multiplexed through
.BR putpmsg (2)
calls are for kernels patched to support STREAMS,
and may never be in the standard kernel.
+
+There was briefly
+.BR set_zone_reclaim (2),
+added in Linux 2.6.13, and removed in 2.6.16;
+this system call was never available to user space.
.SH NOTES
.PP
Roughly speaking, the code belonging to the system call
with number __NR_xxx defined in
.I /usr/include/asm/unistd.h
-can be found in the kernel source in the routine
+can be found in the Linux kernel source in the routine
.IR sys_xxx ().
(The dispatch table for i386 can be found in
.IR /usr/src/linux/arch/i386/kernel/entry.S .)
older system calls were superseded by newer ones,
and this has been treated somewhat unsystematically.
On platforms with
-proprietary OS emulation, such as parisc, sparc, sparc64 and alpha,
+proprietary operating-system emulation,
+such as parisc, sparc, sparc64 and alpha,
there are many additional system calls; mips64 also contains a full
set of 32-bit system calls.
and
.BR mmap (2)
system calls use five or more arguments,
-which caused problems the way
+which caused problems in the way
argument passing on the i386 used to be set up.
Thus, while other architectures have
.IR sys_select ()
.\" Copyright (C) 1996 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Written 11 April 1996 by Andries Brouwer <aeb@cwi.nl>
.\" 960412: Added comments from Stephen Tweedie
.\" Modified Tue Oct 22 22:28:41 1996 by Eric S. Raymond <esr@thyrsus.com>
.\" Modified Mon Jan 5 20:31:04 1998 by aeb.
.\"
-.TH SYSCTL 2 2008-11-20 "Linux" "Linux Programmer's Manual"
+.TH SYSCTL 2 2012-12-22 "Linux" "Linux Programmer's Manual"
.SH NAME
sysctl \- read/write system parameters
.SH SYNOPSIS
.sp
.BI "int _sysctl(struct __sysctl_args *" args );
.fi
+
+.IR Note :
+There is no glibc wrapper for this system call; see NOTES.
.SH DESCRIPTION
.B Do not use this system call!
See NOTES.
.IR /proc/sys ,
and if the requested item is found calls some appropriate routine
to read or modify the value.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
Upon successful completion,
.BR _sysctl ()
returns 0.
.I name
was not found.
.TP
-.B EPERM
+.BR EACCES ", " EPERM
No search permission for one of the encountered "directories",
or no read permission where
.I oldval
was nonzero, or no write permission where
.I newval
was nonzero.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This call is Linux-specific, and should not be used in programs
intended to be portable.
A
.SH NOTES
Glibc does not provide a wrapper for this system call; call it using
.BR syscall (2).
-
-Or rather... don't call it:
+Or rather...
+.I don't
+call it:
use of this system call has long been discouraged,
and it is so unloved that
\fBit is likely to disappear in a future kernel version\fP.
.\" See http://lwn.net/Articles/247243/
+Since Linux 2.6.24,
+uses of this system call result in warnings in the kernel log.
+.\" Though comments in suggest that it is needed by old glibc binaries,
+.\" so maybe it's not going away.
Remove it from your programs now; use the
.I /proc/sys
interface instead.
+
+This system call is available only if the kernel was configured with the
+.B CONFIG_SYSCTL_SYSCALL
+option.
.SH BUGS
The object names vary between kernel versions,
making this system call worthless for applications.
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR proc (5)
.\" Copyright (C) 1995, Thomas K. Dyas <tdyas@eden.rutgers.edu>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Created Wed Aug 9 1995 Thomas K. Dyas <tdyas@eden.rutgers.edu>
.\"
kernel.
.PP
The numbering of the file-system type indexes begins with zero.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR sysfs ()
returns the file-system index for option
is out-of-bounds;
.I option
is invalid.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4.
.SH NOTES
This System-V derived system call is obsolete; don't use it.
-.\" -*- nroff -*-
-.\"
.\" Copyright (C) 1993 by Dan Miner (dminer@nyx.cs.du.edu)
.\"
+.\" %%%LICENSE_START(FREELY_REDISTRIBUTABLE)
.\" Permission is granted to freely distribute or modify this file
.\" for the purpose of improving Linux or its documentation efforts.
.\" If you modify this file, please put a date stamp and HOW you
.\" changed this file. Thanks. -DM
+.\" %%%LICENSE_END
.\"
.\" Modified Sat Jul 24 12:35:12 1993 by Rik Faith <faith@cs.unc.edu>
.\" Modified Tue Oct 22 22:29:51 1996 by Eric S. Raymond <esr@thyrsus.com>
provides a simple way of getting overall system statistics.
This is more
portable than reading \fI/dev/kmem\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.TP
.B EFAULT
pointer to \fIstruct\ sysinfo\fP is invalid
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This function is Linux-specific, and should not be used in programs
intended to be portable.
.sp
.BR sysinfo ()
routine since 5.3.5, and
glibc has one since 1.90.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR proc (5)
.\" Copyright (C) 1995 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Written 11 June 1995 by Andries Brouwer <aeb@cwi.nl>
.\" 2008-02-15, Jeremy Kerr <jk@ozlabs.org>
.\" 2008-02-15, Michael Kerrisk <mtk.manpages@gmail.com>
.\" Update LOG_BUF_LEN details; update RETURN VALUE section.
.\"
-.TH SYSLOG 2 2012-05-05 "Linux" "Linux Programmer's Manual"
+.TH SYSLOG 2 2012-11-29 "Linux" "Linux Programmer's Manual"
.SH NAME
syslog, klogctl \- read and/or clear kernel message ring buffer;
set console_loglevel
.IR printk ()
buffer, and the glibc wrapper function is called
.BR klogctl ().
-
-The \fItype\fP argument determines the action taken by this function,
-as follows:
-
-.nf
- 0 \-\- Close the log. Currently a NOP.
- 1 \-\- Open the log. Currently a NOP.
- 2 \-\- Read from the log.
- 3 \-\- Read all messages remaining in the ring buffer.
- 4 \-\- Read and clear all messages remaining in the ring buffer
- 5 \-\- Clear ring buffer.
- 6 \-\- Disable printk to console
- 7 \-\- Enable printk to console
- 8 \-\- Set level of messages printed to console
- 9 \-\- Return number of unread characters in the log buffer
- 10 \-\- Return size of the log buffer
-.fi
-
-Type 9 was added in Linux 2.4.10; type 10 in Linux 2.6.6.
-
-In Linux kernels before 2.6.37,
-only command types 3 and 10 are allowed to unprivileged processes.
-Since Linux 2.6.37,
-command types 3 and 10 are only allowed to unprivileged processes if
-.IR /proc/sys/kernel/dmesg_restrict
-has the value 0.
-Before Linux 2.6.37, "privileged" means that the caller has the
-.BR CAP_SYS_ADMIN
-capability.
-Since Linux 2.6.37,
-"privileged" means that the caller has either the
-.BR CAP_SYS_ADMIN
-capability (now deprecated for this purpose) or the (new)
-.BR CAP_SYSLOG
-capability.
.SS The kernel log buffer
The kernel has a cyclic buffer of length
.B LOG_BUF_LEN
had the value 4096;
from kernel 1.3.54, it was 8192;
from kernel 2.1.113 it was 16384;
-since 2.4.23/2.6 the value is a kernel configuration option.
+since 2.4.23/2.6 the value is a kernel configuration option
+.RB ( CONFIG_LOG_BUF_SHIFT ).
.\" Under "General setup" ==> "Kernel log buffer size"
.\" For 2.6, precisely the option seems to have appeared in 2.5.55.
-In recent kernels the size can be queried with command type 10.
-
+In recent kernels the size can be queried with command type 10 (see below).
+.SS Commands
+The \fItype\fP argument determines the action taken by this function.
+The list below specifies the values for
+.IR type .
+The symbolic names are defined in the kernel source,
+but are not exported to user space;
+you will either need to use the numbers, or define the names yourself.
+.TP
+.BR SYSLOG_ACTION_CLOSE " (0)"
+Close the log.
+Currently a NOP.
+.TP
+.BR SYSLOG_ACTION_OPEN " (1)"
+Open the log.
+Currently a NOP.
+.TP
+.BR SYSLOG_ACTION_READ " (2)"
+Read from the log.
The call
-.I "syslog(2,buf,len)"
-waits until this kernel log buffer is nonempty, and then reads
-at most \fIlen\fP bytes into the buffer \fIbuf\fP.
-It returns
-the number of bytes read.
-Bytes read from the log disappear from
-the log buffer: the information can only be read once.
-This is the function executed by the kernel when a user program
-reads
+waits until the kernel log buffer is nonempty, and then reads
+at most \fIlen\fP bytes into the buffer pointed to by
+.IR bufp .
+The call returns the number of bytes read.
+Bytes read from the log disappear from the log buffer:
+the information can only be read once.
+This is the function executed by the kernel when a user program reads
.IR /proc/kmsg .
-
-The call
-.I syslog(3,buf,len)
-will read the last \fIlen\fP bytes from the log buffer (nondestructively),
+.TP
+.BR SYSLOG_ACTION_READ_ALL " (3)"
+Read all messages remaining in the ring buffer,
+placing then in the buffer pointed to by
+.IR bufp .
+The call reads the last \fIlen\fP
+bytes from the log buffer (nondestructively),
but will not read more than was written into the buffer since the
-last "clear ring buffer" command (which does not clear the buffer at all).
-It returns the number of bytes read.
-
-The call
-.I syslog(4,buf,len)
-does precisely the same, but also executes the "clear ring buffer" command.
-
-The call
-.I syslog(5,dummy,dummy)
-executes just the "clear ring buffer" command.
-(In each call where
-.I buf
-or
+last "clear ring buffer" command (see command 5 below)).
+The call returns the number of bytes read.
+.TP
+.BR SYSLOG_ACTION_READ_CLEAR " (4)"
+Read and clear all messages remaining in the ring buffer.
+The call does precisely the same as for a
+.I type
+of 3, but also executes the "clear ring buffer" command.
+.TP
+.BR SYSLOG_ACTION_CLEAR " (5)"
+The call executes just the "clear ring buffer" command.
+The
+.I bufp
+and
.I len
-is shown as "dummy", the value of the argument is ignored by the call.)
-
-The call
-.I syslog(6,dummy,dummy)
-sets the console log level to minimum, so that no messages are printed
-to the console.
-
-The call
-.I syslog(7,dummy,dummy)
-sets the console log level to default, so that messages are printed
-to the console.
-
-The call
-.I syslog(8,dummy,level)
-sets the console log level to
-.IR level ,
+arguments are ignored.
+.IP
+This command does not really clear the ring buffer.
+Rather, it sets a kernel bookkeeping variable that
+determines the results returned by commands 3
+.RB ( SYSLOG_ACTION_READ_ALL )
+and 4
+.RB ( SYSLOG_ACTION_READ_CLEAR ).
+This command has no effect on commands 2
+.RB ( SYSLOG_ACTION_READ )
+and 9
+.RB ( SYSLOG_ACTION_SIZE_UNREAD ).
+.TP
+.BR SYSLOG_ACTION_CONSOLE_OFF " (6)"
+Disable printk to console.
+The call sets the console log level to the minimum,
+so that no messages are printed to the console.
+The
+.I bufp
+and
+.I len
+arguments are ignored.
+.TP
+.BR SYSLOG_ACTION_CONSOLE_ON " (7)"
+The call sets the console log level to the default,
+so that messages are printed to the console.
+The
+.I bufp
+and
+.I len
+arguments are ignored.
+.TP
+.BR SYSLOG_ACTION_CONSOLE_LEVEL " (8)"
+The call sets the console log level to the value given in
+.IR len ,
which must be an integer between 1 and 8 (inclusive).
See the
.B loglevel
section for details.
-
+The
+.I bufp
+argument is ignored.
+.TP
+.BR SYSLOG_ACTION_SIZE_UNREAD " (9) (since Linux 2.4.10)"
The call
-.I syslog(9,dummy,dummy)
returns the number of bytes currently available to be read
-on the kernel log buffer.
-
-The call
-.I syslog(10,dummy,dummy)
-returns the total size of the kernel log buffer.
+from the kernel log buffer via command 2
+.RB ( SYSLOG_ACTION_READ ).
+The
+.I bufp
+and
+.I len
+arguments are ignored.
+.TP
+.BR SYSLOG_ACTION_SIZE_BUFFER " (10) (since Linux 2.6.6)"
+This command returns the total size of the kernel log buffer.
+The
+.I bufp
+and
+.I len
+arguments are ignored.
+.PP
+All commands except 3 and 10 require privilege.
+In Linux kernels before 2.6.37,
+command types 3 and 10 are allowed to unprivileged processes;
+since Linux 2.6.37,
+these commands are allowed to unprivileged processes only if
+.IR /proc/sys/kernel/dmesg_restrict
+has the value 0.
+Before Linux 2.6.37, "privileged" means that the caller has the
+.BR CAP_SYS_ADMIN
+capability.
+Since Linux 2.6.37,
+"privileged" means that the caller has either the
+.BR CAP_SYS_ADMIN
+capability (now deprecated for this purpose) or the (new)
+.BR CAP_SYSLOG
+capability.
.SS The loglevel
The kernel routine
.BR printk ()
(7), but is set to 10 if the
kernel command line contains the word "debug", and to 15 in case
of a kernel fault (the 10 and 15 are just silly, and equivalent to 8).
-This variable is set (to a value in the range 1-8) by the call
-.IR syslog(8,dummy,value) .
-The calls
-.I syslog(type,dummy,dummy)
-with \fItype\fP equal to 6 or 7, set it to 1 (kernel panics only)
+This variable is set (to a value in the range 1-8) by a
+.BR syslog ()
+call with a
+.I type
+of 8.
+Calls to
+.BR syslog ()
+with
+.I type
+equal to 6 or 7 set the variable to 1 (kernel panics only)
or 7 (all except debugging messages), respectively.
Every text line in a message has its own loglevel.
#define KERN_INFO "<6>" /* informational */
#define KERN_DEBUG "<7>" /* debug-level messages */
.fi
-.SH "RETURN VALUE"
+.SH RETURN VALUE
For \fItype\fP equal to 2, 3, or 4, a successful call to
.BR syslog ()
returns the number
.B ERESTARTSYS
System call was interrupted by a signal; nothing was read.
(This can be seen only during a trace.)
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This system call is Linux-specific and should not be used in programs
intended to be portable.
.SH NOTES
.\" .BR SYS_klog .
.\" In glibc 2.0 the syscall is baptized
.\" .BR klogctl ().
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR syslog (3),
.BR capabilities (7)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 2006 Jens Axboe
.\" and Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH TEE 2 2012-05-04 "Linux" "Linux Programmer's Manual"
.SH NAME
.BR tee ()
system call first appeared in Linux 2.6.17;
library support was added to glibc in version 2.5.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This system call is Linux-specific.
.SH NOTES
Conceptually,
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1992 Drew Eckhardt (drew@cs.colorado.edu), March 28, 1992
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified by Michael Haardt <michael@moria.de>
.\" Modified Sat Jul 24 14:13:40 1993 by Rik Faith <faith@cs.unc.edu>
is non-NULL,
the return value is also stored in the memory pointed to by
.IR t .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, the value of time in seconds since the Epoch is returned.
On error, \fI((time_t)\ \-1)\fP is returned, and \fIerrno\fP is set
appropriately.
.B EFAULT
.I t
points outside your accessible address space.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, C89, C99, POSIX.1-2001.
.\" .br
.\" Under 4.3BSD, this call is obsoleted by
required to be synchronized to a standard reference.
The intention is that the interpretation of seconds since the Epoch values be
consistent; see POSIX.1-2008 Rationale A.4.15 for further rationale.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR date (1),
.BR gettimeofday (2),
.BR ctime (3),
.\" Copyright (c) 2009 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" FIXME: Linux 2.6.39 adds CLOCK_BOOTTIME
.\" Does this also affect timerfd_create()?
The timer IDs presented at user level are maintained by glibc,
which maps these IDs to the timer IDs employed by the kernel.
.\" See the glibc source file kernel-posix-timers.h for the structure
-.\" that glibc uses to map userspace timer IDs to kernel timer IDs
+.\" that glibc uses to map user-space timer IDs to kernel timer IDs
.\" The kernel-level timer ID is exposed via siginfo.si_tid.
.PP
The POSIX timers system calls first appeared in Linux 2.6.
Prior to this,
-glibc provided an incomplete userspace implementation
+glibc provided an incomplete user-space implementation
.RB ( CLOCK_REALTIME
timers only) using POSIX threads,
and current glibc falls back to this implementation on systems
overrun count = 10004886
.fi
.in
-.SS Program Source
+.SS Program source
\&
.nf
#include <stdlib.h>
}
.fi
.SH SEE ALSO
+.ad l
+.nh
.BR clock_gettime (2),
.BR setitimer (2),
.BR timer_delete (2),
.\" Copyright (c) 2009 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
+.\"
.TH TIMER_DELETE 2 2009-02-20 Linux "Linux Programmer's Manual"
.SH NAME
timer_delete \- delete a POSIX per-process timer
.\" Copyright (c) 2009 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
+.\"
.TH TIMER_GETOVERRUN 2 2009-02-20 Linux "Linux Programmer's Manual"
.SH NAME
timer_getoverrun \- get overrun count for a POSIX per-process timer
.\" Copyright (c) 2009 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.TH TIMER_SETTIME 2 2009-02-20 Linux "Linux Programmer's Manual"
+.\" %%%LICENSE_END
+.\"
+.TH TIMER_SETTIME 2 2012-10-15 Linux "Linux Programmer's Manual"
.SH NAME
timer_settime, timer_gettime \- arm/disarm and fetch
state of POSIX per-process timer
.IR timerid .
The
.I new_value
-argument is an
+argument is pointer to an
.I itimerspec
structure that specifies the new initial value and
the new interval for the timer.
If
.I old_value
-is not NULL, then it returns the previous interval of the timer (in
+is not NULL, then it points to a buffer
+that is used to return the previous interval of the timer (in
.IR old_value->it_interval )
and the amount of time until the timer
would previously have next expired (in
.\" Copyright (C) 2008 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(GPLv2+_SW_3_PARA)
.\" This program is free software; you can redistribute it and/or modify
.\" it under the terms of the GNU General Public License as published by
.\" the Free Software Foundation; either version 2 of the License, or
.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
.\" GNU General Public License for more details.
.\"
-.\" You should have received a copy of the GNU General Public License
-.\" along with this program; if not, write to the Free Software
-.\" Foundation, Inc., 59 Temple Place, Suite 330, Boston,
-.\" MA 02111-1307 USA
+.\" You should have received a copy of the GNU General Public
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" FIXME: Linux 3.0: timerfd_settime() adds a TFD_TIMER_CANCEL_ON_SET flag.
.\"
is preserved across
.BR execve (2),
and continues to generate timer expirations if the timer was armed.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR timerfd_create ()
returns a new file descriptor.
Library support is provided by glibc since version 2.8.
.SH CONFORMING TO
These system calls are Linux-specific.
+.SH BUGS
+Currently,
+.\" 2.6.29
+.BR timerfd_create ()
+supports fewer types of clock IDs than
+.BR timer_create (2).
.SH EXAMPLE
The following program creates a timer and then monitors its progress.
The program accepts up to three command-line arguments.
exit(EXIT_SUCCESS);
}
.fi
-.SH BUGS
-Currently,
-.\" 2.6.29
-.BR timerfd_create ()
-supports fewer types of clock IDs than
-.BR timer_create (2).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR eventfd (2),
.BR poll (2),
.BR read (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1992 Drew Eckhardt (drew@cs.colorado.edu), March 28, 1992
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified by Michael Haardt (michael@moria.de)
.\" Modified Sat Jul 24 14:29:17 1993 by Rik Faith (faith@cs.unc.edu)
.\" Added notes on nonstandard behavior: Linux allows 'buf' to
.\" be NULL, but POSIX.1 doesn't specify this and it's nonportable.
.\"
-.TH TIMES 2 2012-04-16 "Linux" "Linux Programmer's Manual"
+.TH TIMES 2 2012-10-22 "Linux" "Linux Programmer's Manual"
.SH NAME
times \- get process times
.SH SYNOPSIS
that the children did not wait for are never seen.
.LP
All times reported are in clock ticks.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR times ()
returns the number of clock ticks that have elapsed since
an arbitrary point in the past.
.B EFAULT
.I tms
points outside the process's address space.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
.SH NOTES
The number of clock ticks per second can be obtained using:
.IR clock_t ,
means that a portable application would be wise to avoid using this value.
To measure changes in elapsed time, use
-.BR gettimeofday (2)
+.BR clock_gettime (2)
instead.
.\" .PP
.\" On older systems the number of clock ticks per second is given
.\" by the variable HZ.
-.SS "Historical"
+.SS Historical
SVr1-3 returns
.I long
and the struct members are of type
.\" http://marc.info/?l=linux-kernel&m=119447727031225&w=2
.\" "compat_sys_times() bogus until jiffies >= 0"
.\" November 2007
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR time (1),
.BR getrusage (2),
.BR wait (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2008 Michael Kerrisk <tmk.manpages@gmail.com>
.\" and Copyright 2003 Abhijit Menon-Sen <ams@wiw.org>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 2004-05-31, added tgkill, ahu, aeb
-.\" 2008-01-15 mtk -- rewote DESCRIPTION
+.\" 2008-01-15 mtk -- rewrote DESCRIPTION
.\"
-.TH TKILL 2 2011-09-18 "Linux" "Linux Programmer's Manual"
+.TH TKILL 2 2012-07-13 "Linux" "Linux Programmer's Manual"
.SH NAME
tkill, tgkill \- send a signal to a thread
.SH SYNOPSIS
.sp
.BI "int tgkill(int " tgid ", int " tid ", int " sig );
.fi
+
+.IR Note :
+There are no glibc wrappers for these system calls; see NOTES.
.SH DESCRIPTION
.BR tgkill ()
sends the signal
which may result in the wrong thread being signaled if a thread
terminates and its thread ID is recycled.
Avoid using this system call.
+.\" FIXME: Maybe say something about the following:
+.\" http://sourceware.org/bugzilla/show_bug.cgi?id=12889
+.\" Rich Felker <bugdal@aerifal.cx>
+.\" There is a race condition in pthread_kill: it is possible that,
+.\" between the time pthread_kill reads the pid/tid from the target
+.\" thread descriptor and the time it makes the tgkill syscall,
+.\" the target thread terminates and the same tid gets assigned
+.\" to a new thread in the same process.
+.\"
+.\" (The tgkill syscall was designed to eliminate a similar race
+.\" condition in tkill, but it only succeeded in eliminating races
+.\" where the tid gets reused in a different process, and does not
+.\" help if the same tid gets assigned to a new thread in the
+.\" same process.)
+.\"
+.\" The only solution I can see is to introduce a mutex that ensures
+.\" that a thread cannot exit while pthread_kill is being called on it.
+.\"
+.\" Note that in most real-world situations, like almost all race
+.\" conditions, this one will be extremely rare. To make it
+.\" measurable, one could exhaust all but 1-2 available pid values,
+.\" possibly by lowering the max pid parameter in /proc, forcing
+.\" the same tid to be reused rapidly.
If
.I tgid
These are the raw system call interfaces, meant for internal
thread library use.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and \fIerrno\fP
is set appropriately.
is supported since Linux 2.4.19 / 2.5.4.
.BR tgkill ()
was added in Linux 2.5.75.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR tkill ()
and
.BR tgkill ()
Glibc does not provide wrappers for these system calls; call them using
.BR syscall (2).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR clone (2),
.BR gettid (2),
.BR kill (2),
.\" Copyright (c) 1983, 1991 The Regents of the University of California.
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)truncate.2 6.9 (Berkeley) 3/10/91
.\"
the file must be open for writing; with
.BR truncate (),
the file must be writable.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.B EINVAL
.I fd
does not reference a regular file.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.4BSD, SVr4, POSIX.1-2001 (these calls first appeared in 4.2BSD).
.\" POSIX.1-1996 has
.\" .BR ftruncate ().
.BR ftruncate ()
was 200809L instead of 200112L.
This has been fixed in later glibc versions.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR open (2),
.BR stat (2),
.BR path_resolution (7)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 2006, 2008, Michael Kerrisk (mtk.manpages@gmail.com)
.\" (A few fragments remain from an earlier (1992) version written in
.\" 1992 by Drew Eckhardt <drew@cs.colorado.edu>.)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified by Michael Haardt <michael@moria.de>
.\" Modified Sat Jul 24 12:51:53 1993 by Rik Faith <faith@cs.unc.edu>
.fi
(because 0666 & ~022 = 0644; i.e., rw\-r\-\-r\-\-).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
This system call always succeeds and the previous value of the mask
is returned.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
.SH NOTES
A child process created via
.BR msgget (2),
.BR semget (2),
.BR shmget (2)).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR chmod (2),
.BR mkdir (2),
.BR open (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 1993 Rickard E. Faith <faith@cs.unc.edu>
.\" and Copyright (C) 1994 Andries E. Brouwer <aeb@cwi.nl>
.\" and Copyright (C) 2002, 2005 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 2008-10-06, mtk: Created this as a new page by splitting
.\" umount/umount2 material out of mount.2
if it is a symbolic link.
This flag allows security problems to be avoided in set-user-ID-\fIroot\fP
programs that allow unprivileged users to unmount file systems.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
errors.
Each file system type may have its own special errors and its
own special behavior.
-See the kernel source code for details.
+See the Linux kernel source code for details.
.TP
.B EAGAIN
A call to
.BR MNT_EXPIRE
.\" http://sourceware.org/bugzilla/show_bug.cgi?id=10092
are only available in glibc since version 2.11.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are Linux-specific and should not be used in
programs intended to be portable.
.SH NOTES
In Linux 2.3.99-pre7 the call \fIumount(device)\fP was removed,
leaving only \fIumount(dir)\fP (since now devices can be mounted
in more than one place, so specifying the device does not suffice).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mount (2),
.BR path_resolution (7),
.BR mount (8),
.\" Copyright (C) 2001 Andries Brouwer <aeb@cwi.nl>.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 2007-07-05 mtk: Added details on underlying system call interfaces
.\"
char sysname[]; /* Operating system name (e.g., "Linux") */
char nodename[]; /* Name within "some implementation-defined
network" */
- char release[]; /* OS release (e.g., "2.6.28") */
- char version[]; /* OS version */
+ char release[]; /* Operating system release (e.g., "2.6.28") */
+ char version[]; /* Operating system version */
char machine[]; /* Hardware identifier */
#ifdef _GNU_SOURCE
char domainname[]; /* NIS or YP domain name */
.I struct utsname
is unspecified (see NOTES);
the fields are terminated by a null byte (\(aq\\0\(aq).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.B EFAULT
.I buf
is not valid.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001.
There is no
.BR uname ()
.BR uname ()
wrapper function hides these details from applications,
invoking the most recent version of the system call provided by the kernel.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR uname (1),
.BR getdomainname (2),
.BR gethostname (2)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 1995 Michael Chastain (mec@shell.portal.com), 15 April 1995.
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Updated, aeb, 980612
.\"
-.TH UNIMPLEMENTED 2 2007-07-05 "Linux" "Linux Programmer's Manual"
+.TH UNIMPLEMENTED 2 2013-02-12 "Linux" "Linux Programmer's Manual"
.SH NAME
-afs_syscall, break, ftime, getpmsg, gtty, lock, madvise1, mpx, prof, profil,
-putpmsg, security, stty, tuxcall, ulimit, vserver \- unimplemented system calls
+afs_syscall, break, fattach, fdetach, ftime, getmsg, getpmsg, gtty, isastream,
+lock, madvise1, mpx, prof, profil, putmsg, putpmsg, security,
+stty, tuxcall, ulimit, vserver \- unimplemented system calls
.SH SYNOPSIS
Unimplemented system calls.
.SH DESCRIPTION
-These system calls are not implemented in the Linux 2.6.22 kernel.
-.SH "RETURN VALUE"
+These system calls are not implemented in the Linux kernel.
+.SH RETURN VALUE
These system calls always return \-1 and set
.I errno
to
and
.BR delete_module (2)
only exist when the Linux kernel was built with support for them.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR syscalls (2)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 1992 Drew Eckhardt;
.\" 1993 Ian Jackson.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified 1993-07-24 by Rik Faith <faith@cs.unc.edu>
.\" Modified 1996-09-08 by Arnt Gulbrandsen <agulbra@troll.no>
If the name referred to a socket, fifo or device the name for it is
removed but processes which have the object open may continue to use
it.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.B EROFS
.I pathname
refers to a file on a read-only file system.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
.\" SVr4 documents additional error
.\" conditions EINTR, EMULTIHOP, ETXTBSY, ENOLINK.
.SH BUGS
Infelicities in the protocol underlying NFS can cause the unexpected
disappearance of files which are still being used.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR rm (1),
.BR chmod (2),
.BR link (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 2006, Michael Kerrisk
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\"
+.\" %%%LICENSE_END
.\"
.TH UNLINKAT 2 2012-05-04 "Linux" "Linux Programmer's Manual"
.SH NAME
.BR rmdir (2)
on
.IR pathname .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR unlinkat ()
returns 0.
.BR unlinkat ()
was added to Linux in kernel 2.6.16;
library support was added to glibc in version 2.4.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
A similar system call exists on Solaris.
.SH NOTES
.BR openat (2)
for an explanation of the need for
.BR unlinkat ().
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR openat (2),
.BR rmdir (2),
.BR unlink (2),
.\" Copyright (C) 2006, Janak Desai <janak@us.ibm.com>
.\" and Copyright (C) 2006, Michael Kerrisk <mtk.manpages@gmail.com>
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Licensed under the GPL
+.\" %%%LICENSE_END
.\"
.\" Patch Justification:
.\" unshare system call is needed to implement, using PAM,
.\" by clone, which would require porting and maintaining all commands
.\" such as login, and su, that establish a user session.
.\"
-.TH UNSHARE 2 2010-10-30 "Linux" "Linux Programmer's Manual"
+.TH UNSHARE 2 2012-12-31 "Linux" "Linux Programmer's Manual"
.SH NAME
unshare \- disassociate parts of the process execution context
.SH SYNOPSIS
.B CLONE_FS
flag.
Unshare file system attributes, so that the calling process
-no longer shares its root directory, current directory,
-or umask attributes with any other process.
-.BR chroot (2),
-.BR chdir (2),
-or
-.BR umask (2)
+no longer shares its root directory
+.RB ( chroot (2)),
+current directory
+.RB ( chdir (2)),
+or umask
+.RB ( umask (2))
+attributes with any other process.
.TP
.BR CLONE_NEWIPC " (since Linux 2.6.19)
This flag has the same effect as the
so that the calling process is moved into a
new network namespace which is not shared
with any previously existing process.
+Use of
.BR CLONE_NEWNET
requires the
.BR CAP_SYS_ADMIN
.BR CAP_SYS_ADMIN
capability.
.TP
-.BR CLONE_SYSVSEM " (since Linux 2.6.26)
-This flag reverses the effect of the
-.BR clone (2)
-.B CLONE_SYSVSEM
-flag.
-Unshare System V semaphore undo values,
-so that the calling process has a private copy
-which is not shared with any other process.
-Use of
-.BR CLONE_SYSVSEM
-requires the
-.BR CAP_SYS_ADMIN
-capability.
-.TP
.BR CLONE_NEWUTS " (since Linux 2.6.19)
This flag has the same effect as the
.BR clone (2)
requires the
.BR CAP_SYS_ADMIN
capability.
+.TP
+.BR CLONE_SYSVSEM " (since Linux 2.6.26)
+.\" commit 9edff4ab1f8d82675277a04e359d0ed8bf14a7b7
+This flag reverses the effect of the
+.BR clone (2)
+.B CLONE_SYSVSEM
+flag.
+Unshare System V semaphore undo values,
+so that the calling process has a private copy
+which is not shared with any other process.
+Use of
+.BR CLONE_SYSVSEM
+requires the
+.BR CAP_SYS_ADMIN
+capability.
.\" As at 2.6.16, the following forced implications also apply,
.\" although the relevant flags are not yet implemented.
.\" If CLONE_THREAD is set force CLONE_VM.
.BR clone (2)
can be unshared using
.BR unshare ().
-In particular, as at kernel 2.6.16,
+In particular, as at kernel 3.8,
+.\" FIXME all of the following needs to be reviewed for the current kernel
.BR unshare ()
does not implement flags that reverse the effects of
.BR CLONE_SIGHAND ,
.\" was not specified when doing clone(); i.e., unsharing
.\" signal handlers is permitted if we are not actually
.\" sharing signal handlers. mtk
-.BR CLONE_SYSVSEM ,
.BR CLONE_THREAD ,
or
-.\" FIXME . check future kernel versions (e.g., 2.6.17)
-.\" to see if CLONE_VM gets implemented.
.BR CLONE_VM .
-.\" However, as at 2.6.16, we can do unshare(CLONE_VM) if CLONE_VM
+.\" However, we can do unshare(CLONE_VM) if CLONE_VM
.\" was not specified when doing clone(); i.e., unsharing
.\" virtual memory is permitted if we are not actually
.\" sharing virtual memory. mtk
.SH SEE ALSO
.BR clone (2),
.BR fork (2),
-.BR vfork (2),
-Documentation/unshare.txt
+.BR kcmp (2),
+.BR setns (2),
+.BR vfork (2)
+
+.I Documentation/unshare.txt
+in the Linux kernel source tree
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1992 Drew Eckhardt (drew@cs.colorado.edu), March 28, 1992
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified by Michael Haardt <michael@moria.de>
.\" Modified 1993-07-24 by Rik Faith <faith@cs.unc.edu>
in the library itself.
The library can have any recognized
binary format.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.I library
is not an executable of known type,
e.g., does not have the correct magic numbers.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR uselib ()
is Linux-specific, and should not be used in programs
intended to be portable.
This is also the state of affairs in libc5.
.LP
glibc2 does not use this call.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ar (1),
.BR gcc (1),
.BR ld (1),
.\" Copyright (C) 1995, Thomas K. Dyas <tdyas@eden.rutgers.edu>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Created 1995-08-09 Thomas K. Dyas <tdyas@eden.rutgers.edu>
.\" Modified 1997-01-31 by Eric S. Raymond <esr@thyrsus.com>
.IR f_fpack ,
are not implemented and will
always be filled with null bytes (\(aq\\0\(aq).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned and the
.I ustat
structure pointed to by
.I dev
does not support this operation, or any version of Linux before
1.3.16.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4.
.\" SVr4 documents additional error conditions ENOLINK, ECOMM, and EINTR
.\" but has no ENOSYS condition.
All new programs should use
.BR statfs (2)
instead.
-.SS "HP-UX Notes"
+.SS HP-UX notes
The HP-UX version of the
.I ustat
structure has an additional field,
.\" underlying file system is NFS.
For some file systems, inodes are dynamically allocated.
Such file systems will return the current number of free inodes.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR stat (2),
.BR statfs (2)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1992 Drew Eckhardt (drew@cs.colorado.edu), March 28, 1992
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified by Michael Haardt <michael@moria.de>
.\" Modified 1993-07-24 by Rik Faith <faith@cs.unc.edu>
.BR utime (),
the access and modification times of the file are
set to the current time.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.B EROFS
.I path
resides on a read-only file system.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR utime ():
SVr4, POSIX.1-2001.
POSIX.1-2008 marks
is just a wrapper for
.BR utime ()
and hence does not allow a subsecond resolution.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR chattr (1),
.BR futimesat (2),
.BR stat (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH UTIMENSAT 2 2012-03-25 "Linux" "Linux Programmer's Manual"
.SH NAME
.I pathname
specifies a symbolic link, then update the timestamps of the link,
rather than the file to which it refers.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR utimensat ()
and
Support for
.BR futimens ()
first appeared in glibc 2.6.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR futimens ()
and
.BR utimensat ()
.\" conversely, a process with a read-only file descriptor won't
.\" be able to update the timestamps of a file,
.\" even if it has write permission on the file.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR chattr (1),
.BR futimesat (2),
.BR openat (2),
.\" Copyright (c) 1999 Andries Brouwer (aeb@cwi.nl), 1 Nov 1999
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 1999-11-10: Merged text taken from the page contributed by
.\" Reed H. Petty (rhp@draper.net)
.\"
-.TH VFORK 2 2012-02-08 "Linux" "Linux Programmer's Manual"
+.TH VFORK 2 2012-08-05 "Linux" "Linux Programmer's Manual"
.SH NAME
vfork \- create a child process and block parent
.SH SYNOPSIS
.RE
.ad b
.SH DESCRIPTION
-.SS "Standard Description"
+.SS Standard description
(From POSIX.1)
The
.BR vfork ()
or one of the
.BR exec (3)
family of functions.
-.SS "Linux Description"
+.SS Linux description
.BR vfork (),
just like
.BR fork (2),
(i.e., after the child terminates
or calls
.BR execve (2)).
-.SS "Historic Description"
+.SS Historic description
Under Linux,
.BR fork (2)
is implemented using copy-on-write pages, so the only penalty incurred by
was tricky: for example, not modifying data
in the parent process depended on knowing which variables were
held in a register.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD; POSIX.1-2001 (but marked OBSOLETE).
POSIX.1-2008 removes the specification of
.BR vfork ().
.\" http://stackoverflow.com/questions/4259629/what-is-the-difference-between-fork-and-vfork
.\" http://developers.sun.com/solaris/articles/subprocess/subprocess.html
.\" http://mailman.uclinux.org/pipermail/uclinux-dev/2009-April/000684.html
-.SS Linux Notes
+.SS Linux notes
Fork handlers established using
.BR pthread_atfork (3)
are not called when a multithreaded program employing
specified as:
CLONE_VM | CLONE_VFORK | SIGCHLD
-
.SS History
The
.BR vfork ()
In 4.4BSD it was made synonymous to
.BR fork (2)
but NetBSD introduced it again,
-cf. http://www.netbsd.org/Documentation/kernel/vfork.html .
+cf.
+.UR http://www.netbsd.org\:/Documentation\:/kernel\:/vfork.html
+.UE .
In Linux, it has been equivalent to
.BR fork (2)
until 2.2.0-pre6 or so.
.\" cannot follow
.\" .BR vfork ()
.\" and requires a kernel patch.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR clone (2),
.BR execve (2),
.BR fork (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 1993 Rickard E. Faith (faith@cs.unc.edu)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
+.\"
.\" Modified, 27 May 2004, Michael Kerrisk <mtk.manpages@gmail.com>
.\" Added notes on capability requirements
.\"
.TH VHANGUP 2 2007-07-26 "Linux" "Linux Programmer's Manual"
.SH NAME
-vhangup \- virtually hangup the current tty
+vhangup \- virtually hangup the current terminal
.SH SYNOPSIS
.B #include <unistd.h>
.sp
.BR vhangup ()
simulates a hangup on the current terminal.
This call arranges for other
-users to have a \*(lqclean\*(rq tty at login time.
-.SH "RETURN VALUE"
+users to have a \*(lqclean\*(rq terminal at login time.
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
the
.B CAP_SYS_TTY_CONFIG
capability is required.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This call is Linux-specific, and should not be used in programs
intended to be portable.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR capabilities (7),
.BR init (8)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 1993 Rickard E. Faith (faith@cs.unc.edu)
.\" Copyright 1997 Andries E. Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH VM86 2 2009-02-20 "Linux" "Linux Programmer's Manual"
.SH NAME
.BR dosemu .
.PP
VM86 mode is an emulation of real mode within a protected mode task.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.TP
.B EFAULT
This return value is specific to i386 and indicates a problem with getting
-userspace data.
+user-space data.
.TP
.B ENOSYS
This return value indicates the call is not implemented on the present
Saved kernel stack exists.
(This is a kernel sanity check; the saved
stack should only exist within vm86 mode itself.)
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This call is specific to Linux on 32-bit Intel processors,
and should not be used in programs intended to be portable.
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 2006 Jens Axboe
.\" and Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH VMSPLICE 2 2012-05-04 "Linux" "Linux Programmer's Manual"
.SH NAME
.BR vmsplice ()
system call first appeared in Linux 2.6.17;
library support was added to glibc in version 2.5.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This system call is Linux-specific.
.SH NOTES
.BR vmsplice ()
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1993 by Thomas Koenig <ig25@rz.uni-karlsruhe.de>
.\" and Copyright (c) 2004 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
.\"
.\" Modified Sat Jul 24 13:30:06 1993 by Rik Faith <faith@cs.unc.edu>
.\" Modified Sun Aug 21 17:42:42 1994 by Rik Faith <faith@cs.unc.edu>
.\" 2005-05-10, mtk, __W* flags can't be used with waitid()
.\" 2008-07-04, mtk, removed erroneous text about SA_NOCLDSTOP
.\"
-.TH WAIT 2 2010-09-26 "Linux" "Linux Programmer's Manual"
+.TH WAIT 2 2012-12-21 "Linux" "Linux Programmer's Manual"
.SH NAME
wait, waitpid, waitid \- wait for process to change state
.SH SYNOPSIS
and which has not yet been waited upon by one of these system
calls is termed
.IR waitable .
-.SS "wait() and waitpid()"
+.SS wait() and waitpid()
The
.BR wait ()
system call suspends execution of the calling process until one of its
(since Linux 2.6.10)
returns true if the child process was resumed by delivery of
.BR SIGCONT .
-.SS "waitid()"
+.SS waitid()
The
.BR waitid ()
system call (available since Linux 2.6.9) provides more precise
.I si_pid
field before the call and check for a nonzero value in this field
after the call returns.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR wait ():
on success, returns the process ID of the terminated child;
on error, \-1 is returned.
The
.I options
argument was invalid.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
.SH NOTES
A child that terminates, but has not been waited for becomes a "zombie".
.B SIGCHLD
were not being ignored, that is, the call blocks until the next child
terminates and then returns the process ID and status of that child.
-.SS Linux Notes
+.SS Linux notes
In the Linux kernel, a kernel-scheduled thread is not a distinct
construct from a process.
Instead, a thread is simply a process
Do not wait for children of other threads in
the same thread group.
This was the default before Linux 2.4.
+.SH BUGS
+According to POSIX.1-2008, an application calling
+.BR waitid ()
+must ensure that
+.I infop
+points to a
+.I siginfo_t
+structure (i.e., that it is a non-NULL pointer).
+On Linux, if
+.I infop
+is NULL,
+.BR waitid ()
+succeeds, and returns the process ID of the waited-for child.
+Applications should avoid relying on this inconsistent,
+nonstandard, and unnecessary feature.
.SH EXAMPLE
.\" fork.2 refers to this example program.
The following program demonstrates the use of
}
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR _exit (2),
.BR clone (2),
.BR fork (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1993 by Thomas Koenig (ig25@rz.uni-karlsruhe.de)
.\" and Copyright (c) 2004 by Michael Kerrisk (mtk.manpages@gmail.com)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
.\"
.\" Modified Sat Jul 24 13:32:44 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified Mon Jun 23 14:09:52 1997 by aeb - add EINTR.
.\" Rewrote much of this page, and removed much duplicated text,
.\" replacing with pointers to wait.2
.\"
-.TH WAIT4 2 2010-09-20 "Linux" "Linux Programmer's Manual"
+.TH WAIT4 2 2012-09-23 "Linux" "Linux Programmer's Manual"
.SH NAME
wait3, wait4 \- wait for process to change state, BSD style
.SH SYNOPSIS
.RE
.ad
.SH DESCRIPTION
+These functions are obsolete; use
+.BR waitpid (2)
+or
+.BR waitid (2)
+in new programs.
+
The
.BR wait3 ()
and
See
.BR getrusage (2)
for details.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
As for
.BR waitpid (2).
.SH ERRORS
As for
.BR waitpid (2).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD.
+
+SUSv1 included a specification of
+.BR wait3 ();
+SUSv2 included
+.BR wait3 (),
+but marked it LEGACY;
+SUSv3 removed it.
.SH NOTES
Including
.I <sys/time.h>
is a library function implemented on top of the
.BR wait4 ()
system call.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fork (2),
.BR getrusage (2),
.BR sigaction (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 1992 Drew Eckhardt;
.\" 1993 Michael Haardt, Ian Jackson.
.\" and Copyright (C) 2007 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified Sat Jul 24 13:35:59 1993 by Rik Faith <faith@cs.unc.edu>
.\" Modified Sun Nov 28 17:19:01 1993 by Rik Faith <faith@cs.unc.edu>
.\" gave some examples of why this might occur.
.\" Noted what happens if write() is interrupted by a signal.
.\"
-.TH WRITE 2 2010-08-29 "Linux" "Linux Programmer's Manual"
+.TH WRITE 2 2013-01-27 "Linux" "Linux Programmer's Manual"
.SH NAME
write \- write to a file descriptor
.SH SYNOPSIS
.BR write ()
has returned returns the new data.
Note that not all file systems are POSIX conforming.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, the number of bytes written is returned (zero indicates
nothing was written).
On error, \-1 is returned, and \fIerrno\fP is set
refers to a datagram socket for which a peer address has not been set using
.BR connect (2).
.TP
+.B EDQUOT
+The user's quota of disk blocks on the file system containing the file
+referred to by
+.I fd
+has been exhausted.
+.TP
.B EFAULT
.I buf
is outside your accessible address space.
.PP
Other errors may occur, depending on the object connected to
.IR fd .
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
.\" SVr4 documents additional error
.\" conditions EDEADLK, ENOLCK, ENOLNK, ENOSR, ENXIO, or ERANGE.
.BR EINTR ;
if it is interrupted after at least one byte has been written,
the call succeeds, and returns the number of bytes written.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR close (2),
.BR fcntl (2),
.BR fsync (2),
.\" and Copyright (C) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH CPU_SET 3 2012-03-15 "Linux" "Linux Programmer's Manual"
.SH NAME
but operate on the dynamically allocated CPU set(s) whose size is
.I setsize
bytes.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR CPU_ISSET ()
and
.BR CPU_ISSET_S ()
and
.BR CPU_EQUAL_S ()
first appeared in glibc 2.7.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These interfaces are Linux-specific.
.SH NOTES
To duplicate a CPU set, use
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sched_setaffinity (2),
.BR pthread_attr_setaffinity_np (3),
.BR pthread_setaffinity_np (3),
.\" Copyright 2004 Andries Brouwer <aeb@cwi.nl>.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH INFINITY 3 2007-07-26 "" "Linux Programmer's Manual"
.SH NAME
expand to constants of types \fIdouble\fP, \fIfloat\fP
and \fIlong double\fP, respectively,
that represent a large positive value, possibly plus infinity.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH AVAILABILITY
On a glibc system, the macro
.B __STDC_VERSION__
is defined
and has a value not less than 199901L.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fpclassify (3),
.BR math_error (7)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
the maximum number of bytes needed to represent a single
wide character in the current locale.
It is locale dependent and therefore not a compile-time constant.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
An integer in the range [1,
.BR MB_LEN_MAX ].
The value 1 denotes traditional 8-bit encoded characters.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR MB_LEN_MAX (3),
.BR mblen (3),
.BR mbstowcs (3),
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.B MB_LEN_MAX
macro is the upper bound for the number of bytes needed to represent a single
wide character, across all locales.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
A constant integer greater than zero.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
.SH NOTES
The entities
is typically 6 while
.I sizeof(wchar_t)
is 4.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR MB_CUR_MAX (3)
--- /dev/null
+.so man3/malloc_hook.3
--- /dev/null
+.so man3/malloc_hook.3
--- /dev/null
+.so man3/malloc_hook.3
--- /dev/null
+.so man3/malloc_hook.3
--- /dev/null
+.so man3/malloc_hook.3
.\" Written Sat Mar 8 10:35:08 MEZ 1997 by
.\" J. "MUFTI" Scheurich (mufti@csv.ica.uni-stuttgart.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" This page is licensed under the GNU General Public License
+.\" %%%LICENSE_END
.\"
-.TH __SETFPUCW 3 1997-03-08 "Linux" "Linux Programmer's Manual"
+.TH __SETFPUCW 3 2012-12-31 "Linux" "Linux Programmer's Manual"
.SH NAME
__setfpucw \- set FPU control word on i386 architecture (obsolete)
.SH SYNOPSIS
There are new functions from C99, with prototypes in
.IR <fenv.h> ,
to control FPU rounding modes, like
-.IR fegetround ,
-.IR fesetround ,
+.BR fegetround (3),
+.BR fesetround (3),
and the floating-point environment, like
-.IR fegetenv ,
-.IR feholdexcept ,
-.IR fesetenv ,
-.I feupdateenv
+.BR fegetenv (3),
+.BR feholdexcept (3),
+.BR fesetenv (3),
+.BR feupdateenv (3),
and FPU exception handling, like
-.IR feclearexcept ,
-.IR fegetexceptflag ,
-.IR feraiseexcept ,
-.IR fesetexceptflag ,
-.IR fetestexcept .
+.BR feclearexcept (3),
+.BR fegetexceptflag (3),
+.BR feraiseexcept (3),
+.BR fesetexceptflag (3),
+and
+.BR fetestexcept (3).
.PP
If direct access to the FPU control word is still needed, the
.B _FPU_GETCW
\- rounding to nearest
.br
\- exceptions on overflow, zero divide and NaN
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR feclearexcept (3)
.br
.I <fpu_control.h>
.\" Copyright 2002 walter harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.\" Corrected, aeb, 2002-05-30
.\"
.fi
.RE
So 123 = 59*64^0 + 1*64^1 = "v/".
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
The value returned by
.LP
This is not the encoding used by
.BR uuencode (1).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR uuencode (1),
.\" .BR itoa (3),
.BR strtoul (3)
.\" Copyright 2007 (C) Michael Kerrisk <mtk.manpages@gmail.com>
.\" some parts Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
It does this by restoring the default disposition for
.B SIGABRT
and then raising the signal for a second time.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR abort ()
function never returns.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001, 4.3BSD, C89, C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR gdb (1),
.BR sigaction (2),
.BR exit (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.BR imaxabs ()
functions compute the absolute value of the argument \fIj\fP of the
appropriate integer type for the function.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
Returns the absolute value of the integer argument, of the appropriate
integer type for the function.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001, 4.3BSD, C99.
.\" POSIX.1 (1996 edition) only requires the
.\" .BR abs ()
and
.BR imaxabs ()
as built-ins.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cabs (3),
.BR ceil (3),
.BR fabs (3),
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.BR acos ()
function calculates the arc cosine of \fIx\fP; that is
the value whose cosine is \fIx\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these functions return the arc cosine of
.IR x
in radians; the return value is in the range [0,\ pi].
An invalid floating-point exception
.RB ( FE_INVALID )
is raised.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
also conforms to
SVr4, 4.3BSD, C89.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR asin (3),
.BR atan (3),
.BR atan2 (3),
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.BR acosh ()
function calculates the inverse hyperbolic cosine of
\fIx\fP; that is the value whose hyperbolic cosine is \fIx\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these functions return the inverse hyperbolic cosine of
.IR x .
An invalid floating-point exception
.RB ( FE_INVALID )
is raised.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
also conforms to
SVr4, 4.3BSD, C89.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR asinh (3),
.BR atanh (3),
.BR cacosh (3),
.\" Copyright 2002 walter harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\" adapted glibc info page
.\"
.\" polished a little, aeb
It is not possible to overwrite or remove one of the default
severity classes.
The severity value must be nonnegative.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
Upon success, the value
.B MM_OK
is returned.
.SH VERSIONS
.BR addseverity ()
is provided in glibc since version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This function is not specified in the X/Open Portability Guide
although the
.BR fmtmsg (3)
.SH NOTES
New severity classes can also be added by setting the environment variable
.BR SEV_LEVEL .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fmtmsg (3)
.\" Copyright (c) 2006 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH ADJTIME 3 2008-06-22 "Linux" "Linux Programmer's Manual"
.SH NAME
is not NULL, then the buffer that it points to is used to return
the amount of time remaining from any previous adjustment that
has not yet been completed.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR adjtime ()
returns 0. On failure, \-1 is returned, and
.\" Thanks to the new adjtimex() ADJ_OFFSET_SS_READ flag
on systems with glibc 2.8 or later and
Linux kernel 2.6.26 or later.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR adjtimex (2),
.BR gettimeofday (2),
.BR time (7)
.\" Copyright (c) 2003 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.TH AIO_CANCEL 3 2012-05-08 "" "Linux Programmer's Manual"
.SH NAME
.LP
Which operations are cancelable is implementation-defined.
.\" FreeBSD: not those on raw disk devices.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR aio_cancel ()
function returns one of the following values:
is not a valid file descriptor.
.TP
.B ENOSYS
-.BR aio_cancel()
+.BR aio_cancel ()
is not implemented.
.SH VERSIONS
The
.BR aio_cancel ()
function is available since glibc 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001, POSIX.1-2008.
.SH EXAMPLE
See
.BR aio (7).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR aio_error (3),
.BR aio_fsync (3),
.BR aio_read (3),
.\" Copyright (c) 2003 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.TH AIO_ERROR 3 2012-05-08 "" "Linux Programmer's Manual"
.SH NAME
for a description of the
.I aiocb
structure.)
-.SH "RETURN VALUE"
+.SH RETURN VALUE
This function returns one of the following:
.IP * 3
.BR EINPROGRESS ,
The
.BR aio_error ()
function is available since glibc 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001, POSIX.1-2008.
.SH EXAMPLE
See
.BR aio (7).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR aio_cancel (3),
.BR aio_fsync (3),
.BR aio_read (3),
.\" Copyright (c) 2003 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.TH AIO_FSYNC 3 2012-05-08 "" "Linux Programmer's Manual"
.SH NAME
.BR sigevent (7)),
which indicates the desired type of asynchronous notification at completion.
All other fields are ignored.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success (the sync request was successfully queued)
this function returns 0.
On error \-1 is returned, and
The
.BR aio_fsync ()
function is available since glibc 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001, POSIX.1-2008.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR aio_cancel (3),
.BR aio_error (3),
.BR aio_read (3),
'\" t
.\" Copyright (c) 2010 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH AIO_INIT 3 2012-04-26 "Linux" "Linux Programmer's Manual"
.SH NAME
.\" Copyright (c) 2003 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.TH AIO_READ 3 2012-05-08 "" "Linux Programmer's Manual"
.SH NAME
is ignored.
.LP
No data is read from a regular file beyond its maximum offset.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, 0 is returned.
On error the request is not enqueued, \-1
is returned, and
The
.BR aio_read ()
function is available since glibc 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001, POSIX.1-2008.
.SH NOTES
It is a good idea to zero out the control block before use.
.SH EXAMPLE
See
.BR aio (7).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR aio_cancel (3),
.BR aio_error (3),
.BR aio_fsync (3),
.\" Copyright (c) 2003 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.TH AIO_RETURN 3 2012-05-08 "" "Linux Programmer's Manual"
.SH NAME
.BR aio_error (3)
returns something other than
.BR EINPROGRESS .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
If the asynchronous I/O operation has completed, this function returns
the value that would have been returned in case of a synchronous
.BR read (2),
The
.BR aio_return ()
function is available since glibc 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001, POSIX.1-2008.
.SH EXAMPLE
See
.BR aio (7).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR aio_cancel (3),
.BR aio_error (3),
.BR aio_fsync (3),
.\" Copyright (c) 2003 Andries Brouwer (aeb@cwi.nl)
.\" and Copyright (C) 2010 Michael kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.TH AIO_SUSPEND 3 2012-05-08 "" "Linux Programmer's Manual"
.SH NAME
is supported, this clock is used to measure
the timeout interval (see
.BR clock_gettime (3)).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
If this function returns after completion of one of the I/O
requests specified in
.IR aiocb_list ,
.BR signal (7).
.TP
.B ENOSYS
-.BR aio_suspend()
+.BR aio_suspend ()
is not implemented.
.SH VERSIONS
The
.BR aio_suspend ()
function is available since glibc 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001, POSIX.1-2008.
.SH NOTES
One can achieve polling by using a non-NULL
.I aiocb
structures pointed to by
.IR aiocb_list .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR aio_cancel (3),
.BR aio_error (3),
.BR aio_fsync (3),
.\" Copyright (c) 2003 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.TH AIO_WRITE 3 2012-05-08 "" "Linux Programmer's Manual"
.SH NAME
The
.BR aio_write ()
function queues the I/O request described by the buffer pointed to by
-.IR aiocb .
+.IR aiocbp .
This function is the asynchronous analog of
.BR write (2).
The arguments of the call
is ignored.
.LP
No data is written to a regular file beyond its maximum offset.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, 0 is returned.
On error the request is not enqueued, \-1
is returned, and
The
.BR aio_write ()
function is available since glibc 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001, POSIX.1-2008.
.SH NOTES
It is a good idea to zero out the control block before use.
Simultaneous I/O operations specifying the same
.I aiocb
structure produce undefined results.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR aio_cancel (3),
.BR aio_error (3),
.BR aio_fsync (3),
.\" Copyright (c) 1980, 1991 Regents of the University of California.
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)alloca.3 5.1 (Berkeley) 5/2/91
.\"
automatically freed when the function that called
.BR alloca ()
returns to its caller.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR alloca ()
function returns a pointer to the beginning of the allocated space.
If the allocation causes stack overflow, program behavior is undefined.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This function is not in POSIX.1-2001.
There is evidence that the
.BR free (3)
space allocated by
.BR alloca ()!
-.SS Notes on the GNU Version
+.SS Notes on the GNU version
Normally,
.BR gcc (1)
translates calls to
.BR alloca ()
would appear on the stack in the middle of the space for the
function arguments.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR brk (2),
.BR longjmp (3),
.BR malloc (3)
.\" Copyright 2002 walter harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
+.\"
.\" based on the description in glibc source and infopages
.\"
.\" Corrections and additions, aeb
It transforms the argz vector into a normal string by replacing
all null bytes (\(aq\\0\(aq) except the last by
.IR sep .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
All argz functions that do memory allocation have a return type of
\fIerror_t\fP, and return 0 for success, and \fBENOMEM\fP
if an allocation error occurs.
.SH BUGS
Argz vectors without a terminating null byte may lead to
Segmentation Faults.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR envz_add (3)
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.BR asin ()
function calculates the principal value of the arc sine of \fIx\fP;
that is the value whose sine is \fIx\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these functions return the principal value of the arc sine of
.IR x
in radians; the return value is in the range [\-pi/2,\ pi/2].
An invalid floating-point exception
.RB ( FE_INVALID )
is raised.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
also conforms to
SVr4, 4.3BSD, C89.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR acos (3),
.BR atan (3),
.BR atan2 (3),
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.BR asinh ()
function calculates the inverse hyperbolic sine of
\fIx\fP; that is the value whose hyperbolic sine is \fIx\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these functions return the inverse hyperbolic sine of
.IR x .
.\" glibc 2.8 does not do this.
.SH ERRORS
No errors occur.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
also conforms to
SVr4, 4.3BSD, C89.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR acosh (3),
.BR atanh (3),
.BR casinh (3),
.\" Copyright (C) 2001 Andries Brouwer <aeb@cwi.nl>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Text fragments inspired by Martin Schulze <joey@infodrom.org>.
.\"
This pointer should be passed to
.BR free (3)
to release the allocated storage when it is no longer needed.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
When successful, these functions return the number of bytes printed,
just like
.BR sprintf (3).
The FreeBSD implementation sets
.I strp
to NULL on error.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR free (3),
.BR malloc (3),
.BR printf (3)
.\" Copyright (c) 1993 by Thomas Koenig (ig25@rz.uni-karlsruhe.de)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
+.\"
.\" Modified Sat Jul 24 21:42:42 1993 by Rik Faith <faith@cs.unc.edu>
.\" Modified Tue Oct 22 23:44:11 1996 by Eric S. Raymond <esr@thyrsus.com>
.TH ASSERT 3 2002-08-25 "GNU" "Linux Programmer's Manual"
his program.
The message "assertion failed in file foo.c, function
do_bar(), line 1287" is of no help at all to a user.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
No value is returned.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001, C89, C99.
In C89,
.I expression
is defined.
This may create Heisenbugs which go away when debugging
is turned on.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR abort (3),
.BR assert_perror (3),
.BR exit (3)
.\" Copyright (C) 2002 Andries Brouwer <aeb@cwi.nl>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" This replaces an earlier man page written by Walter Harms
.\" <walter.harms@informatik.uni-oldenburg.de>.
The message contains the filename, function name and
line number of the macro call, and the output of
.IR strerror(errnum) .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
No value is returned.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This is a GNU extension.
.SH BUGS
The purpose of the assert macros is to help the programmer find bugs in
is defined,
but by proper error handling code.
Never use this macro.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR abort (3),
.BR assert (3),
.BR exit (3),
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.BR atan ()
function calculates the principal value of the arc tangent of \fIx\fP;
that is the value whose tangent is \fIx\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these functions return the principal value of the arc tangent of
.IR x
in radians; the return value is in the range [\-pi/2,\ pi/2].
.\" glibc 2.8 does not do this.
.SH ERRORS
No errors occur.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
also conforms to
SVr4, 4.3BSD, C89.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR acos (3),
.BR asin (3),
.BR atan2 (3),
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.IR y/x ,
using the signs of the two arguments to determine
the quadrant of the result.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these functions return the principal value of the arc tangent of
.IR y/x
in radians; the return value is in the range [\-pi,\ pi].
No errors occur.
.\" POSIX.1 documents an optional underflow error
.\" glibc 2.8 does not do this.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
also conforms to
SVr4, 4.3BSD, C89.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR acos (3),
.BR asin (3),
.BR atan (3),
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.BR atanh ()
function calculates the inverse hyperbolic tangent of
\fIx\fP; that is the value whose hyperbolic tangent is \fIx\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these functions return the inverse hyperbolic tangent of
.IR x .
A divide-by-zero floating-point exception
.RB ( FE_DIVBYZERO )
is raised.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
instead of the POSIX-mandated
.BR ERANGE .
Since version 2.10, glibc does the right thing.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR acosh (3),
.BR asinh (3),
.BR catanh (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.BR exec (3)
functions,
all registrations are removed.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR atexit ()
function returns the value 0 if successful; otherwise
it returns a nonzero value.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, C89, C99, POSIX.1-2001.
.SH NOTES
Functions registered using
is used to terminate execution of one of the functions registered
.BR atexit ().
.\" In glibc, things seem to be handled okay
-.SS "Linux Notes"
+.SS Linux notes
Since glibc 2.2.3,
.BR atexit ()
(and
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR _exit (2),
.BR exit (3),
.BR on_exit (3)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.\" 386BSD man pages
.\" Modified Mon Mar 29 22:39:24 1993, David Metcalfe
.\" Modified Sat Jul 24 21:39:22 1993, Rik Faith (faith@cs.unc.edu)
-.TH ATOF 3 1993-03-29 "GNU" "Linux Programmer's Manual"
+.TH ATOF 3 2012-08-03 "GNU" "Linux Programmer's Manual"
.SH NAME
atof \- convert a string to a double
.SH SYNOPSIS
The behavior is the same as
.sp
.in +4n
-strtod(nptr, (char **) NULL);
+strtod(nptr, NULL);
.in
.sp
except that
.BR atof ()
does not detect errors.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The converted value.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001, 4.3BSD, C89, C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR atoi (3),
.BR atol (3),
.BR strtod (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.\" Modified Sat Jul 24 21:38:42 1993, Rik Faith (faith@cs.unc.edu)
.\" Modified Sun Dec 17 18:35:06 2000, Joseph S. Myers
.\"
-.TH ATOI 3 2010-09-20 "GNU" "Linux Programmer's Manual"
+.TH ATOI 3 2012-08-03 "GNU" "Linux Programmer's Manual"
.SH NAME
atoi, atol, atoll, atoq \- convert a string to an integer
.SH SYNOPSIS
The behavior is the same as
.sp
.in +4n
-strtol(nptr, (char **) NULL, 10);
+strtol(nptr, NULL, 10);
.in
.sp
except that
.BR atoq ()
is an obsolete name for
.BR atoll ().
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The converted value.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001, 4.3BSD, C99.
C89 and
POSIX.1-1996 include the functions
.BR atoll ()
function is present in glibc 2 since version 2.0.2, but
not in libc4 or libc5.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR atof (3),
.BR strtod (3),
.BR strtol (3),
.\" Copyright (C) 2007 Michael Kerrisk <mtk.manpages@gmail.com>
.\" drawing on material by Justin Pryzby <pryzbyj@justinpryzby.com>
.\"
+.\" %%%LICENSE_START(PERMISSIVE_MISC)
.\" Permission is hereby granted, free of charge, to any person obtaining
.\" a copy of this software and associated documentation files (the
.\" "Software"), to deal in the Software without restriction, including
.\" CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
.\" TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
.\" SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
+.\" %%%LICENSE_END
.\"
.\" References:
.\" glibc manual and source
does not call
.BR malloc (3),
and so can be employed in situations where the latter function might fail.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR backtrace ()
returns the number of addresses returned in
.IR buffer ,
.\" Copyright (c) 2000 by Michael Kerrisk (mtk.manpages@gmail.com)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
+.\"
.\" Created, 14 Dec 2000 by Michael Kerrisk
.\"
.TH BASENAME 3 2009-03-30 "GNU" "Linux Programmer's Manual"
"." "." "."
".." "." ".."
.fi
-.SH "RETURN VALUE"
+.SH RETURN VALUE
Both
.BR dirname ()
and
return pointers to null-terminated strings.
(Do not pass these pointers to
.BR free (3).)
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
There are two different versions of
printf("dirname=%s, basename=%s\\n", dname, bname);
.fi
.in
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR basename (1),
.BR dirname (1)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.BR bcmp ()
returns 0.
Otherwise it returns a nonzero result.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR bcmp ()
function returns 0 if the byte sequences are equal,
otherwise a nonzero result is returned.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD.
This function is deprecated (marked as LEGACY in POSIX.1-2001): use
.BR memcmp (3)
in new programs.
POSIX.1-2008 removes the specification of
.BR bcmp ().
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR memcmp (3),
.BR strcasecmp (3),
.BR strcmp (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
to
.IR dest .
The result is correct, even when both areas overlap.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
None.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD.
This function is deprecated (marked as LEGACY in POSIX.1-2001): use
.BR memcpy (3)
.BR memmove (3).
POSIX.1-2008 removes the specification of
.BR bcopy ().
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR memccpy (3),
.BR memcpy (3),
.BR memmove (3),
.\" Copyright (C) 2007, Michael Kerrisk <mtk.manpages@gmail.com>
.\" and Copyright (C) 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
+.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 2007-05-31, mtk: Rewrite and substantial additional text.
.\" 2008-12-03, mtk: Rewrote some pieces and fixed some errors
.I sin->sin_family
is not
.BR AF_INET .
-.SH "CONFORMING TO"
+.SH CONFORMING TO
Not in POSIX.1-2001.
Present on the BSDs, Solaris, and many other systems.
.SH NOTES
.\" Copyright (c) 2007 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH BSD_SIGNAL 3 2009-03-15 "" "Linux Programmer's Manual"
.SH NAME
A portable application cannot rely on
.BR signal (2)
to provide these guarantees.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR bsd_signal ()
function returns the previous value of the signal handler, or
.SH ERRORS
As for
.BR signal (2).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.2BSD, POSIX.1-2001.
POSIX.1-2008 removes the specification of
.BR bsd_signal (),
this type is only defined if the
.B _GNU_SOURCE
feature test macro is defined.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sigaction (2),
.BR signal (2),
.BR sysv_signal (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
less than, equal to, or greater than zero if the \fIkey\fP object is found,
respectively, to be less than, to match, or be greater than the array
member.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR bsearch ()
function returns a pointer to a matching member of the
array, or NULL if no match is found.
If there are multiple elements that
match the key, the element returned is unspecified.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001, C89, C99.
.SH EXAMPLE
The example below first sorts an array of structures using
}
.fi
.\" this example referred to in qsort.3
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR hsearch (3),
.BR lsearch (3),
.BR qsort (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.BR memset ()
instead.
.\" The old functions are not even available on some non-GNU/Linux systems.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR bcmp (3),
.BR bcopy (3),
.BR bzero (3),
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.BR btowc ()
function returns
.BR WEOF .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR btowc ()
function returns the wide character
or not a valid multibyte sequence of length 1,
it returns
.BR WEOF .
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
.SH NOTES
The behavior of
or the thread-safe
.BR mbrtowc (3)
instead.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mbrtowc (3),
.BR mbtowc (3),
.BR wctob (3)
.\" Copyright (c) 1990, 1993
.\" The Regents of the University of California. All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)btree.3 8.4 (Berkeley) 8/18/94
.\"
.BR dbopen (3).
.SH BUGS
Only big and little endian byte order is supported.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR dbopen (3),
.BR hash (3),
.BR mpool (3),
.BR recno (3)
-.sp
+
.IR "The Ubiquitous B-tree" ,
Douglas Comer, ACM Comput. Surv. 11, 2 (June 1979), 121-138.
-.sp
+
.IR "Prefix B-trees" ,
Bayer and Unterauer, ACM Transactions on Database Systems, Vol. 2, 1
(March 1977), 11-26.
-.sp
+
.IR "The Art of Computer Programming Vol. 3: Sorting and Searching" ,
D.E. Knuth, 1968, pp 471-480.
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
On the i386 the host byte order is Least Significant Byte first,
whereas the network byte order, as used on the Internet, is Most
Significant Byte first.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
Some systems require the inclusion of
.I <netinet/in.h>
instead of
.IR <arpa/inet.h> .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR endian (3),
.BR gethostbyname (3),
.BR getservent (3)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
bytes of the area starting at
.I s
to zero (bytes containing \(aq\\0\(aq).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
None.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD.
This function is deprecated (marked as LEGACY in POSIX.1-2001): use
.BR memset (3)
in new programs.
POSIX.1-2008 removes the specification of
.BR bzero ().
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR memset (3),
.BR swab (3)
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH CABS 3 2008-08-11 "" "Linux Programmer's Manual"
.SH NAME
The result is a real number.
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The function is actually an alias for
.I "hypot(a,\ b)"
(or, equivalently,
.IR "sqrt(a*a\ +\ b*b)" ).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR abs (3),
.BR cimag (3),
.BR hypot (3),
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
.\" and Copyright (C) 2011 Michael Kerrisk <mtk.manpages@gamil.com>
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH CACOS 3 2011-09-15 "" "Linux Programmer's Manual"
.SH NAME
.fi
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH EXAMPLE
.nf
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ccos (3),
.BR clog (3),
.BR complex (7)
.\" Copyright 2002 Walter Harms(walter.harms@informatik.uni-oldenburg.de)
.\" and Copyright (C) 2011 Michael Kerrisk <mtk.manpages@gamil.com>
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH CACOSH 3 2011-09-15 "" "Linux Programmer's Manual"
.SH NAME
.fi
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH EXAMPLE
.nf
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR acosh (3),
.BR cabs (3),
.BR ccosh (3),
-.\" Copyright 2005 walter harms (walter.harms@informatik.uni-oldenburg.de)
-.\" and Copyright 2005 Michael Kerrisk (mtk.manpages@gmail.com).
-.\" Distributed under the GNU General Public License.
+.\" Copyright 2013 Michael Kerrisk (mtk.manpages@gmail.com).
+.\" (Replaces an earlier page by Walter Harms and Michael Kerrisk)
.\"
-.TH CANONICALIZE_FILE_NAME 3 2005-07-14 "GNU" "Linux Programmer's Manual"
+.\" %%%LICENSE_START(VERBATIM)
+.\" Permission is granted to make and distribute verbatim copies of this
+.\" manual provided the copyright notice and this permission notice are
+.\" preserved on all copies.
+.\"
+.\" Permission is granted to copy and distribute modified versions of this
+.\" manual under the conditions for verbatim copying, provided that the
+.\" entire resulting derived work is distributed under the terms of a
+.\" permission notice identical to this one.
+.\"
+.\" Since the Linux kernel and libraries are constantly changing, this
+.\" manual page may be incorrect or out-of-date. The author(s) assume no
+.\" responsibility for errors or omissions, or for damages resulting from
+.\" the use of the information contained herein. The author(s) may not
+.\" have taken the same level of care in the production of this manual,
+.\" which is licensed free of charge, as they might when working
+.\" professionally.
+.\"
+.\" Formatted or processed versions of this manual, if unaccompanied by
+.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
+.\"
+.TH CANONICALIZE_FILE_NAME 3 2013-03-10 "GNU" "Linux Programmer's Manual"
.SH NAME
-canonicalize_file_name \- return the canonicalized filename
+canonicalize_file_name \- return the canonicalized absolute pathname
.SH SYNOPSIS
.BR "#define _GNU_SOURCE" " /* See feature_test_macros(7) */"
.br
.sp
.BI "char *canonicalize_file_name(const char *" path ");"
.SH DESCRIPTION
+The
+.BR canonicalize_file_name ()
+function returns a null-terminated string containing
+the canonicalized absolute pathname corresponding to
+.IR path .
+In the returned string, symbolic links are resolved, as are
+.I .
+and
+.I ..
+pathname components.
+Consecutive slash
+.RI ( / )
+characters are replaced by a single slash.
+
+The returned string is dynamically allocated by
+.BR canonicalize_file_name ()
+and the caller should deallocate it with
+.BR free (3)
+when it is no longer required.
+
The call
.I canonicalize_file_name(path)
-is equivalent to the call
-.IR "realpath(path,\ NULL)" .
-.SH "CONFORMING TO"
-The function is a GNU extension.
-.SH "SEE ALSO"
+is equivalent to the call:
+
+ realpath(path, NULL);
+.SH CONFORMING TO
+This function is a GNU extension.
+.SH RETURN VALUE
+On success,
+.BR canonicalize_file_name ()
+returns a null-terminated string.
+On error (e.g., a pathname component is unreadable or does not exist),
+.BR canonicalize_file_name ()
+returns NULL and sets
+.I errno
+to indicate the error.
+.SH ERRORS
+See
+.BR realpath (3).
+.SH SEE ALSO
+.BR readlink (2),
.BR realpath (3)
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH CARG 3 2008-08-11 "" "Linux Programmer's Manual"
.SH NAME
tan(carg(z)) = cimag(z) / creal(z)
.fi
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The return value is the range of [\-pi,pi].
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cabs (3),
.BR complex (7)
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH CASIN 3 2008-08-11 "" "Linux Programmer's Manual"
.SH NAME
.fi
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR clog (3),
.BR csin (3),
.BR complex (7)
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH CASINH 3 2008-08-11 "" "Linux Programmer's Manual"
.SH NAME
.fi
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR asinh (3),
.BR cabs (3),
.BR cimag (3),
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
.\" and Copyright (C) 2011 Michael Kerrisk <mtk.manpages@gamil.com>
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH CATAN 3 2011-09-15 "" "Linux Programmer's Manual"
.SH NAME
.fi
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH EXAMPLE
.nf
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ccos (3),
.BR clog (3),
.BR ctan (3),
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
.\" and Copyright (C) 2011 Michael Kerrisk <mtk.manpages@gamil.com>
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH CATANH 3 2011-09-15 "" "Linux Programmer's Manual"
.SH NAME
.fi
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH EXAMPLE
.nf
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR atanh (3),
.BR cabs (3),
.BR cimag (3),
.\" Copyright 1993 Mitchum DSouza <m.dsouza@mrc-applied-psychology.cambridge.ac.uk>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Updated, aeb, 980809
.TH CATGETS 3 1998-08-09 "" "Linux Programmer's Manual"
.I catalog
is a catalog descriptor returned from an earlier call to
.BR catopen (3).
-The fourth argument
-.I message
+The fourth argument,
+.IR message ,
points to a default message string which will be returned by
.BR catgets ()
if the identified message catalog is not currently available.
the application if it is to be saved or modified.
The return string is
always terminated with a null byte.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.LP
On success,
.BR catgets ()
.BR catgets ()
returns the value
.IR message .
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
These functions are only available in libc.so.4.4.4c and above.
These two possible error returns seem to be discarded in SUSv2
in favor of always returning
.IR message .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR catopen (3),
.BR setlocale (3)
.\" Copyright 1993 Mitchum DSouza <m.dsouza@mrc-applied-psychology.cambridge.ac.uk>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified Thu Dec 13 22:51:19 2001 by Martin Schulze <joey@infodrom.org>
.\" Modified 2001-12-14 aeb
It invalidates any subsequent references to the message catalog
defined by
.IR catalog .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The function
.BR catopen ()
returns a message catalog descriptor of type
The language to use if
.I flag
is 0.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.\" In XPG 1987, Vol. 3 it says:
.\" .I "The flag argument of catopen is reserved for future use"
below.)
The default path varies, but usually looks at a number of places below
.IR /usr/share/locale .
-.SS Linux Notes
+.SS Linux notes
These functions are available for Linux since libc 4.4.4c.
In the case of linux libc4 and libc5, the catalog descriptor
.I nl_catd
.I /etc/locale
and
.IR /usr/lib/locale .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR catgets (3),
.BR setlocale (3)
.\" Copyright 1995 Jim Van Zandt <jrv@vanzandt.mv.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" changed `square root' into `cube root' - aeb, 950919
.\"
is returned.
.SH ERRORS
No errors occur.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
.\" .BR cbrt ()
.\" was a GNU extension. It is now a C99 requirement.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR pow (3),
.BR sqrt (3)
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH CCOS 3 2008-08-11 "" "Linux Programmer's Manual"
.SH NAME
.fi
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cabs (3),
.BR cacos (3),
.BR csin (3),
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH CCOSH 3 2008-08-11 "" "Linux Programmer's Manual"
.SH NAME
.fi
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cabs (3),
.BR cacosh (3),
.BR csinh (3),
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH CEIL 3 2010-09-20 "" "Linux Programmer's Manual"
.SH NAME
is 1.0, and
.IR ceil(\-0.5)
is 0.0.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
These functions return the ceiling of
.IR x .
.SH ERRORS
No errors occur.
POSIX.1-2001 documents a range error for overflows, but see NOTES.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
To avoid an overflow, which will produce undefined results,
an application should perform a range check on the returned value
before assigning it to an integer type.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR floor (3),
.BR lrint (3),
.BR nearbyint (3),
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH CERF 3 2010-09-12 "" "Linux Programmer's Manual"
.SH NAME
.BR cerfc ()
is defined as cerfc(z) = 1\-cerf(z).
.\" must check 1/sqrt(2*pi) ?
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The function names are reserved for future use in C99.
.SH AVAILABILITY
Not yet in glibc, as at version 2.12.
.\" But reserved in NAMESPACE.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR erf (3),
.BR complex (7)
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH CEXP 3 2008-08-11 "" "Linux Programmer's Manual"
.SH NAME
.fi
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cabs (3),
.BR cexp2 (3),
.BR clog (3),
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
-.TH CEXP2 3 2008-08-07 "" "Linux Programmer's Manual"
+.TH CEXP2 3 2013-02-27 "" "Linux Programmer's Manual"
.SH NAME
cexp2, cexp2f, cexp2l \- base-2 exponent of a complex number
.SH SYNOPSIS
.SH DESCRIPTION
The function returns 2 raised to the power of
.IR z .
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These function names are reserved for future use in C99.
.SH AVAILABILITY
-Not yet in glibc, as at version 2.8.
+Not yet in glibc, as at version 2.17.
.\" But reserved in NAMESPACE.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cabs (3),
.BR cexp (3),
.BR clog10 (3),
.\" Copyright (c) 2003 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.TH CFREE 3 2007-07-26 "" "Linux Programmer's Manual"
.SH NAME
Use
.BR free (3)
instead.
-.SS "1-arg cfree"
+.SS 1-arg cfree
In glibc, the function
.BR cfree ()
is a synonym for
.I <stdlib.h>
and sometimes in
.IR <malloc.h> .
-.SS "3-arg cfree"
+.SS 3-arg cfree
Some SCO and Solaris versions have malloc libraries with a 3-argument
.BR cfree (),
apparently as an analog to
to the iBCSe2 standard and simply calls free.
The num and size
arguments to cfree are not used."
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The SunOS version of
.BR cfree ()
(which is a synonym for
one of the routines in the
.BR malloc (3)
family.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The 3-argument version of
.BR cfree ()
as used by SCO conforms to the iBCSe2 standard:
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH CIMAG 3 2008-08-11 "" "Linux Programmer's Manual"
.SH NAME
.fi
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
gcc also supports __imag__.
That is a GNU extension.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cabs (3),
.BR creal (3),
.BR complex (7)
.\" Copyright 2001 John Levon <moz@compsoc.man.ac.uk>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Additions, aeb, 2001-10-17.
.TH CLEARENV 3 2010-10-04 "Linux" "Linux Programmer's Manual"
pairs and sets the value of the external variable
.I environ
to NULL.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR clearenv ()
function returns zero on success, and a nonzero
.SH VERSIONS
Not in libc4, libc5.
In glibc since glibc 2.0.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
Various UNIX variants (DG/UX, HP-UX, QNX, ...).
POSIX.9 (bindings for FORTRAN77).
POSIX.1-1996 did not accept
will return an error and the process environment will remain unchanged.
.\" .LP
.\" HP-UX has a ENOMEM error return.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getenv (3),
.BR putenv (3),
.BR setenv (3),
.\" Copyright (c) 1993 by Thomas Koenig (ig25@rz.uni-karlsruhe.de)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
+.\"
.\" Modified Sat Jul 24 21:27:01 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified 14 Jun 2002, Michael Kerrisk <mtk.manpages@gmail.com>
.\" Added notes on differences from other UNIX systems with respect to
.\" waited-for children.
.TH CLOCK 3 2008-08-28 "GNU" "Linux Programmer's Manual"
.SH NAME
-clock \- Determine processor time
+clock \- determine processor time
.SH SYNOPSIS
.nf
.B #include <time.h>
The
.BR clock ()
function returns an approximation of processor time used by the program.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The value returned is the CPU time used so far as a
.IR clock_t ;
to get the number of seconds used, divide by
If the processor time used is not available or its value cannot
be represented, the function returns the value
.IR (clock_t)\ \-1 .
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C89, C99, POSIX.1-2001.
POSIX requires that
.B CLOCKS_PER_SEC
.BR times (2)
function, which explicitly returns (separate) information about the
caller and its children, may be preferable.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR clock_gettime (2),
.BR getrusage (2),
.BR times (2)
.\" Copyright (c) 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH CLOCK_GETCPUCLOCKID 3 2010-09-10 "Linux" "Linux Programmer's Manual"
+.TH CLOCK_GETCPUCLOCKID 3 2012-10-29 "Linux" "Linux Programmer's Manual"
.SH NAME
clock_getcpuclockid \- obtain ID of a process CPU-time clock
.SH SYNOPSIS
.BI "int clock_getcpuclockid(pid_t " pid ", clockid_t *" clock_id );
.fi
.sp
-Link with \fI\-lrt\fP.
+Link with \fI\-lrt\fP (only for glibc versions before 2.17).
.sp
.ad l
.in -4n
.I pid
is zero, then the clock ID of the CPU-time clock
of the calling process is returned.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR clock_getcpuclockid ()
returns 0;
struct timespec ts;
if (argc != 2) {
- fprintf(stderr, "%s <process-ID>\\n", argv[0]);
+ fprintf(stderr, "%s <process\-ID>\\n", argv[0]);
exit(EXIT_FAILURE);
}
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH CLOG 3 2008-08-11 "" "Linux Programmer's Manual"
.SH NAME
close to zero will cause an overflow.
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cabs (3),
.BR cexp (3),
.BR clog10 (3),
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH CLOG10 3 2008-08-11 "" "Linux Programmer's Manual"
.SH NAME
close to zero will cause an overflow.
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This function is a GNU extension.
It is reserved for future use in C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cabs (3),
.BR cexp (3),
.BR clog (3),
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH CLOG2 3 2008-08-07 "" "Linux Programmer's Manual"
.SH NAME
Note that
.I z
close to zero will cause an overflow.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These function names are reserved for future use in C99.
.SH AVAILABILITY
Not yet in glibc, as at version 2.8.
.\" But reserved in NAMESPACE.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cabs (3),
.BR cexp (3),
.BR clog (3),
.\" Copyright (C) 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.IR dirp .
The directory stream descriptor \fIdirp\fP is not available
after this call.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR closedir ()
function returns 0 on success.
.TP
.B EBADF
Invalid directory stream descriptor \fIdirp\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001, 4.3BSD.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR close (2),
.BR opendir (3),
.BR readdir (3),
.\" This man page is Copyright (C) 1999 Andi Kleen <ak@muc.de>.
+.\"
+.\" %%%LICENSE_START(VERBATIM_ONE_PARA)
.\" Permission is granted to distribute possibly modified copies
.\" of this page provided the header is included verbatim,
.\" and in case of nontrivial modification author and date
.\" of the modification is added to the header.
+.\" %%%LICENSE_END
+.\"
.\" $Id: cmsg.3,v 1.8 2000/12/20 18:10:31 ak Exp $
.TH CMSG 3 2008-11-20 "Linux" "Linux Programmer's Manual"
.SH NAME
-CMSG_ALIGN, CMSG_SPACE, CMSG_NXTHDR, CMSG_FIRSTHDR \- Access ancillary data
+CMSG_ALIGN, CMSG_SPACE, CMSG_NXTHDR, CMSG_FIRSTHDR \- access ancillary data
.SH SYNOPSIS
.B #include <sys/socket.h>
.sp
.I msg_flags
member of the
.IR msghdr .
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This ancillary data model conforms to the POSIX.1g draft, 4.4BSD-Lite,
the IPv6 advanced API described in RFC\ 2292 and the SUSv2.
.BR CMSG_ALIGN ()
msg.msg_controllen = cmsg\->cmsg_len;
.fi
.in
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR recvmsg (2),
.BR sendmsg (2)
.PP
.\" Copyright (c) 1993 by Thomas Koenig (ig25@rz.uni-karlsruhe.de)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
+.\"
.\" Modified Sat Jul 24 19:53:02 1993 by Rik Faith (faith@cs.unc.edu)
.\" FIXME Many more values for 'name' are supported, some of which
.\" are documented under 'info confstr'.
is NULL,
.BR confstr ()
just returns the value as defined below.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
If
.I name
is a valid configuration variable,
If the value of
.I name
is invalid.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH EXAMPLE
The following code fragment determines the path where to find
char *pathbuf;
size_t n;
-n = confstr(_CS_PATH,NULL,(size_t) 0);
+n = confstr(_CS_PATH, NULL, (size_t) 0);
pathbuf = malloc(n);
if (pathbuf == NULL)
abort();
confstr(_CS_PATH, pathbuf, n);
.in
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sh (1),
.BR exec (3),
.BR system (3)
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH CONJ 3 2008-08-11 "" "Linux Programmer's Manual"
.SH NAME
.fi
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cabs (3),
.BR csqrt (3),
.BR complex (7)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
a NaN with the sign bit of \fIy\fP is returned.
.SH ERRORS
No errors occur.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
.\" 4.3BSD.
This function is defined in IEC 559 (and the appendix with
the
.BR copysign ()
functions may treat a negative zero as positive.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR signbit (3)
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
An invalid floating-point exception
.RB ( FE_INVALID )
is raised.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
to
.B EDOM
when a domain error occurred.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR acos (3),
.BR asin (3),
.BR atan (3),
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
cosh(x) = (exp(x) + exp(\-x)) / 2
.fi
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these functions return the hyperbolic cosine of
.IR x .
An overflow floating-point exception
.RB ( FE_OVERFLOW )
is raised.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
an overflow floating-point
.RB ( FE_OVERFLOW )
exception is not raised when an overflow occurs.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR acosh (3),
.BR asinh (3),
.BR atanh (3),
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH CPOW 3 2008-08-11 "" "Linux Programmer's Manual"
.SH NAME
along the negative real axis.)
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cabs (3),
.BR pow (3),
.BR complex (7)
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH CPROJ 3 2010-06-10 "" "Linux Programmer's Manual"
.SH NAME
namely to positive infinity on the real axis.
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
In glibc 2.11 and earlier, the implementation does something different
(a \fIstereographic\fP projection onto a Riemann Sphere).
.\" http://sources.redhat.com/bugzilla/show_bug.cgi?id=10401
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cabs (3),
.BR complex (7)
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH CREAL 3 2008-08-11 "" "Linux Programmer's Manual"
.SH NAME
.fi
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The gcc supports also __real__.
That is a GNU extension.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cabs (3),
.BR cimag (3),
.BR complex (7)
.\" Michael Haardt (michael@cantor.informatik.rwth.aachen.de)
.\" Sat Sep 3 22:00:30 MET DST 1994
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Sun Feb 19 21:32:25 1995, faith@cs.unc.edu edited details away
.\"
.I data->initialized
to zero before the first call to
.BR crypt_r ().
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, a pointer to the encrypted password is returned.
On error, NULL is returned.
.SH ERRORS
.\" .PP
.\" Making encrypted data computed using crypt() publicly available has
.\" to be considered insecure for the given reasons.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR crypt ():
SVr4, 4.3BSD, POSIX.1-2001.
.BR crypt_r ()
is a GNU extension.
.SH NOTES
-.SS Glibc Notes
+.SS Glibc notes
The glibc2 version of this function supports additional
encryption algorithms.
.I key
is significant (instead of only the first
8 bytes in DES).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR login (1),
.BR passwd (1),
.BR encrypt (3),
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH CSIN 3 2008-08-11 "" "Linux Programmer's Manual"
.SH NAME
.fi
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cabs (3),
.BR casin (3),
.BR ccos (3),
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH CSINH 3 2008-08-11 "" "Linux Programmer's Manual"
.SH NAME
.fi
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cabs (3),
.BR casinh (3),
.BR ccosh (3),
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH CSQRT 3 2008-08-11 "" "Linux Programmer's Manual"
.SH NAME
real number.)
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cabs (3),
.BR cexp (3),
.BR complex (7)
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH CTAN 3 2008-08-11 "" "Linux Programmer's Manual"
.SH NAME
.fi
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cabs (3),
.BR catan (3),
.BR ccos (3),
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH CTANH 3 2008-08-11 "" "Linux Programmer's Manual"
.SH NAME
.fi
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cabs (3),
.BR catanh (3),
.BR ccosh (3),
.\" Copyright (c) 1993 by Thomas Koenig (ig25@rz.uni-karlsruhe.de)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
+.\"
.\" Modified Sat Jul 24 19:51:06 1993 by Rik Faith (faith@cs.unc.edu)
.TH CTERMID 3 2007-07-26 "GNU" "Linux Programmer's Manual"
.SH NAME
The symbolic constant
.B L_ctermid
is the maximum number of characters in the returned pathname.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The pointer to the pathname.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
Svr4, POSIX.1-2001.
.SH BUGS
The path returned may not uniquely identify the controlling
It is not assured that the program can open the terminal.
.\" in glibc 2.3.x, x >= 4, the glibc headers threw an error
.\" if ctermid() was given an argument; fixed in 2.4.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ttyname (3)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.I (time_t)\ \-1
and does not alter the
members of the broken-down time structure.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
Each of these functions returns the value described, or NULL
(\-1 in case of
.BR mktime ())
in case an error was detected.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
C89 and C99 specify
.BR asctime (),
.BR tzset (3)
should be called before
.BR localtime_r ().
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR date (1),
.BR gettimeofday (2),
.BR time (2),
.\" Copyright (c) 1993
.\" The Regents of the University of California. All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)daemon.3 8.1 (Berkeley) 6/9/93
.\" Added mentioning of glibc weirdness wrt unistd.h. 5/11/98, Al Viro
redirects standard input, standard output and standard error
to \fI/dev/null\fP;
otherwise, no changes are made to these file descriptors.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
(This function forks, and if the
.BR fork (2)
succeeds, the parent calls
In this case
.I errno
need not be set.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fork (2),
.BR setsid (2)
.\" Copyright (c) 1990, 1993
.\" The Regents of the University of California. All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)dbopen.3 8.5 (Berkeley) 1/2/94
.\"
routines return \-1 on error (setting
.IR errno )
and 0 on success.
-.SS "Key/Data Pairs"
+.SS Key/data pairs
Access to all file types is based on key/data pairs.
Both keys and data are represented by the following data structure:
.in +4n
.PP
None of the access methods provide any form of concurrent access,
locking, or transactions.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR btree (3),
.BR hash (3),
.BR mpool (3),
.BR recno (3)
-.sp
+
.IR "LIBTP: Portable, Modular Transactions for UNIX" ,
Margo Seltzer, Michael Olson, USENIX proceedings, Winter 1992.
.\" Copyright Sun Microsystems, Inc (and is provided for unrestricted use,
.\" see other Sun RPC sources).
.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
+.\" can be distributed under GPL.
+.\" %%%LICENSE_END
+.\"
.TH DES_CRYPT 3 2007-05-18 "" "Linux Programmer's Manual"
.SH NAME
des_crypt, ecb_crypt, cbc_crypt, des_setparity, DES_FAILED \- fast
.SH VERSIONS
These routines are present in libc 4.6.27 and later, and in
glibc 2.1 and later.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD.
Not in POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR des (1),
.BR crypt (3),
.BR xcrypt (3)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.\" Lewine's _POSIX Programmer's Guide_ (O'Reilly & Associates, 1991)
.\" 386BSD man pages
.\" Modified Sat Jul 24 19:48:17 1993 by Rik Faith (faith@cs.unc.edu)
-.TH DIFFTIME 3 2010-02-25 "GNU" "Linux Programmer's Manual"
+.TH DIFFTIME 3 2012-12-22 "GNU" "Linux Programmer's Manual"
.SH NAME
difftime \- calculate time difference
.SH SYNOPSIS
Each of the times is specified in calendar time, which means its
value is a measurement (in seconds) relative to the
Epoch, 1970-01-01 00:00:00 +0000 (UTC).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, C89, C99.
.SH NOTES
On a POSIX system,
.fi
.RE
when the possible overflow in the subtraction is not a concern.
-On other systems, the data type
-.I time_t
-might use some other encoding
-where subtraction doesn't work directly.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR date (1),
.BR gettimeofday (2),
.BR time (2),
.\" Copyright (C) 2002 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH DIRFD 3 2010-09-26 "Linux" "Linux Programmer's Manual"
.SH NAME
.B ENOTSUP
The implementation does not support the association of a file
descriptor with a directory.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
This function was a BSD extension, present in 4.3BSD-Reno, not in 4.2BSD.
.\" It is present in libc5 (since 5.1.2) and in glibc2.
or
.B _SVID_SOURCE
is defined.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR open (2),
.BR closedir (3),
.BR opendir (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
returning the result in a structure
of the indicated name, in all cases with fields \fIquot\fP and \fIrem\fP
of the same type as the function arguments.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The \fIdiv_t\fP (etc.) structure.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, C89. C99.
The functions
.BR lldiv ()
.fi
the values \fIq.quot\fP and \fIq.rem\fP are \-1 and \-2, respectively.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR abs (3),
.BR remainder (3)
.\" Copyright (c) 2003 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
.\"
.TH DL_ITERATE_PHDR 3 2007-05-18 "GNU" "Linux Programmer's Manual"
.SH NAME
.SH VERSIONS
.BR dl_iterate_phdr ()
has been supported in glibc since version 2.2.4.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The
.BR dl_iterate_phdr ()
function is Linux-specific and should be avoided in portable applications.
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ldd (1),
.BR objdump (1),
.BR readelf (1),
.BR dlopen (3),
.BR elf (5),
-.BR ld.so (8),
-and the
-.I "Executable and Linking Format Specification"
+.BR ld.so (8)
+
+.IR "Executable and Linking Format Specification" ,
available at various locations online.
-.\" -*- nroff -*-
.\" Copyright 1995 Yggdrasil Computing, Incorporated.
.\" written by Adam J. Richter (adam@yggdrasil.com),
.\" with typesetting help from Daniel Quinlan (quinlan@yggdrasil.com).
.\" and Copyright 2003 Michael Kerrisk (mtk.manpages@gmail.com).
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified by David A. Wheeler <dwheeler@dwheeler.com> 2000-11-28.
.\" Applied patch by Terran Melconian, aeb, 2001-12-14.
.BR dlclose (),
.BR dlerror ()
implement the interface to the dynamic linking loader.
-.SS "dlerror()"
+.SS dlerror()
The function
.BR dlerror ()
returns a human readable string describing the most recent error
.BR dlerror ().
It returns NULL if no errors have occurred since initialization or since
it was last called.
-.SS "dlopen()"
+.SS dlopen()
The function
.BR dlopen ()
loads the dynamic library file named by the null-terminated
If
.BR dlopen ()
fails for any reason, it returns NULL.
-.SS "dlsym()"
+.SS dlsym()
The function
.BR dlsym ()
takes a "handle" of a dynamic library returned by
after the current library.
This allows one to provide a wrapper
around a function in another shared library.
-.SS "dlclose()"
+.SS dlclose()
The function
.BR dlclose ()
decrements the reference count on the dynamic library handle
The function
.BR dlclose ()
returns 0 on success, and nonzero on error.
-.SS "The obsolete symbols _init() and _fini()"
+.SS The obsolete symbols _init() and _fini()
The linker recognizes special symbols
.B _init
and
does the same as
.BR dlsym ()
but takes a version string as an additional argument.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001 describes
.BR dlclose (),
.BR dlerror (),
.LP
gcc \-shared \-nostartfiles \-o bar bar.c
.in
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ld (1),
.BR ldd (1),
.BR dl_iterate_phdr (3),
.BR rtld-audit (7),
.BR ld.so (8),
-.BR ldconfig (8),
+.BR ldconfig (8)
+
ld.so info pages, gcc info pages, ld info pages
.\" Copyright (C) 2001 Andries Brouwer <aeb@cwi.nl>
+.\" Text fragments inspired by Martin Schulze <joey@infodrom.org>.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\"
-.\" Text fragments inspired by Martin Schulze <joey@infodrom.org>.
+.\" %%%LICENSE_END
.\"
.TH DPRINTF 3 2010-09-15 "GNU" "Linux Programmer's Manual"
.SH NAME
instead of to a
.I stdio
stream.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are GNU extensions that are nowadays specified in
POSIX.1-2008.
.\" .SH NOTES
.\"
.\" A better name would have been
.\" .BR fdprintf ().
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR printf (3)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
or
.BR seed48 ()
will restore the standard values of \fIa\fP and \fIc\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001.
.SH NOTES
These functions are declared obsolete by SVID 3, which states that
.BR rand (3)
should be used instead.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR rand (3),
.BR random (3)
.\" Copyright 2003 Walter Harms, 2004 Andries Brouwer <aeb@cwi.nl>.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Created 2004-10-31. Text taken from a page by Walter Harms, 2003-09-08
.\"
.BR seed48_r (),
or
.BR lcong48_r ().
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The return value is 0.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are GNU extensions and are not portable.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR drand48 (3),
.BR rand (3),
.BR random (3)
.\" Copyright 2001 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" aeb: some corrections
.TH DYSIZE 3 2010-09-22 "GNU" "Linux Programmer's Manual"
.I __isleap(year)
also found in
.IR <time.h> .
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This function occurs in SunOS 4.x.
.SH NOTES
This is a compatibility function only.
Don't use it in new programs.
.\" The SCO version of this function had a year-2000 problem.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR strftime (3)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.BR ecvt (),
except that
\fIndigits\fP specifies the number of digits after the decimal point.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
Both the
.BR ecvt ()
and
.BR ecvt ()
or
.BR fcvt ().
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr2;
marked as LEGACY in POSIX.1-2001.
POSIX.1-2008 removes the specifications of
as
.IR size_t .
Not all locales use a point as the radix character ("decimal point").
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ecvt_r (3),
.BR gcvt (3),
.BR qecvt (3),
.\" Copyright (C) 2002 Andries Brouwer <aeb@cwi.nl>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" This replaces an earlier man page written by Walter Harms
.\" <walter.harms@informatik.uni-oldenburg.de>.
.BR ecvt (3)
and
.BR qecvt (3).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
These functions return 0 on success, and \-1 otherwise.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are GNU extensions.
.SH NOTES
These functions are obsolete.
Instead,
.BR sprintf (3)
is recommended.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ecvt (3),
.BR qecvt (3),
.BR sprintf (3)
.\" Copyright 2000 Nicolás Lichtmaier <nick@debian.org>
.\" Created 2000-07-22 00:52-0300
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
.\" GNU General Public License for more details.
.\"
+.\" You should have received a copy of the GNU General Public
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
+.\"
.\" Modified 2002-07-23 19:21:35 CEST 2002 Walter Harms
.\" <walter.harms@informatik.uni-oldenburg.de>
.\"
set
.I data\->initialized
to zero.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
These functions do not return any value.
.SH ERRORS
Set
.B ENOSYS
The function is not provided.
(For example because of former USA export restrictions.)
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The functions
.BR encrypt ()
and
encrypt(txt, 1); /* decode */
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cbc_crypt (3),
.BR crypt (3),
.BR ecb_crypt (3),
.\" Copyright (c) 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
.\"
.TH END 3 2008-07-17 "GNU" "Linux Programmer's Manual"
.SH NAME
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR objdump (1),
.BR readelf (1),
.BR sbrk (2),
.\" a few pieces remain from an earlier version
.\" Copyright (C) 2008, Nanno Langstraat <nal@ii.nl>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH ENDIAN 3 2010-09-10 "GNU" "Linux Programmer's Manual"
.SH NAME
from little-endian order to host byte order.
.SH VERSIONS
These functions were added to glibc in version 2.9.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are nonstandard.
Similar functions are present on the BSDs,
where the required header file is
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR byteorder (3)
.\" Copyright 2002 walter harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
+.\"
.\" based on the description in glibc source and infopages
.\"
.\" Corrections and additions, aeb
.LP
.BR envz_strip ()
removes all entries with value NULL.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
All envz functions that do memory allocation have a return type of
\fIerror_t\fP, and return 0 for success, and \fBENOMEM\fP
if an allocation error occurs.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are a GNU extension.
Handle with care.
.SH EXAMPLE
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR argz_add (3)
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.IR errno .
.\" FIXME . Is it intentional that these functions do not set errno?
.\" Bug raised: http://sources.redhat.com/bugzilla/show_bug.cgi?id=6785
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
also conforms to
SVr4, 4.3BSD.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cerf (3),
.BR erfc (3),
.BR exp (3)
.\" Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH ERFC 3 2010-09-20 "GNU" "Linux Programmer's Manual"
.SH NAME
.IR errno .
.\" FIXME . Is it intentional that these functions do not set errno?
.\" Bug raised: http://sources.redhat.com/bugzilla/show_bug.cgi?id=6785
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
would occur for the calculation 1-erf(x) for large values of
.IR x
(for which the value of erf(x) approaches 1).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cerf (3),
.BR erf (3),
.BR exp (3)
.\" Copyright (c) 1993
.\" The Regents of the University of California. All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" From: @(#)err.3 8.1 (Berkeley) 6/9/93
.\" $FreeBSD: src/lib/libc/gen/err.3,v 1.11.2.5 2001/08/17 15:42:32 ru Exp $
.BR verrx ()
functions do not return, but exit with the value of the argument
.IR eval .
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are nonstandard BSD extensions.
.\" .SH HISTORY
.\" The
.\" Copyright (c) 1996 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 5 Oct 2002, Modified by Michael Kerrisk <mtk.manpages@gmail.com>
.\" Updated for POSIX.1 2001
However, on (very) old UNIX systems, there may be no
.I <errno.h>
and the declaration is needed.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR err (3),
.BR error (3),
.BR perror (3),
.\" Copyright (C) 2006 Justin Pryzby <pryzbyj@justinpryzby.com>
.\" and Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(PERMISSIVE_MISC)
.\" Permission is hereby granted, free of charge, to any person obtaining
.\" a copy of this software and associated documentation files (the
.\" "Software"), to deal in the Software without restriction, including
.\" CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
.\" TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
.\" SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
+.\" %%%LICENSE_END
.\"
.\" References:
.\" glibc manual and source
instead of prefixing the message with the program name and colon.
The function should print a suitable string to
.IR stderr .
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions and variables are GNU extensions, and should not be
used in programs intended to be portable.
.SH SEE ALSO
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 2002 Ian Redfern (redferni@logica.com)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
}
.fi
.in
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD, SunOS.
.SH BUGS
The glibc 2.2.5 implementation of
.BR ether_line ()
is broken.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ethers (5)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2007 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\"
+.\" %%%LICENSE_END
.\"
.TH EUIDACCESS 3 2010-11-01 "" "Linux Programmer's Manual"
.SH NAME
is a synonym for
.BR euidaccess (),
provided for compatibility with some other systems.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success (all requested permissions granted), zero is returned.
On error (at least one bit in
.I mode
The
.BR eaccess ()
function was added to glibc in version 2.4.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are nonstandard.
Some other systems have an
.\" e.g., FreeBSD 6.1.
This function always dereferences symbolic links.
If you need to check the permissions on a symbolic link, use
-.BR faccessat(2)
+.BR faccessat (2)
with the flags
.BR AT_EACCESS
and
.BR AT_SYMLINK_NOFOLLOW .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR access (2),
.BR chmod (2),
.BR chown (2),
.\" Copyright (c) 1991 The Regents of the University of California.
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)exec.3 6.4 (Berkeley) 4/19/91
.\"
.br
.BI "int execvpe(const char *" file ", char *const " argv "[],"
.br
-.BI " char *const " envp "[]);"
+.BI " char *const " envp "[]);"
.sp
.in -4n
Feature Test Macro Requirements for glibc (see
.RI ( /bin/sh )
with the path of the file as its first argument.
(If this attempt fails, no further searching is done.)
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR exec ()
-functions only return if an error has have occurred.
+functions only return if an error has occurred.
The return value is \-1, and
.I errno
is set to indicate the error.
The
.BR execvpe ()
function first appeared in glibc 2.11.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001, POSIX.1-2008.
The
upon which they returned.
They now return if any error other than the ones
described above occurs.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sh (1),
.BR execve (2),
.BR fork (2),
.\" Copyright (C) 2001 Andries Brouwer <aeb@cwi.nl>.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH EXIT 3 2009-09-20 "Linux" "Linux Programmer's Manual"
+.TH EXIT 3 2013-02-14 "Linux" "Linux Programmer's Manual"
.SH NAME
exit \- cause normal process termination
.SH SYNOPSIS
.BR exit ()
to indicate successful or unsuccessful
termination, respectively.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR exit ()
function does not return.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001, C89, C99.
.SH NOTES
.LP
.BR exit ()
or
.BR longjmp (3).
+Note that a call to
+.BR execve (2)
+removes registrations created using
+.BR atexit (3)
+and
+.BR on_exit (3).
.LP
The use of
.B EXIT_SUCCESS
See
.BR setpgid (2)
for an explanation of orphaned process groups.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR _exit (2),
.BR setpgid (2),
.BR wait (2),
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
An underflow floating-point exception
.RB ( FE_UNDERFLOW )
is raised.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
also conforms to
SVr4, 4.3BSD, C89.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cbrt (3),
.BR cexp (3),
.BR exp10 (3),
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.\" Bug raised: http://sources.redhat.com/bugzilla/show_bug.cgi?id=6787
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are GNU extensions.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cbrt (3),
.BR exp (3),
.BR exp2 (3),
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.BR exp (3).
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
also conforms to
SVr4, 4.3BSD, C89.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cbrt (3),
.BR cexp2 (3),
.BR exp (3),
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified 2002-07-27 Walter Harms
.\" (walter.harms@informatik.uni-oldenburg.de)
.\"
.\" POSIX.1 specifies an optional range error (underflow) if
.\" x is subnormal. Glibc does not implement this.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
.\" BSD.
.SH BUGS
to
.B ERANGE
when a range error occurred.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR exp (3),
.BR log (3),
.BR log1p (3)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
is negative infinity or positive infinity, positive infinity is returned.
.SH ERRORS
No errors occur.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
also conforms to
SVr4, 4.3BSD, C89.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR abs (3),
.BR cabs (3),
.BR ceil (3),
.\" Chris Torek and the American National Standards Committee X3,
.\" on Information Processing Systems.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)fclose.3 6.7 (Berkeley) 6/29/91
.\"
(writing any buffered output data using
.BR fflush (3))
and closes the underlying file descriptor.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
Upon successful completion 0 is returned.
Otherwise,
.B EOF
.BR write (2)
or
.BR fflush (3).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C89, C99.
.SH NOTES
Note that
.BR fclose ()
-only flushes the user space buffers provided by the
+only flushes the user-space buffers provided by the
C library.
To ensure that the data is physically stored
on disk the kernel buffers must be flushed too, for example, with
.BR sync (2)
or
.BR fsync (2).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR close (2),
.BR fcloseall (3),
.BR fflush (3),
.\" Copyright (c) 2006 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
.\"
.TH FCLOSEALL 3 2006-12-27 "GNU" "Linux Programmer's Manual"
.SH NAME
and
.I stderr
are also closed.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
This function returns 0 if all files were successfully closed;
on error,
.B EOF
is returned.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This function is a GNU extension.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR close (2),
.BR fclose (3),
.BR fflush (3),
.\" Copyright 2003 Walter Harms, Andries Brouwer
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL.
+.\" %%%LICENSE_END
.\"
.TH FDIM 3 2010-09-20 "" "Linux Programmer's Manual"
.SH NAME
.\" Bug raised: http://sources.redhat.com/bugzilla/show_bug.cgi?id=6796
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fmax (3)
.\" Copyright (c) 2000 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 2000-08-14 added GNU additions from Andreas Jaeger
.\" 2000-12-05 some changes inspired by acahalan's remarks
.I invalid
exception occurs when there is no well-defined result
for an operation, as for 0/0 or infinity \- infinity or sqrt(\-1).
-.SS "Exception handling"
+.SS Exception handling
Exceptions are represented in two ways: as a single bit
(exception present/absent), and these bits correspond in some
implementation-defined way with bit positions in an integer,
should reflect the current rounding mode as set by
.BR fesetround ()
(but see BUGS).
-.SS "Floating-point environment"
+.SS Floating-point environment
The entire floating-point environment, including
control modes and status flags, can be handled
as one opaque object, of type
As before, the object
.I *envp
must be known to be valid.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
These functions return zero on success and nonzero if an error occurred.
.\" Earlier seven of these functions were listed as returning void.
.\" This was corrected in Corrigendum 1 (ISO/IEC 9899:1999/Cor.1:2001(E))
.\" of the C99 Standard.
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
IEC 60559 (IEC 559:1989), ANSI/IEEE 854, C99, POSIX.1-2001.
.SH NOTES
-.SS Glibc Notes
+.SS Glibc notes
If possible, the GNU C Library defines a macro
.B FE_NOMASK_ENV
which represents an environment where every exception raised causes a
.B FLT_ROUNDS
always has the value 1.
.\" See http://gcc.gnu.org/ml/gcc/2002-02/msg01535.html
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR math_error (7)
.\" Chris Torek and the American National Standards Committee X3,
.\" on Information Processing Systems.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)ferror.3 6.8 (Berkeley) 6/29/91
.\"
.I errno
to
.BR EBADF .)
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The functions
.BR clearerr (),
.BR feof (),
and
.BR ferror ()
conform to C89 and C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR open (2),
.BR fdopen (3),
.BR stdio (3),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 2006, Michael Kerrisk
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH FEXECVE 3 2010-09-15 "Linux" "Linux Programmer's Manual"
.SH NAME
and the caller must have permission to execute the file that it refers to.
.\" POSIX.1-2008 specifies the O_EXEC flag for open as an alternative,
.\" but Linux doesn't support this flag yet.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
A successful call to
.BR fexecve ()
never returns.
.SH VERSIONS
.BR fexecve ()
is implemented since glibc 2.3.2.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
This function is not specified in POSIX.1-2001,
and is not widely available on other systems.
file system, so
.I /proc
needs to be mounted and available at the time of the call.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR execve (2)
.\" Chris Torek and the American National Standards Committee X3,
.\" on Information Processing Systems.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)fflush.3 5.4 (Berkeley) 6/29/91
.\"
.PP
For a nonlocking counterpart, see
.BR unlocked_stdio (3).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
Upon successful completion 0 is returned.
Otherwise,
.B EOF
.I errno
for any of the errors specified for
.BR write (2).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C89, C99, POSIX.1-2001, POSIX.1-2008.
The standards do not specify the behavior for input streams.
.SH NOTES
Note that
.BR fflush ()
-only flushes the user space buffers provided by the C library.
+only flushes the user-space buffers provided by the C library.
To ensure that the data is physically stored on disk
the kernel buffers must be flushed too, for example, with
.BR sync (2)
or
.BR fsync (2).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fsync (2),
.BR sync (2),
.BR write (2),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.BR ffsl ()
do the same but take
arguments of possibly different size.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
These functions return the position of the first bit set,
or 0 if no bits are set in
.IR i .
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR ffs ():
4.3BSD, POSIX.1-2001.
.SH NOTES
BSD systems have a prototype in
.IR <string.h> .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR memchr (3)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
};
.fi
.in
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR fgetgrent ()
function returns a pointer to a
Insufficient memory to allocate
.I group
structure.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR endgrent (3),
.BR fgetgrent_r (3),
.BR fopen (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
};
.fi
.in
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR fgetpwent ()
function returns a pointer to a
.TP
.I /etc/passwd
password database file
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR endpwent (3),
.BR fgetpwent_r (3),
.BR fopen (3),
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.PP
For nonlocking counterparts, see
.BR unlocked_stdio (3).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR fgetwc ()
function returns the next wide-character
.B EILSEQ
The data obtained from the input stream does not
form a valid character.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
.SH NOTES
The behavior of
.BR fgetwc ()
will actually read a multibyte sequence
from the stream and then convert it to a wide character.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fgetws (3),
.BR fputwc (3),
.BR ungetwc (3),
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.PP
For a nonlocking counterpart, see
.BR unlocked_stdio (3).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR fgetws ()
function, if successful, returns \fIws\fP.
If end of stream
was already reached or if an error occurred, it returns NULL.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
.SH NOTES
The behavior of
This function is unreliable,
because it does not permit to deal properly with
null wide characters that may be present in the input.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fgetwc (3),
.BR unlocked_stdio (3)
.\" Copyright 2004 Andries Brouwer <aeb@cwi.nl>.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH FINITE 3 2008-08-05 "" "Linux Programmer's Manual"
.SH NAME
.\" .BR finite ()
.\" function occurs in 4.3BSD.
.\" see IEEE.3 in the 4.3BSD manual
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fpclassify (3)
.\" Copyright (C) 2001 Andries Brouwer <aeb@cwi.nl>.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH FLOCKFILE 3 2008-08-29 "" "Linux Programmer's Manual"
.SH NAME
It does nothing in case some other thread
owns \fI*filehandle\fP, and it obtains ownership and increments
the lockcount otherwise.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR ftrylockfile ()
function returns zero for success
(the lock was obtained), and nonzero for failure.
.SH ERRORS
None.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH AVAILABILITY
These functions are available when
is defined.
They are in libc since libc 5.1.1 and in glibc
since glibc 2.0.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR unlocked_stdio (3)
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH FLOOR 3 2010-09-20 "" "Linux Programmer's Manual"
.SH NAME
is 0.0, and
.IR floor(\-0.5)
is \-1.0.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
These functions return the floor of
.IR x .
.SH ERRORS
No errors occur.
POSIX.1-2001 documents a range error for overflows, but see NOTES.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
For the IEEE-754 standard 32-bit and 64-bit floating-point numbers
the maximum value of the exponent is 128 (respectively, 1024),
and the number of mantissa bits is 24 (respectively, 53).)
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ceil (3),
.BR lrint (3),
.BR nearbyint (3),
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
-.\" Distributed under GPL, 2002-07-27 Walter Harms
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
+.\" Distributed under GPL
+.\" %%%LICENSE_END
+.\"
.\" Modified 2004-11-15, Added further text on FLT_ROUNDS
.\" as suggested by AEB and Fabian Kreutz
.\"
.\" Bug raised: http://sources.redhat.com/bugzilla/show_bug.cgi?id=6801
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR remainder (3),
.BR remquo (3)
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH FMAX 3 2010-09-20 "" "Linux Programmer's Manual"
.SH NAME
No errors occur.
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fmin (3)
.\" Copyright 2005 walter harms (walter.harms@informatik.uni-oldenburg.de),
.\" and Copyright 2005, 2012 Michael Kerrisk <mtk.manpages@gmail.com>
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under the GPL.
+.\" %%%LICENSE_END
+.\"
.\" 2008-12-04, Petr Baudis <pasky@suse.cz>: Document open_wmemstream()
.\"
.TH FMEMOPEN 3 2012-04-28 "GNU" "Linux Programmer's Manual"
is similar to
.BR open_memstream (),
but operates on wide characters instead of bytes.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
Upon successful completion
.BR fmemopen (),
.BR open_memstream ()
were already available in glibc 1.0.x.
.BR open_wmemstream ()
is available since glibc 2.4.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
These functions are not specified in POSIX.1-2001,
and are not widely available on other systems.
.BR fmemopen ()
ignored \(aqb\(aq in
.IR mode .
-.SH "EXAMPLE"
+.SH EXAMPLE
The program below uses
.BR fmemopen ()
to open an input buffer, and
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fopen (3),
.BR fopencookie (3)
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH FMIN 3 2010-09-20 "" "Linux Programmer's Manual"
.SH NAME
No errors occur.
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fmax (3)
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
\fIy\fP.
The return value is \fIx\fP \- \fIn\fP * \fIy\fP, where \fIn\fP
is the quotient of \fIx\fP / \fIy\fP, rounded toward zero to an integer.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these
functions return the value \fIx\fP\ \-\ \fIn\fP*\fIy\fP,
for some integer \fIn\fP,
is raised.
.\" POSIX.1 documents an optional underflow error, but AFAICT it doesn't
.\" (can't?) occur -- mtk, Jul 2008
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
.B EDOM
when a domain error occurred for an infinite
.IR x .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR remainder (3)
.\" Copyright 2002 walter harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
+.\"
.\" adapted glibc info page
.\"
.\" This should run as 'Guru Meditation' (amiga joke :)
It should contain the
.I label
value and a unique identification number.
-.SS "Dummy arguments"
+.SS Dummy arguments
Each of the arguments can have a dummy value.
The dummy classification value
.B MM_NULLMC
.B MM_NULLSEV
is a synonym for
.BR NO_SEV .
-.SS "The classification argument"
+.SS The classification argument
The
.I classification
argument is the sum of values describing 4 types of information.
.TP
.B MM_NRECOV
It is a nonrecoverable error.
-.SS "The severity argument"
+.SS The severity argument
The
.I severity
argument can take one of the following values:
or the environment variable
.B SEV_LEVEL
you can add more levels and strings to print.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The function can return 4 values:
.TP 12n
.B MM_OK
.SH VERSIONS
.BR fmtmsg ()
is provided in glibc since version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The functions
.BR fmtmsg ()
and
unknown mount option
TO FIX: See mount(8).
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR addseverity (3),
.BR perror (3)
.\" Copyright (c) 1993 by Thomas Koenig (ig25@rz.uni-karlsruhe.de)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
+.\"
.\" Modified Sat Jul 24 19:35:54 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified Mon Oct 16 00:16:29 2000 following Joseph S. Myers
.\"
.B FNM_CASEFOLD
If this flag (a GNU extension) is set, the pattern is matched
case-insensitively.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
Zero if
.I string
matches
.IR pattern ,
.B FNM_NOMATCH
if there is no match or another nonzero value if there is an error.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.2.
The
.BR FNM_FILE_NAME ", " FNM_LEADING_DIR ", and " FNM_CASEFOLD
flags are GNU extensions.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sh (1),
.BR glob (3),
.BR scandir (3),
.\" Chris Torek and the American National Standards Committee X3,
.\" on Information Processing Systems.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)fopen.3 6.8 (Berkeley) 6/29/91
.\"
at end-of-file, as if preceded the call:
.nf
- fseek(stream,0,SEEK_END);
+ fseek(stream, 0, SEEK_END);
.fi
.PP
The
.BR freopen ()
function is to change the file associated with a standard text stream
.RI ( stderr ", " stdin ", or " stdout ).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
Upon successful completion
.BR fopen (),
.BR fdopen ()
.BR fclose (3)
and
.BR fflush (3).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The
.BR fopen ()
and
.BR fdopen ()
function conforms to POSIX.1-1990.
.SH NOTES
-.SS Glibc Notes
+.SS Glibc notes
The GNU C library allows the following extensions for the string specified in
.IR mode :
.TP
.BR fdopen ()
parses at most 5 characters in
.IR mode .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR open (2),
.BR fclose (3),
.BR fileno (3),
.\" Copyright (c) 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH FOPENCOOKIE 3 2012-04-30 "Linux" "Linux Programmer's Manual"
.SH NAME
/* Buffer too small? Keep doubling size until big enough */
- while (size + cookie\->offset > cookie->allocated) {
- new_buff = realloc(cookie\->buf, cookie->allocated * 2);
+ while (size + cookie\->offset > cookie\->allocated) {
+ new_buff = realloc(cookie\->buf, cookie\->allocated * 2);
if (new_buff == NULL) {
return \-1;
} else {
}
}
- memcpy(cookie\->buf + cookie->offset, buf, size);
+ memcpy(cookie\->buf + cookie\->offset, buf, size);
cookie\->offset += size;
- if (cookie\->offset > cookie->endpos)
- cookie\->endpos = cookie->offset;
+ if (cookie\->offset > cookie\->endpos)
+ cookie\->endpos = cookie\->offset;
return size;
}
/* Fetch minimum of bytes requested and bytes available */
xbytes = size;
- if (cookie\->offset + size > cookie->endpos)
- xbytes = cookie\->endpos - cookie->offset;
+ if (cookie\->offset + size > cookie\->endpos)
+ xbytes = cookie\->endpos \- cookie\->offset;
if (xbytes < 0) /* offset may be past endpos */
xbytes = 0;
- memcpy(buf, cookie\->buf + cookie->offset, xbytes);
+ memcpy(buf, cookie\->buf + cookie\->offset, xbytes);
cookie\->offset += xbytes;
return xbytes;
.\" Copyright (c) 1993 by Thomas Koenig (ig25@rz.uni-karlsruhe.de)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
+.\"
.\" Modified Wed Jul 28 11:12:26 1993 by Rik Faith (faith@cs.unc.edu)
+.\"
+.\" FIXME Probably all of the following should be documented:
+.\" _PC_SYNC_IO,
+.\" _PC_ASYNC_IO,
+.\" _PC_PRIO_IO,
+.\" _PC_SOCK_MAXBUF,
+.\" _PC_FILESIZEBITS,
+.\" _PC_REC_INCR_XFER_SIZE,
+.\" _PC_REC_MAX_XFER_SIZE,
+.\" _PC_REC_MIN_XFER_SIZE,
+.\" _PC_REC_XFER_ALIGN,
+.\" _PC_ALLOC_SIZE_MIN,
+.\" _PC_SYMLINK_MAX,
+.\" _PC_2_SYMLINKS
+.\"
.TH FPATHCONF 3 1993-04-04 "GNU" "Linux Programmer's Manual"
.SH NAME
fpathconf, pathconf \- get configuration values for files
or
.I path
must refer to a terminal.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The limit is returned, if one exists.
If the system does not have a
limit for the requested resource, \-1 is returned, and
If there is an error, \-1 is returned, and
.I errno
is set to reflect the nature of the error.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
Files with name lengths longer than the value returned for
.PP
Some returned values may be huge; they are not suitable for allocating
memory.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getconf (1),
.BR open (2),
.BR statfs (2),
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
-.\" Distributed under GPL, 2002-07-27 Walter Harms
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
+.\" Distributed under GPL
+.\" %%%LICENSE_END
+.\"
.\" This was done with the help of the glibc manual.
.\"
.\" 2004-10-31, aeb, corrected
is positive infinity, and \-1 if
.I x
is negative infinity.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1.
For
.I x
is positive infinity or negative infinity.
(This is all that C99 requires.)
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR finite (3),
.BR INFINITY (3),
.BR isgreater (3),
.\" Copyright (C) 2001 Andries Brouwer <aeb@cwi.nl>.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH FPURGE 3 2001-12-15 "" "Linux Programmer's Manual"
.SH NAME
The function
.BR __fpurge ()
does precisely the same, but without returning a value.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
Upon successful completion
.BR fpurge ()
returns 0.
.B EBADF
.I stream
is not an open stream.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are nonstandard and not portable.
The function
.BR fpurge ()
was introduced in Solaris, and is present in glibc 2.1.95 and later.
.SH NOTES
Usually it is a mistake to want to discard input buffers.
-.SH "SEE ALSO"
+.SH SEE ALSO
.\" .BR fclean (3),
.BR fflush (3),
.BR setbuf (3),
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.PP
For nonlocking counterparts, see
.BR unlocked_stdio (3).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR fputwc ()
function returns \fIwc\fP if no error occurred, or
.TP
.B EILSEQ
Conversion of \fIwc\fP to the stream's encoding fails.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
.SH NOTES
The behavior of
.BR fputwc ()
will actually write the multibyte
sequence corresponding to the wide character \fIwc\fP.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fgetwc (3),
.BR fputws (3),
.BR unlocked_stdio (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.PP
For a nonlocking counterpart, see
.BR unlocked_stdio (3).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR fputws ()
function returns a
nonnegative integer if the operation was
successful, or \-1 to indicate an error.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
.SH NOTES
The behavior of
.BR fputws ()
will actually write the multibyte
string corresponding to the wide-character string \fIws\fP.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fputwc (3),
.BR unlocked_stdio (3)
.\" Chris Torek and the American National Standards Committee X3,
.\" on Information Processing Systems.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)fread.3 6.6 (Berkeley) 6/29/91
.\"
.PP
For nonlocking counterparts, see
.BR unlocked_stdio (3).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR fread ()
and
and
.BR ferror (3)
to determine which occurred.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C89, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR read (2),
.BR write (2),
.BR feof (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.BR frexp ()
function is used to split the number \fIx\fP into a
normalized fraction and an exponent which is stored in \fIexp\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR frexp ()
function returns the normalized fraction.
is unspecified.
.SH ERRORS
No errors occur.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ldexp (3),
.BR modf (3)
.\" Chris Torek and the American National Standards Committee X3,
.\" on Information Processing Systems.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)fseek.3 6.11 (Berkeley) 6/29/91
.\"
.BR ftell ()
and
.BR fseek ()
-(with whence set to
+(with
+.I whence
+set to
.BR SEEK_SET ),
setting and storing the current value of the file offset into or from the
object referenced by
.IR pos .
-On some non-UNIX systems an
+On some non-UNIX systems, an
.I fpos_t
object may be a complex object and these routines may be the only way to
portably reposition a text stream.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR rewind ()
function returns no value.
.BR lseek (2),
and
.BR malloc (3).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C89, C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR lseek (2),
.BR fseeko (3)
.\" Copyright 2001 Andries Brouwer <aeb@cwi.nl>.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH FSEEKO 3 2001-11-05 "" "Linux Programmer's Manual"
.SH NAME
.SH ERRORS
See the ERRORS in
.BR fseek (3).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SUSv2, POSIX.1-2001.
.SH NOTES
These functions are found on System V-like systems.
They are not present in libc4, libc5, glibc 2.0
but are available since glibc 2.1.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fseek (3)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1993 Michael Haardt
.\" (michael@moria.de)
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Sat Jul 24 14:23:14 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified Sun Oct 18 17:31:43 1998 by Andries Brouwer (aeb@cwi.nl)
.LP
POSIX.1-2001 says that the contents of the \fItimezone\fP and \fIdstflag\fP
fields are unspecified; avoid relying on them.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
This function always returns 0.
(POSIX.1-2001 specifies, and some systems document, a \-1 error return.)
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.2BSD, POSIX.1-2001.
POSIX.1-2008 removes the specification of
.BR ftime ().
.\" The
.\" .BR ftime ()
.\" function appeared in 4.2BSD.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR gettimeofday (2),
.BR time (2)
.\" Copyright 1993 Giorgio Ciucci (giorgio@crcc.it)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified 2001-11-28, by Michael Kerrisk, <mtk.manpages@gmail.com>
.\" Changed data type of proj_id; minor fixes
is used.
The value returned should be different when the
(simultaneously existing) files or the project IDs differ.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, the generated
.I key_t
value is returned.
indicating the error as for the
.BR stat (2)
system call.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
Under libc4 and libc5 (and under SunOS 4.x) the prototype was:
.I /dev/hda1
and files on
.IR /dev/sda1 .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR msgget (2),
.BR semget (2),
.BR shmget (2),
.\" Copyright (c) 1989, 1991, 1993, 1994
.\" The Regents of the University of California. All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)fts.3 8.5 (Berkeley) 4/16/94
.\"
.\" 2007-12-08, mtk, Converted from mdoc to man macros
.\"
-.TH FTS 3 2007-12-28 "Linux" "Linux Programmer's Manual"
+.TH FTS 3 2012-10-25 "Linux" "Linux Programmer's Manual"
.SH NAME
fts, fts_open, fts_read, fts_children, fts_set, fts_close \- \
traverse a file hierarchy
(before any of their descendants are visited) and in postorder (after all
of their descendants have been visited).
Files are visited once.
-It is possible to walk the hierarchy "logically" (ignoring symbolic links)
-or physically (visiting symbolic links), order the walk of the hierarchy or
+It is possible to walk the hierarchy "logically" (visiting the files that
+symbolic links point to)
+or physically (visiting the symbolic links themselves),
+order the walk of the hierarchy or
prune and/or revisit portions of the hierarchy.
.PP
Two structures are defined (and typedef'd) in the include file
.\" .Bl -tag -width FTS_PHYSICAL
.TP 13
.BR FTS_AGAIN
-Re-visit the file; any file type may be revisited.
+Revisit the file; any file type may be revisited.
The next call to
.BR fts_read ()
will return the referenced file.
The options were invalid.
.SH VERSIONS
These functions are available in Linux since glibc2.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.4BSD.
.\" The following statement is years old, and seems no closer to
.\" being true -- mtk
.\" and copyright (c) 2006 Justin Pryzby <justinpryzby@users.sf.net>
.\" and copyright (c) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Sun Jul 25 11:02:22 1993 by Rik Faith (faith@cs.unc.edu)
.\" 2006-05-24, Justin Pryzby <justinpryzby@users.sf.net>
in the directory tree, relative to the root of the tree
.RI ( dirpath ,
which has depth 0).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
These functions return 0 on success, and \-1 if an error occurs.
If \fIfn\fP() returns nonzero,
to terminate the tree walk is \fBFTW_STOP\fP,
and that value is returned as the result of
.BR nftw ().
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001, SVr4, SUSv1.
POSIX.1-2008 marks
.BR ftw ()
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR stat (2),
.BR fts (3),
.BR readdir (3)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 2006, 2008, Michael Kerrisk
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH FUTIMES 3 2008-04-07 "Linux" "Linux Programmer's Manual"
+.TH FUTIMES 3 2013-03-15 "Linux" "Linux Programmer's Manual"
.SH NAME
futimes, lutimes \- change file timestamps
.SH SYNOPSIS
.I filename
refers to a symbolic link, then the link is not dereferenced:
instead, the timestamps of the symbolic link are changed.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
The
.I /proc
file system could not be accessed.
+.PP
+The following additional error may occur for
+.BR lutimes ():
+.TP
+.B ENOSYS
+The kernel does not support this call; Linux 2.6.22 or later is required.
.SH VERSIONS
.BR futimes ()
is available since glibc 2.3.
is available since glibc 2.6, and is implemented using the
.BR utimensat (2)
system call, which is supported since kernel 2.6.22.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are not specified in any standard.
Other than Linux, they are only available on the BSDs.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR utime (2),
.BR utimensat (2),
.BR symlink (7)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
to byte oriented if \fImode\fP is less than 0).
It then returns a value denoting the
current orientation, as above.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR fwide ()
function returns the stream's orientation, after possibly
A positive return value means wide-character oriented.
A negative return value means byte oriented.
A return value of zero means undecided.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
.SH NOTES
Wide-character output to a byte oriented stream can be performed through the
and
.B %s
directives.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fprintf (3),
.BR fwprintf (3)
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.\" Modified 2003-11-18, aeb: historical remarks
.\"
For the definition of the Gamma function, see
.BR tgamma (3).
-.SS "*BSD version"
+.SS *BSD version
The libm in 4.4BSD and some versions of FreeBSD had a
.BR gamma ()
function that computes the Gamma function, as one would expect.
-.SS "glibc version"
+.SS glibc version
Glibc has a
.BR gamma ()
function that is equivalent to
.SH ERRORS
See
.BR lgamma (3).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
Because of historical variations in behavior across systems,
this function is not specified in any standard.
.SH NOTES
.\" The FreeBSD man page says about gamma() that it is like lgamma()
.\" except that is does not set signgam.
.\" Also, that 4.4BSD has a gamma() that computes the true gamma function.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR lgamma (3),
.BR signgam (3),
.BR tgamma (3)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
It produces \fIndigit\fP significant digits in either
.BR printf (3)
F format or E format.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR gcvt ()
function returns the address of the string pointed to
by \fIbuf\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
Marked as LEGACY in POSIX.1-2001.
POSIX.1-2008 removes the specification of
.BR gcvt (),
instead (though
.BR snprintf (3)
may be preferable).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ecvt (3),
.BR fcvt (3),
.BR sprintf (3)
.\" Copyright (c) 2012, Petr Benas
.\" and Copyright (c) 2012, Michael Kerrisk <mtk.man-pages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-
+.\" %%%LICENSE_END
+.\"
.TH GET_NPROCS 3 2012-03-20 "GNU" "Linux Programmer's Manual"
.SH NAME
get_nprocs, get_nprocs_conf \- get number of processors
.\" A few pieces of an earlier version remain:
.\" Copyright 2000, Sam Varshavchik <mrsam@courier-mta.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References: RFC 2553
.\"
.\" FIXME . glibc's 2.9 NEWS file documents DCCP and UDP-lite support
.\" and is SCTP support now also there?
.\"
-.TH GETADDRINFO 3 2012-04-29 "GNU" "Linux Programmer's Manual"
+.TH GETADDRINFO 3 2013-01-15 "GNU" "Linux Programmer's Manual"
.SH NAME
getaddrinfo, freeaddrinfo, gai_strerror \- network address and
service translation
function combines the functionality provided by the
.\" .BR getipnodebyname (3),
.\" .BR getipnodebyaddr (3),
-.BR getservbyname (3)
+.BR gethostbyname (3)
and
-.BR getservbyport (3)
+.BR getservbyname (3)
functions into a single interface, but unlike the latter functions,
.BR getaddrinfo ()
is reentrant and allows programs to eliminate IPv4-versus-IPv6 dependencies.
function frees the memory that was allocated
for the dynamically allocated linked list
.IR res .
-.SS "Extensions to getaddrinfo() for Internationalized Domain Names"
+.SS Extensions to getaddrinfo() for Internationalized Domain Names
.PP
Starting with glibc 2.3.4,
.BR getaddrinfo ()
IDNA_USE_STD3_ASCII_RULES (check output to make sure it is a STD3
conforming hostname)
flags respectively to be used in the IDNA handling.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.\" FIXME glibc defines the following additional errors, some which
.\" can probably be returned by getaddrinfo(); they need to
.\" be documented.
.BR gai_strerror ()
function translates these error codes to a human readable string,
suitable for error reporting.
-.SH "FILES"
+.SH FILES
.I /etc/gai.conf
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
The
.BR getaddrinfo ()
function is documented in RFC\ 2553.
-.SH "NOTES"
+.SH NOTES
.BR getaddrinfo ()
supports the
.IB address % scope-id
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.\" .BR getipnodebyaddr (3),
.\" .BR getipnodebyname (3),
.BR getaddrinfo_a (3),
.BR gethostbyname (3),
.BR getnameinfo (3),
.BR inet (3),
+.BR gai.conf (5),
.BR hostname (7),
.BR ip (7)
.\" Copyright (c) 2009 Petr Baudis <pasky@suse.cz>
.\" and clean-ups and additions (C) 2010 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References: http://people.redhat.com/drepper/asynchnl.pdf,
.\" http://www.imperialviolet.org/2005/06/01/asynchronous-dns-lookups-with-glibc.html
.I req
is NULL, an attempt is made to cancel all outstanding requests
that the process has made.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR getaddrinfo_a ()
function returns 0 if all of the requests have been enqueued successfully,
.BR gai_strerror (3)
function translates these error codes to a human readable string,
suitable for error reporting.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are GNU extensions;
they first appeared in glibc in version 2.2.3.
.SH NOTES
Two examples are provided: a simple example that resolves
several requests in parallel synchronously, and a complex example
showing some of the asynchronous capabilities.
-.SS Synchronous Example
+.SS Synchronous example
The program below simply resolves several hostnames in parallel,
giving a speed-up compared to resolving the hostnames sequentially using
.BR getaddrinfo (3).
exit(EXIT_SUCCESS);
}
.fi
-
-.SS Asynchronous Example
+.SS Asynchronous example
This example shows a simple interactive
.BR getaddrinfo_a ()
front-end.
.fi
.in
.PP
-The program source goes as follows:
+The program source is as follows:
-\&
.nf
#define _GNU_SOURCE
#include <netdb.h>
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getaddrinfo (3),
.BR inet (3),
.BR lio_listio (3),
--- /dev/null
+.\" Copyright 2012 Michael Kerrisk <mtk.manpages@gmail.com>
+.\"
+.\" %%%LICENSE_START(VERBATIM)
+.\" Permission is granted to make and distribute verbatim copies of this
+.\" manual provided the copyright notice and this permission notice are
+.\" preserved on all copies.
+.\"
+.\" Permission is granted to copy and distribute modified versions of this
+.\" manual under the conditions for verbatim copying, provided that the
+.\" entire resulting derived work is distributed under the terms of a
+.\" permission notice identical to this one.
+.\"
+.\" Since the Linux kernel and libraries are constantly changing, this
+.\" manual page may be incorrect or out-of-date. The author(s) assume no
+.\" responsibility for errors or omissions, or for damages resulting from
+.\" the use of the information contained herein. The author(s) may not
+.\" have taken the same level of care in the production of this manual,
+.\" which is licensed free of charge, as they might when working
+.\" professionally.
+.\"
+.\" Formatted or processed versions of this manual, if unaccompanied by
+.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
+.\"
+.\" See also https://lwn.net/Articles/519085/
+.\"
+.TH GETAUXVAL 3 2012-11-07 "GNU" "Linux Programmer's Manual"
+.SH NAME
+getauxval \- retrieve a value from the auxiliary vector
+.SH SYNOPSIS
+.nf
+.B #include <sys/auxv.h>
+.sp
+.BI "unsigned long getauxval(unsigned long " type );
+.fi
+.SH DESCRIPTION
+The
+.BR getauxval ()
+function retrieves values from the auxiliary vector,
+a mechanism that the kernel's ELF binary loader
+uses to pass certain information to
+user space when a program is executed.
+
+Each entry in the auxiliary vector consists of a pair of values:
+a type that identifies what this entry represents,
+and a value for that type.
+Given the argument
+.IR type ,
+.BR getauxval ()
+returns the corresponding value.
+
+The value returned for each
+.I type
+is given in the following list.
+Not all
+.I type
+values are present on all architectures.
+.TP
+.BR AT_BASE
+The base address of the program interpreter (usually, the dynamic linker).
+.TP
+.BR AT_BASE_PLATFORM
+A string identifying the real platform; may differ from
+.BR AT_PLATFORM
+(PowerPC only).
+.TP
+.BR AT_CLKTCK
+The frequency with which
+.BR times (2)
+counts.
+This value can also be obtained via
+.IR sysconf(_SC_CLK_TCK) .
+.TP
+.BR AT_DCACHEBSIZE
+The data cache block size.
+.TP
+.BR AT_EGID
+The effective group ID of the thread.
+.TP
+.BR AT_ENTRY
+The entry address of the executable.
+.TP
+.BR AT_EUID
+The effective user ID of the thread.
+.TP
+.BR AT_EXECFD
+File descriptor of program.
+.TP
+.BR AT_EXECFN
+Pathname used to execute program.
+.TP
+.BR AT_FLAGS
+Flags (unused).
+.TP
+.BR AT_FPUCW
+Used FPU control word (SuperH architecture only).
+This gives some information about the FPU initialization
+performed by the kernel.
+.TP
+.BR AT_GID
+The real group ID of the thread.
+.TP
+.BR AT_HWCAP
+A pointer to a multibyte mask of bits whose settings
+indicate detailed processor capabilities.
+The contents of the bit mask are hardware dependent
+(for example, see the kernel source file
+.IR arch/x86/include/asm/cpufeature.h
+for details relating to the Intel x86 architecture).
+A human-readable version of the same information is available via
+.IR /proc/cpuinfo .
+.TP
+.BR AT_ICACHEBSIZE
+The instruction cache block size.
+.\" .TP
+.\" .BR AT_IGNORE
+.\" .TP
+.\" .BR AT_IGNOREPPC
+.\" .TP
+.\" .BR AT_NOTELF
+.TP
+.BR AT_PAGESZ
+The system page size (the same value returned by
+.IR sysconf(_SC_PAGESIZE) ).
+.TP
+.BR AT_PHDR
+The address of the program headers of the executable.
+.TP
+.BR AT_PHENT
+The size of program header entry.
+.TP
+.BR AT_PHNUM
+The number of program headers.
+.TP
+.BR AT_PLATFORM
+A pointer to a string that identifies the hardware platform
+that the program is running on.
+The dynamic linker uses this in the interpretation of
+.IR rpath
+values.
+.TP
+.BR AT_RANDOM
+The address of sixteen bytes containing a random value.
+.TP
+.BR AT_SECURE
+Has a nonzero value if this executable should be treated securely.
+Most commonly, a nonzero value indicates that the process is
+executing a set-user-ID or set-group-ID program; alternatively,
+a nonzero value may be triggered by a Linux Security Module.
+When this value is nonzero,
+the dynamic linker disables the use of certain environment variables (see
+.BR ld-linux.so (8))
+and glibc changes other aspects of its behavior.
+(See also
+.BR secure_getenv (3).)
+.TP
+.BR AT_SYSINFO
+The entry point to the system call function in the VDSO.
+Not present/needed on all architectures (e.g., absent on x86-64).
+.TP
+.BR AT_SYSINFO_EHDR
+The address of a page containing the Virtual Dynamic Shared Object (VDSO)
+that the kernel creates in order to provide fast implementations of
+certain system calls.
+.TP
+.BR AT_UCACHEBSIZE
+The unified cache block size.
+.TP
+.BR AT_UID
+The real user ID of the thread.
+.SH RETURN VALUE
+On success,
+.BR getauxval ()
+returns the value corresponding to
+.IR type .
+If
+.I type
+is not found, 0 is returned.
+.SH ERRORS
+No errors are diagnosed.
+.SH VERSIONS
+The
+.BR getauxval ()
+function was added to glibc in version 2.16.
+.SH CONFORMING TO
+This function is a nonstandard glibc extension.
+.SH NOTES
+The primary consumer of the information in the auxiliary vector
+is the dynamic linker
+.BR ld-linux.so (8).
+The auxiliary vector is a convenient and efficient shortcut
+that allows the kernel to communicate a certain set of standard
+information that the dynamic linker usually or always needs.
+In some cases, the same information could be obtained by system calls,
+but using the auxiliary vector is cheaper.
+
+The auxiliary vector resides just above the argument list and
+environment in the process address space.
+The auxiliary vector supplied to a program can be viewed by setting the
+.B LD_SHOW_AUXV
+environment variable when running a program:
+
+ $ LD_SHOW_AUXV=1 sleep 1
+
+The auxiliary vector of any process can (subject to file permissions)
+be obtained via
+.IR /proc/PID/auxv ;
+see
+.BR proc (5)
+for more information.
+.SH SEE ALSO
+.BR secure_getenv (3),
+.BR ld-linux.so (8)
+
+The kernel source file
+.IR Documentation/ABI/stable/vdso
--- /dev/null
+.\" Copyright (C) 2001 Andries Brouwer (aeb@cwi.nl)
+.\"
+.\" %%%LICENSE_START(VERBATIM)
+.\" Permission is granted to make and distribute verbatim copies of this
+.\" manual provided the copyright notice and this permission notice are
+.\" preserved on all copies.
+.\"
+.\" Permission is granted to copy and distribute modified versions of this
+.\" manual under the conditions for verbatim copying, provided that the
+.\" entire resulting derived work is distributed under the terms of a
+.\" permission notice identical to this one.
+.\"
+.\" Since the Linux kernel and libraries are constantly changing, this
+.\" manual page may be incorrect or out-of-date. The author(s) assume no
+.\" responsibility for errors or omissions, or for damages resulting from
+.\" the use of the information contained herein. The author(s) may not
+.\" have taken the same level of care in the production of this manual,
+.\" which is licensed free of charge, as they might when working
+.\" professionally.
+.\"
+.\" Formatted or processed versions of this manual, if unaccompanied by
+.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
+.\"
+.TH GETCONTEXT 3 2009-03-15 "Linux" "Linux Programmer's Manual"
+.SH NAME
+getcontext, setcontext \- get or set the user context
+.SH SYNOPSIS
+.B #include <ucontext.h>
+.sp
+.BI "int getcontext(ucontext_t *" ucp );
+.br
+.BI "int setcontext(const ucontext_t *" ucp );
+.SH DESCRIPTION
+In a System V-like environment, one has the two types
+\fImcontext_t\fP and \fIucontext_t\fP defined in
+.I <ucontext.h>
+and the four functions
+.BR getcontext (),
+.BR setcontext (),
+.BR makecontext (3)
+and
+.BR swapcontext (3)
+that allow user-level context switching between multiple
+threads of control within a process.
+.LP
+The \fImcontext_t\fP type is machine-dependent and opaque.
+The \fIucontext_t\fP type is a structure that has at least
+the following fields:
+.in +4
+.nf
+
+typedef struct ucontext {
+ struct ucontext *uc_link;
+ sigset_t uc_sigmask;
+ stack_t uc_stack;
+ mcontext_t uc_mcontext;
+ ...
+} ucontext_t;
+
+.fi
+.in
+with \fIsigset_t\fP and \fIstack_t\fP defined in
+.IR <signal.h> .
+Here \fIuc_link\fP points to the context that will be resumed
+when the current context terminates (in case the current context
+was created using
+.BR makecontext (3)),
+\fIuc_sigmask\fP is the
+set of signals blocked in this context (see
+.BR sigprocmask (2)),
+\fIuc_stack\fP is the stack used by this context (see
+.BR sigaltstack (2)),
+and \fIuc_mcontext\fP is the
+machine-specific representation of the saved context,
+that includes the calling thread's machine registers.
+.LP
+The function
+.BR getcontext ()
+initializes the structure
+pointed at by \fIucp\fP to the currently active context.
+.LP
+The function
+.BR setcontext ()
+restores the user context
+pointed at by \fIucp\fP.
+A successful call does not return.
+The context should have been obtained by a call of
+.BR getcontext (),
+or
+.BR makecontext (3),
+or passed as third argument to a signal
+handler.
+.LP
+If the context was obtained by a call of
+.BR getcontext (),
+program execution continues as if this call just returned.
+.LP
+If the context was obtained by a call of
+.BR makecontext (3),
+program execution continues by a call to the function \fIfunc\fP
+specified as the second argument of that call to
+.BR makecontext (3).
+When the function \fIfunc\fP returns, we continue with the
+\fIuc_link\fP member of the structure \fIucp\fP specified as the
+first argument of that call to
+.BR makecontext (3).
+When this member is NULL, the thread exits.
+.LP
+If the context was obtained by a call to a signal handler,
+then old standard text says that "program execution continues with the
+program instruction following the instruction interrupted
+by the signal".
+However, this sentence was removed in SUSv2,
+and the present verdict is "the result is unspecified".
+.SH RETURN VALUE
+When successful,
+.BR getcontext ()
+returns 0 and
+.BR setcontext ()
+does not return.
+On error, both return \-1 and set \fIerrno\fP
+appropriately.
+.SH ERRORS
+None defined.
+.SH CONFORMING TO
+SUSv2, POSIX.1-2001.
+POSIX.1-2008 removes the specification of
+.BR getcontext (),
+citing portability issues, and
+recommending that applications be rewritten to use POSIX threads instead.
+.SH NOTES
+The earliest incarnation of this mechanism was the
+.BR setjmp (3)/ longjmp (3)
+mechanism.
+Since that does not define
+the handling of the signal context, the next stage was the
+.BR sigsetjmp (3)/ siglongjmp (3)
+pair.
+The present mechanism gives much more control.
+On the other hand,
+there is no easy way to detect whether a return from
+.BR getcontext ()
+is from the first call, or via a
+.BR setcontext ()
+call.
+The user has to invent her own bookkeeping device, and a register
+variable won't do since registers are restored.
+.LP
+When a signal occurs, the current user context is saved and
+a new context is created by the kernel for the signal handler.
+Do not leave the handler using
+.BR longjmp (3):
+it is undefined what would happen with contexts.
+Use
+.BR siglongjmp (3)
+or
+.BR setcontext ()
+instead.
+.SH SEE ALSO
+.BR sigaction (2),
+.BR sigaltstack (2),
+.BR sigprocmask (2),
+.BR longjmp (3),
+.BR makecontext (3),
+.BR sigsetjmp (3)
.\" Copyright (c) 1993 by Thomas Koenig (ig25@rz.uni-karlsruhe.de)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
+.\"
.\" Modified Wed Jul 21 22:35:42 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified 18 Mar 1996 by Martin Schulze (joey@infodrom.north.de):
.\" Corrected description of getwd().
.\"
.TH GETCWD 3 2010-09-20 "GNU" "Linux Programmer's Manual"
.SH NAME
-getcwd, getwd, get_current_dir_name \- Get current working directory
+getcwd, getwd, get_current_dir_name \- get current working directory
.SH SYNOPSIS
.nf
.B #include <unistd.h>
For portability and security reasons, use of
.BR getwd ()
is deprecated.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these functions return a pointer to a string containing
the pathname of the current working directory.
In the case
argument is less than the length of the absolute pathname of the
working directory, including the terminating null byte.
You need to allocate a bigger array and try again.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR getcwd ()
conforms to POSIX.1-2001.
Note however that POSIX.1-2001 leaves the behavior of
.BR fchdir (2)
to return is usually a faster and more reliable alternative when sufficiently
many file descriptors are available, especially on platforms other than Linux.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR chdir (2),
.BR fchdir (2),
.BR open (2),
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified, 2001-12-26, aeb
.\" 2008-09-07, mtk, Various rewrites; added an example program.
and returns the resulting broken-down time in the
caller-allocated buffer pointed to by the argument
.IR res .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
When successful,
.BR getdate ()
returns a pointer to a
.BR TZ ", " LC_TIME
Variables used by
.BR strptime (3).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
The POSIX.1-2001 specification for
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR time (2),
.BR localtime (3),
.BR setlocale (3),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 1993 Rickard E. Faith (faith@cs.unc.edu)
.\" Portions extracted from /usr/include/dirent.h are:
.\" Copyright 1991, 1992 Free Software Foundation
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH GETDIRENTRIES 3 2007-07-26 "GNU" "Linux Programmer's Manual"
.SH NAME
and
.I *basep
is updated with the new position after reading.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR getdirentries ()
returns the number of bytes read or zero when at the end of the directory.
If an error occurs, \-1 is returned, and
is set appropriately.
.SH ERRORS
See the Linux library source code for details.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
Not in POSIX.1-2001.
Present on the BSDs, and a few other systems.
Use
and
.BR readdir (3)
instead.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR lseek (2),
.BR open (2)
--- /dev/null
+.\" Copyright 1993 Rickard E. Faith (faith@cs.unc.edu)
+.\"
+.\" %%%LICENSE_START(VERBATIM)
+.\" Permission is granted to make and distribute verbatim copies of this
+.\" manual provided the copyright notice and this permission notice are
+.\" preserved on all copies.
+.\"
+.\" Permission is granted to copy and distribute modified versions of this
+.\" manual under the conditions for verbatim copying, provided that the
+.\" entire resulting derived work is distributed under the terms of a
+.\" permission notice identical to this one.
+.\"
+.\" Since the Linux kernel and libraries are constantly changing, this
+.\" manual page may be incorrect or out-of-date. The author(s) assume no
+.\" responsibility for errors or omissions, or for damages resulting from
+.\" the use of the information contained herein. The author(s) may not
+.\" have taken the same level of care in the production of this manual,
+.\" which is licensed free of charge, as they might when working
+.\" professionally.
+.\"
+.\" Formatted or processed versions of this manual, if unaccompanied by
+.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
+.\"
+.\" Modified 2002-04-15 by Roger Luethi <rl@hellgate.ch> and aeb
+.\"
+.TH GETDTABLESIZE 3 2013-02-05 "Linux" "Linux Programmer's Manual"
+.SH NAME
+getdtablesize \- get descriptor table size
+.SH SYNOPSIS
+.B #include <unistd.h>
+.sp
+.B int getdtablesize(void);
+.sp
+.in -4n
+Feature Test Macro Requirements for glibc (see
+.BR feature_test_macros (7)):
+.in
+.sp
+.BR getdtablesize ():
+.ad l
+.RS 4
+.PD 0
+.TP 4
+Since glibc 2.12:
+.nf
+_BSD_SOURCE ||
+ !(_POSIX_C_SOURCE\ >=\ 200112L || _XOPEN_SOURCE\ >=\ 600)
+.TP 4
+.fi
+Before glibc 2.12:
+_BSD_SOURCE || _XOPEN_SOURCE\ >=\ 500 ||
+_XOPEN_SOURCE\ &&\ _XOPEN_SOURCE_EXTENDED
+.PD
+.RE
+.ad b
+.SH DESCRIPTION
+.BR getdtablesize ()
+returns the maximum number of files a process can have open,
+one more than the largest possible value for a file descriptor.
+.SH RETURN VALUE
+The current limit on the number of open files per process.
+.SH ERRORS
+On Linux,
+.BR getdtablesize ()
+can return any of the errors described for
+.BR getrlimit (2);
+see NOTES below.
+.SH CONFORMING TO
+SVr4, 4.4BSD (the
+.BR getdtablesize ()
+function first appeared in 4.2BSD).
+It is not specified in POSIX.1-2001;
+portable applications should employ
+.I sysconf(_SC_OPEN_MAX)
+instead of this call.
+.SH NOTES
+.BR getdtablesize ()
+is implemented as a libc library function.
+The glibc version calls
+.BR getrlimit (2)
+and returns the current
+.B RLIMIT_NOFILE
+limit, or
+.B OPEN_MAX
+when that fails.
+The libc4 and libc5 versions return
+.B OPEN_MAX
+(set to 256 since Linux 0.98.4).
+.SH SEE ALSO
+.BR close (2),
+.BR dup (2),
+.BR getrlimit (2),
+.BR open (2)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
-.\" and Copyright (C) 2007 Michael Kerrisk <mtk.manpages@gmail.com>
+.\" and Copyright (C) 2007, 2012 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.\" Modified Sat Jul 24 19:30:29 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified Fri Feb 14 21:47:50 1997 by Andries Brouwer (aeb@cwi.nl)
.\"
-.TH GETENV 3 2008-03-17 "GNU" "Linux Programmer's Manual"
+.TH GETENV 3 2012-08-14 "GNU" "Linux Programmer's Manual"
.SH NAME
-getenv \- get an environment variable
+getenv, secure_getenv \- get an environment variable
.SH SYNOPSIS
.nf
.B #include <stdlib.h>
.sp
.BI "char *getenv(const char *" name );
+
+.BI "char *secure_getenv(const char *" name );
.fi
+.sp
+.in -4n
+Feature Test Macro Requirements for glibc (see
+.BR feature_test_macros (7)):
+.in
+.sp
+.BR secure_getenv ():
+_GNU_SOURCE
.SH DESCRIPTION
The
.BR getenv ()
and returns a pointer to the corresponding
.I value
string.
-.SH "RETURN VALUE"
+
+The GNU-specific
+.BR secure_getenv ()
+function is just like
+.BR getenv ()
+except that it returns NULL in cases where "secure execution" is required.
+Secure execution is required if one of the following conditions
+was true when the program run by the calling process was loaded:
+.IP * 3
+the process's effective user ID did not match its real user ID or
+the process's effective group ID did not match its real group ID
+(typically this is the result of executing a set-user-ID or
+set-group-ID program);
+.IP *
+the effective capability bit was set on the executable file; or
+.IP *
+the process has a nonempty permitted capability set.
+.PP
+Secure execution may also required if triggered
+by some Linux security modules.
+
+The
+.BR secure_getenv ()
+function is intended for use in general-purpose libraries
+to avoid vulnerabilities that could occur if
+set-user-ID or set-group-ID programs accidentally
+trusted the environment.
+.SH RETURN VALUE
The
.BR getenv ()
function returns a pointer to the value in the
environment, or NULL if there is no match.
-.SH "CONFORMING TO"
+.SH VERSIONS
+.BR secure_getenv ()
+first appeared in glibc 2.17.
+.SH CONFORMING TO
+.BR getenv ():
SVr4, POSIX.1-2001, 4.3BSD, C89, C99.
+
+.BR secure_getenv ()
+is a GNU extension.
.SH NOTES
The strings in the environment list are of the form \fIname=value\fP.
.BR setenv (3),
or
.BR unsetenv (3).
-.SH "SEE ALSO"
+
+The "secure execution" mode of
+.BR secure_getenv ()
+is controlled by the
+.B AT_SECURE
+flag contained in the auxiliary vector passed from the kernel to user space.
+.SH SEE ALSO
.BR clearenv (3),
+.BR getauxval (3),
.BR putenv (3),
.BR setenv (3),
.BR unsetenv (3),
+.BR capabilities (7),
.BR environ (7)
.\" Copyright (C) 2002 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Inspired by a page written by Walter Harms.
.\"
field matches the
.I mount_point
argument.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
Upon success, the functions
.BR getfsent (),
.BR getfsfile (),
.\" The
.\" .BR getfsent ()
.\" function appeared in 4.0BSD; the other four functions appeared in 4.3BSD.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are not in POSIX.1-2001.
Several operating systems have them,
e.g., *BSD, SunOS, Digital UNIX, AIX (which also has a
.BR getfsspec ()
only return the first occurrence, these two functions are not suitable
for use under Linux.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getmntent (3),
.BR fstab (5)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.PP
For more information about the fields of this structure, see
.BR group (5).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR getgrent ()
function returns a pointer to a
.TP
.I /etc/group
local group database file
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fgetgrent (3),
.BR getgrent_r (3),
.BR getgrgid (3),
.\" Copyright (c) 2003 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.TH GETGRENT_R 3 2010-10-21 "GNU" "Linux Programmer's Manual"
.SH NAME
.IR *gbuf ,
and a pointer to this \fIstruct group\fP is returned in
.IR *gbufp .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these functions return 0 and
.I *gbufp
is a pointer to the \fIstruct group\fP.
.B ERANGE
Insufficient buffer space supplied.
Try again with larger buffer.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are GNU extensions, done in a style resembling
the POSIX version of functions like
.BR getpwnam_r (3).
.\" printf("getgrent_r: %s", strerror(i));
.\" exit(EXIT_FAILURE);
.\" }
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fgetgrent (3),
.BR getgrent (3),
.BR getgrgid (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
the call fails with
.BR ERANGE ,
in which case the caller can retry with a larger buffer.)
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR getgrnam ()
and
.TP
.I /etc/group
local group database file
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
.SH NOTES
The formulation given above under "RETURN VALUE" is from POSIX.1-2001.
.\" FreeBSD 4.8, OpenBSD 3.2, NetBSD 1.6 - give EPERM
.\" SunOS 5.8 - gives EBADF
.\" Tru64 5.1b, HP-UX-11i, SunOS 5.7 - give 0
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR endgrent (3),
.BR fgetgrent (3),
.BR getgrent (3),
.\" Copyright (C) 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" A few pieces remain from an earlier version written in
+.\" 2002 by Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\"
-.\" A few pieces remain from an earlier version written in
-.\" 2002 by Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\" %%%LICENSE_END
.\"
.TH GETGROUPLIST 3 2008-07-03 "GNU" "Linux Programmer's Manual"
.SH NAME
.IR group ;
this value may be greater than the number of groups stored in
.IR groups .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
If the number of groups of which
.I user
is a member is less than or equal to
.IR *ngroups
can be used to resize the buffer passed to a further call
.BR getgrouplist ().
-.SH "VERSIONS"
+.SH VERSIONS
This function is present since glibc 2.2.4.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This function is nonstandard; it appears on most BSDs.
.SH BUGS
In glibc versions before 2.3.3,
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getgroups (2),
.BR setgroups (2),
.BR getgrent (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.TP
.I h_addr
The first address in \fIh_addr_list\fP for backward compatibility.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR gethostbyname ()
and
.TP
.I /etc/nsswitch.conf
name service switch configuration
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001 specifies
.BR gethostbyname (),
.BR gethostbyaddr (),
uses
.I const char *
for the first argument.
-.SS "System V/POSIX Extension"
+.SS System V/POSIX extension
POSIX requires the
.BR gethostent ()
call, that should return the next entry in the host data base.
This function is not reentrant,
and glibc adds a reentrant version
.BR gethostent_r ().
-.SS "GNU Extensions"
+.SS GNU extensions
Glibc2 also has a
.BR gethostbyname2 ()
that works like
does not recognize components of a dotted IPv4 address string
that are expressed in hexadecimal.
.\" http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=482973
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getaddrinfo (3),
.\" .BR getipnodebyaddr (3),
.\" .BR getipnodebyname (3),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 1993 Rickard E. Faith (faith@cs.unc.edu)
.\"
+.\" Updated with additions from Mitchum DSouza <m.dsouza@mrc-apu.cam.ac.uk>
+.\" Portions Copyright 1993 Mitchum DSouza <m.dsouza@mrc-apu.cam.ac.uk>
+.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\"
-.\" Updated with additions from Mitchum DSouza <m.dsouza@mrc-apu.cam.ac.uk>
-.\" Portions Copyright 1993 Mitchum DSouza <m.dsouza@mrc-apu.cam.ac.uk>
+.\" %%%LICENSE_END
.\"
.\" Modified Tue Oct 22 00:22:35 EDT 1996 by Eric S. Raymond <esr@thyrsus.com>
.TH GETHOSTID 3 2010-09-20 "Linux" "Linux Programmer's Manual"
The
.BR sethostid ()
call is restricted to the superuser.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR gethostid ()
returns the 32-bit identifier for the current host as set by
.BR sethostid ().
.B EPERM
The calling process's effective user or group ID is not the same
as its corresponding real ID.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.2BSD; these functions were dropped in 4.4BSD.
SVr4 includes
.BR gethostid ()
(This value may not be unique.)
.SH BUGS
It is impossible to ensure that the identifier is globally unique.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR hostid (1),
.BR gethostbyname (3)
.\" and copyright (c) 2009, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
+.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" for glibc specificities, provide an example.
.\" 2009-01-14 mtk, many edits and changes, rewrote example program.
.\"
-.TH GETIFADDRS 3 2010-10-06 "GNU" "Linux Programmer's Manual"
+.TH GETIFADDRS 3 2012-11-11 "GNU" "Linux Programmer's Manual"
.SH NAME
getifaddrs, freeifaddrs \- get interface addresses
.SH SYNOPSIS
.I sa_family
subfield should be consulted to determine the format of the
address structure.)
+This field may contain a NULL pointer.
.PP
The
.I ifa_netmask
field points to a structure containing the netmask associated with
.IR ifa_addr ,
if applicable for the address family.
+This field may contain a NULL pointer.
.PP
Depending on whether the bit
.B IFF_BROADCAST
In this case, the
.I ifa_data
field may contain a pointer to a
+.IR "struct rtnl_link_stats" ,
+defined in
+.IR <linux/if_link.h>
+(in Linux 2.4 and earlier,
.IR "struct net_device_stats" ,
defined in
-.IR <linux/netdevice.h> ,
+.IR <linux/netdevice.h> ),
which contains various interface attributes and statistics.
.SH EXAMPLE
The program below demonstrates the use of
.\" Copyright 2000 Sam Varshavchik <mrsam@courier-mta.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References: RFC 2553
.TH GETIPNODEBYNAME 3 2010-09-04 "Linux" "Linux Programmer's Manual"
.I len
must be set to
.IR "sizeof(struct in6_addr)" .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
A NULL pointer is returned if an error occurred, and
.I error_num
will contain an error code from the following list:
This is an array of one or more pointers to network address structures for the
network host.
The array is terminated by a NULL pointer.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
RFC\ 2553.
.\" Not in POSIX.1-2001.
.SH NOTES
removed again.
Several UNIX-like systems support them, but all
call them deprecated.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getaddrinfo (3),
.BR getnameinfo (3),
.BR inet_ntop (3),
.\" Copyright (c) 2001 John Levon <moz@compsoc.man.ac.uk>
.\" Based in part on GNU libc documentation
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
+.\"
.TH GETLINE 3 2010-06-12 "GNU" "Linux Programmer's Manual"
.SH NAME
getline, getdelim \- delimited string input
.BR getline (),
a delimiter character is not added if one was not present
in the input before end of file was reached.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR getline ()
and
is not valid).
.SH VERSIONS
These functions are available since libc 4.6.27.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
Both
.BR getline ()
and
.BR getdelim ()
were originally GNU extensions.
They were standardized in POSIX.1-2008.
-.SH "EXAMPLE"
+.SH EXAMPLE
.nf
#define _GNU_SOURCE
#include <stdio.h>
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR read (2),
.BR fgets (3),
.BR fopen (3),
.\" Copyright (c) 1989, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_3_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)getloadavg.3 8.1 (Berkeley) 6/4/93
.\"
.\" 4.3BSD Reno .
.SH VERSIONS
This function is available in glibc since version 2.2.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
Not in POSIX.1-2001.
Present on the BSDs and Solaris.
.\" mdoc seems to have a bug - there must be no newline here
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 1995 James R. Van Zandt <jrv@vanzandt.mv.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Changed Tue Sep 19 01:49:29 1995, aeb: moved from man2 to man3
.\" added ref to /etc/utmp, added BUGS section, etc.
\fBLOGNAME\fP to find out who the user is.
This is more flexible
precisely because the user can set \fBLOGNAME\fP arbitrarily.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR getlogin ()
returns a pointer to the username when successful,
and NULL on failure.
The system already has the maximum allowed number of open files.
.TP
.B ENXIO
-The calling process has no controlling tty.
+The calling process has no controlling terminal.
.TP
.B ERANGE
(getlogin_r)
\fI/var/run/utmp\fP
(traditionally \fI/etc/utmp\fP;
some libc versions used \fI/var/adm/utmp\fP)
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR getlogin ()
and
.BR getlogin_r ()
and
.BR setlogin (),
and a username
-associated with a session, even if it has no controlling tty.
+associated with a session, even if it has no controlling terminal.
.SH BUGS
Unfortunately, it is often rather easy to fool
.BR getlogin ().
the utmp file.
Often, it gives only the first 8 characters of
the login name.
-The user currently logged in on the controlling tty
+The user currently logged in on the controlling terminal
of our program need not be the user who started it.
Avoid
.BR getlogin ()
what you meant.
.B Do not use
.BR cuserid ().
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR geteuid (2),
.BR getuid (2),
.BR utmp (5)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.BR getmntent ()
will convert
from string representation to escaped representation and back.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR getmntent ()
and
/etc/fstab file system description file
/etc/mtab mounted file system description file
.fi
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The nonreentrant functions are from SunOS 4.1.3.
A routine
.BR getmntent_r ()
.BR getmntinfo (),
a wrapper around the system call
.BR getfsstat ().
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fopen (3),
.BR fstab (5),
.BR mount (8)
+.\" %%%LICENSE_START(PUBLIC_DOMAIN)
.\" This page is in the public domain.
+.\" %%%LICENSE_END
+.\"
.\" Almost all details are from RFC 2553.
.\"
.\" 2004-12-14, mtk, Added EAI_OVERFLOW error
.\" 2004-12-14 Fixed description of error return
.\"
-.TH GETNAMEINFO 3 2009-12-03 "GNU" "Linux Programmer's Manual"
+.TH GETNAMEINFO 3 2013-01-15 "GNU" "Linux Programmer's Manual"
.SH NAME
getnameinfo \- address-to-name translation in protocol-independent manner
.SH SYNOPSIS
and
.BR getservbyport (3),
but unlike those functions,
-.BR getaddrinfo (3)
+.BR getnameinfo ()
is reentrant and allows programs to eliminate
IPv4-versus-IPv6 dependencies.
If set, then the numeric form of the service address is returned.
(When not set, this will still happen in case the service's name
cannot be determined.)
-.SS "Extensions to getaddrinfo() for Internationalized Domain Names"
+.SS Extensions to getnameinfo() for Internationalized Domain Names
.PP
Starting with glibc 2.3.4,
.BR getnameinfo ()
IDNA_USE_STD3_ASCII_RULES (check output to make sure it is a STD3
conforming hostname)
flags respectively to be used in the IDNA handling.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.\" FIXME glibc defines the following additional errors, some which
.\" can probably be returned by getnameinfo(); they need to
.\" be documented.
.SH VERSIONS
.BR getnameinfo ()
is provided in glibc since version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
RFC\ 2553, POSIX.1-2001.
.SH NOTES
In order to assist the programmer in choosing reasonable sizes
.BR getnameinfo ()
can be found in
.BR getaddrinfo (3).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR accept (2),
.BR getpeername (2),
.BR getsockname (2),
.BR services (5),
.BR hostname (7),
.BR named (8)
-.LP
+
R. Gilligan, S. Thomson, J. Bound and W. Stevens,
.IR "Basic Socket Interface Extensions for IPv6" ,
RFC\ 2553, March 1999.
-.LP
+
Tatsuya Jinmei and Atsushi Onoe,
.IR "An Extension of Format for IPv6 Scoped Addresses" ,
-internet draft, work in progress.
-ftp://ftp.ietf.org/internet\-drafts/draft\-ietf\-ipngwg\-scopedaddr\-format\-02.txt
-.LP
+internet draft, work in progress
+.UR ftp://ftp.ietf.org\:/internet\-drafts\:/draft\-ietf\-ipngwg\-scopedaddr\-format\-02.txt
+.UE .
+
Craig Metz,
.IR "Protocol Independence Using the Sockets API" ,
Proceedings of the freenix track:
-2000 USENIX annual technical conference, June 2000.
+2000 USENIX annual technical conference, June 2000
.ad l
-http://www.usenix.org/publications/library/proceedings/usenix2000/freenix/metzprotocol.html
+.UR http://www.usenix.org\:/publications\:/library\:/proceedings\:/usenix2000\:/freenix\:/metzprotocol.html
+.UE .
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.TP
.I n_net
The network number in host byte order.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR getnetent (),
.BR getnetbyname ()
.TP
.I /etc/networks
networks database file
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD, POSIX.1-2001.
.SH NOTES
In glibc versions before 2.2, the
.BR getnetbyaddr ()
was of type
.IR long .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getnetent_r (3),
.BR getprotoent (3),
.BR getservent (3)
.\" Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH GETNETENT_R 3 2010-09-10 "GNU" "Linux Programmer's Manual"
.SH NAME
by the nonreentrant versions of these functions.
.\" getnetent.3 doesn't document any use of h_errno, but nevertheless
.\" the nonreentrant functions no seem to set h_errno.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these functions return 0.
On error, they return one of the positive error numbers listed in ERRORS.
Try again with a larger buffer
(and increased
.IR buflen ).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are GNU extensions.
Functions with similar names exist on some other systems,
though typically with different calling signatures.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getnetent (3),
.BR networks (5)
.\" Copyright (c) 1993 by Thomas Koenig (ig25@rz.uni-karlsruhe.de)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
+.\"
.\" Modified Sat Jul 24 19:27:50 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified Mon Aug 30 22:02:34 1995 by Jim Van Zandt <jrv@vanzandt.mv.com>
.\" longindex is a pointer, has_arg can take 3 values, using consistent
If an option that starts with \(aq\-\(aq
(not "\-\-") doesn't match a long option, but does match a short option,
it is parsed as a short option instead.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
If an option was successfully found, then
.BR getopt ()
returns the option character.
This behavior was removed in
.BR bash (1)
version 2.01, but the support remains in glibc.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.TP
.BR getopt ():
POSIX.2 and POSIX.1-2001,
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getsubopt (3)
.\" Copyright (c) 2000 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
-.TH GETPASS 3 2010-09-20 "Linux" "Linux Programmer's Manual"
+.TH GETPASS 3 2013-03-15 "Linux" "Linux Programmer's Manual"
.SH NAME
getpass \- get a password
.SH SYNOPSIS
.SH DESCRIPTION
This function is obsolete.
Do not use it.
+If you want to read input without terminal echoing enabled,
+see the description of the
+.I ECHO
+flag in
+.BR termios (3).
.PP
The
.BR getpass ()
restores the terminal state and closes
.I /dev/tty
again.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The function
.BR getpass ()
returns a pointer to a static buffer containing (the first
.\" A
.\" .BR getpass ()
.\" function appeared in Version 7 AT&T UNIX.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
Present in SUSv2, but marked LEGACY.
Removed in POSIX.1-2001.
.SH NOTES
.SH BUGS
The calling process should zero the password as soon as possible to avoid
leaving the cleartext password visible in the process's address space.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR crypt (3)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.TP
.I p_proto
The protocol number.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR getprotoent (),
.BR getprotobyname ()
.I /etc/protocols
protocol database file
.PD
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getnetent (3),
.BR getprotoent_r (3),
.BR getservent (3),
.\" Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH GETPROTOENT_R 3 2010-09-10 "GNU" "Linux Programmer's Manual"
.SH NAME
otherwise,
.I *result
is set to NULL.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these functions return 0.
On error, they return one of the positive error numbers listed in ERRORS.
Try again with a larger buffer
(and increased
.IR buflen ).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are GNU extensions.
Functions with similar names exist on some other systems,
though typically with different calling signatures.
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getprotoent (3),
.BR protocols (5)
-.\" Hey Emacs! This file is -*- nroff -*- source.
.\" This man page was written by Jeremy Phelps <jphelps@notreached.net>.
+.\"
+.\" %%%LICENSE_START(FREELY_REDISTRIBUTABLE)
.\" Redistribute and modify at will.
+.\" %%%LICENSE_END
.\"
.TH GETPT 3 2010-09-10 "GNU" "Linux Programmer's Manual"
.SH NAME
.fi
on Linux systems, though the pseudoterminal master is located
elsewhere on some systems that use GNU Libc.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR getpt ()
returns an open file descriptor upon successful completion.
Otherwise, it
use
.BR posix_openpt (3)
instead.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR grantpt (3),
.BR posix_openpt (3),
.BR ptsname (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.\"
.TH GETPW 3 2010-10-21 "GNU" "Linux Programmer's Manual"
.SH NAME
-getpw \- Re-construct password line entry
+getpw \- reconstruct password line entry
.SH SYNOPSIS
.nf
.BR "#define _GNU_SOURCE" " /* See feature_test_macros(7) */"
.PP
For more information about the fields of this structure, see
.BR passwd (5).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR getpw ()
function returns 0 on success; on error, it returns \-1, and
.TP
.I /etc/passwd
password database file
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr2.
.SH BUGS
The
.IR buf .
It is obsoleted by
.BR getpwuid (3).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR endpwent (3),
.BR fgetpwent (3),
.BR getpwent (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.PP
For more information about the fields of this structure, see
.BR passwd (5).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR getpwent ()
function returns a pointer to a
.TP
.I /etc/passwd
local password database file
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
The
.I pw_gecos
field is not specified in POSIX, but is present on most implementations.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fgetpwent (3),
.BR getpw (3),
.BR getpwent_r (3),
.\" Copyright (c) 2003 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.TH GETPWENT_R 3 2010-10-21 "GNU" "Linux Programmer's Manual"
.SH NAME
.IR *pwbuf ,
and a pointer to this \fIstruct passwd\fP is returned in
.IR *pwbufp .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these functions return 0 and
.I *pwbufp
is a pointer to the \fIstruct passwd\fP.
.B ERANGE
Insufficient buffer space supplied.
Try again with larger buffer.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are GNU extensions, done in a style resembling
the POSIX version of functions like
.BR getpwnam_r (3).
.\" printf("getpwent_r: %s", strerror(i));
.\" exit(EXIT_SUCCESS);
.\" }
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fgetpwent (3),
.BR getpw (3),
.BR getpwent (3),
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
the call fails with
.BR ERANGE ,
in which case the caller can retry with a larger buffer.)
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR getpwnam ()
and
.TP
.I /etc/passwd
local password database file
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
The
.I pw_gecos
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR endpwent (3),
.BR fgetpwent (3),
.BR getgrnam (3),
.\" This page was taken from the 4.4BSD-Lite CDROM (BSD license)
.\"
+.\" %%%LICENSE_START(BSD_ONELINE_CDROM)
+.\" This page was taken from the 4.4BSD-Lite CDROM (BSD license)
+.\" %%%LICENSE_END
+.\"
.\" @(#)getrpcent.3n 2.2 88/08/02 4.0 RPCSRC; from 1.11 88/03/14 SMI
.TH GETRPCENT 3 2008-08-19 "" "Linux Programmer's Manual"
.SH NAME
.fi
.SH DESCRIPTION
.LP
+The
.BR getrpcent (),
.BR getrpcbyname (),
and
.BR getrpcbynumber ()
-each return a pointer to an object with the
+functions each return a pointer to an object with the
following structure containing the broken-out
fields of an entry in the RPC program number data base.
.in +4n
The RPC program number for this service.
.RE
.LP
+The
.BR getrpcent ()
-reads the next entry from the database.
+function reads the next entry from the database.
A connection is opened to the database if necessary.
.LP
+The
.BR setrpcent ()
function opens a connection to the database,
and sets the next entry to the first entry.
.BR endrpcent ()
function closes the connection to the database.
.LP
+The
.BR getrpcbyname ()
and
.BR getrpcbynumber ()
-sequentially search from the beginning
+functions sequentially search from the beginning
of the file until a matching RPC program name or
program number is found, or until end-of-file is encountered.
.SH RETURN VALUE
.TP
.I /etc/rpc
RPC program number database.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
Not in POSIX.1-2001.
Present on the BSDs, Solaris, and many other systems.
.SH BUGS
is contained in a static area
so it must be copied if it is
to be saved.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getrpcent_r (3),
.BR rpc (5),
.BR rpcinfo (8),
.\" Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH GETRPCENT_R 3 2010-09-10 "GNU" "Linux Programmer's Manual"
.SH NAME
otherwise,
.I *result
is set to NULL.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these functions return 0.
On error, they return one of the positive error numbers listed in ERRORS.
Try again with a larger buffer
(and increased
.IR buflen ).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are GNU extensions.
Functions with similar names exist on some other systems,
though typically with different calling signatures.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getrpcent (3),
.BR rpc (5)
.\" This page was taken from the 4.4BSD-Lite CDROM (BSD license)
.\"
+.\" %%%LICENSE_START(BSD_ONELINE_CDROM)
+.\" This page was taken from the 4.4BSD-Lite CDROM (BSD license)
+.\" %%%LICENSE_END
+.\"
.\" @(#)getrpcport.3r 2.2 88/08/02 4.0 RPCSRC; from 1.12 88/02/26 SMI
.TH GETRPCPORT 3 2007-12-23 "" "Linux Programmer's Manual"
.SH NAME
it will still return a port number (for some version of the program)
indicating that the program is indeed registered.
The version mismatch will be detected upon the first call to the service.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
Not in POSIX.1-2001.
Present on the BSDs, Solaris, and many other systems.
.\" Copyright (c) 1993 by Thomas Koenig (ig25@rz.uni-karlsruhe.de)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
+.\"
.\" Modified Wed Jul 28 11:12:07 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified Fri Sep 8 15:48:13 1995 by Andries Brouwer (aeb@cwi.nl)
.TH GETS 3 2012-01-18 "GNU" "Linux Programmer's Manual"
.PP
For nonlocking counterparts, see
.BR unlocked_stdio (3).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR fgetc (),
.BR getc ()
and
on success, or
.B EOF
on error.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C89, C99, POSIX.1-2001.
LSB deprecates
.BR read (2)
for the file descriptor associated with the input stream; the results
will be undefined and very probably not what you want.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR read (2),
.BR write (2),
.BR ferror (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.TP
.I s_proto
The name of the protocol to use with this service.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR getservent (),
.BR getservbyname ()
.TP
.I /etc/services
services database file
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getnetent (3),
.BR getprotoent (3),
.BR getservent_r (3),
.\" Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH GETSERVENT_R 3 2010-09-10 "GNU" "Linux Programmer's Manual"
.SH NAME
otherwise,
.I *result
is set to NULL.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these functions return 0.
On error, they return one of the positive error numbers listed in errors.
Try again with a larger buffer
(and increased
.IR buflen ).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are GNU extensions.
Functions with similar names exist on some other systems,
though typically with different calling signatures.
char **p;
if (argc < 3) {
- printf("Usage: %s port\-num proto-name [buflen]\\n", argv[0]);
+ printf("Usage: %s port\-num proto\-name [buflen]\\n", argv[0]);
exit(EXIT_FAILURE);
}
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getservent (3),
.BR services (5)
.\" Copyright (c) 2003 Andries Brouwer (aeb@cwi.nl) and
.\" Walter Harms (walter.harms@informatik.uni-oldenburg.de)
.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
-.TH GETSPNAM 3 2010-02-25 "GNU" "Linux Programmer's Manual"
+.TH GETSPNAM 3 2013-01-22 "GNU" "Linux Programmer's Manual"
.SH NAME
getspnam, getspnam_r, getspent, getspent_r, setspent, endspent,
fgetspent, fgetspent_r, sgetspent, sgetspent_r, putspent,
They are widely available.
.\" Also in libc5
.\" SUN doesn't have sgetspent()
-.SS "Reentrant versions"
+.SS Reentrant versions
Analogous to the reentrant functions for the password database, glibc
also has reentrant functions for the shadow password database.
The
struct spwd {
char *sp_namp; /* Login name */
char *sp_pwdp; /* Encrypted password */
- long sp_lstchg; /* Date of last change (measured
- in days since 1970-01-01 00:00:00 +0000 (UTC)) */
+ long sp_lstchg; /* Date of last change
+ (measured in days since
+ 1970-01-01 00:00:00 +0000 (UTC)) */
long sp_min; /* Min # of days between changes */
long sp_max; /* Max # of days between changes */
long sp_warn; /* # of days before password expires
to warn user to change it */
long sp_inact; /* # of days after password expires
until account is disabled */
- long sp_expire; /* Date when account expires (measured
- in days since 1970-01-01 00:00:00 +0000 (UTC)) */
+ long sp_expire; /* Date when account expires
+ (measured in days since
+ 1970-01-01 00:00:00 +0000 (UTC)) */
unsigned long sp_flag; /* Reserved */
};
.fi
.in
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The functions that return a pointer return NULL if no more entries
are available or if an error occurs during processing.
The functions which have \fIint\fP as the return value return 0 for
In case of error, an error number is returned.
.SH ERRORS
.TP
+.B EACCES
+The caller does not have permission to access the shadow password file.
+.TP
.B ERANGE
Supplied buffer is too small.
.SH FILES
defines the constant
.B _PATH_SHADOW
to the pathname of the shadow password file.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The shadow password database and its associated API are
not specified in POSIX.1-2001.
However, many other systems provide a similar API.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getgrnam (3),
.BR getpwnam (3),
.BR getpwnam_r (3),
.\" Copyright (C) 2007 Michael Kerrisk <mtk.manpages@gmail.com>
.\" and Copyright (C) 2007 Justin Pryzby <pryzbyj@justinpryzby.com>
.\"
+.\" %%%LICENSE_START(PERMISSIVE_MISC)
.\" Permission is hereby granted, free of charge, to any person obtaining
.\" a copy of this software and associated documentation files (the
.\" "Software"), to deal in the Software without restriction, including
.\" CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
.\" TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
.\" SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
+.\" %%%LICENSE_END
.\"
.TH GETSUBOPT 3 2010-09-26 "GNU" "Linux Programmer's Manual"
.SH NAME
.\" Copyright 2002 walter harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH GETTTYENT 3 2002-07-18 "GNU" "Linux Programmer's Manual"
.SH NAME
The function
.BR getttynam ()
-searches for a given ttyname in the file.
+searches for a given terminal name in the file.
It returns a pointer to a
.I ttyent
structure (description below).
#define TTY_ON 0x01 /* enable logins (start ty_getty program) */
#define TTY_SECURE 0x02 /* allow UID 0 to login */
.fi
-.SH "CONFORMING TO"
+.SH CONFORMING TO
Not in POSIX.1-2001.
Present on the BSDs, and perhaps other systems.
.SH NOTES
Under Linux the file
.IR /etc/ttys ,
and the functions described above, are not used.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ttyname (3),
.BR ttyslot (3)
.\" Copyright (C) 2002 Andries Brouwer <aeb@cwi.nl>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" This replaces an earlier man page written by Walter Harms
.\" <walter.harms@informatik.uni-oldenburg.de>.
a lock with the
.BR umask (2)
library call).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This is a vaporware GNU extension.
.SH NOTES
This function is documented but not implemented yet in glibc,
as at version 2.9.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR umask (2)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
The
.BR endusershell ()
function closes \fI/etc/shells\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR getusershell ()
function returns a NULL pointer on end-of-file.
.nf
/etc/shells
.fi
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR shells (5)
.\" Copyright 1995 Mark D. Roth (roth@uiuc.edu)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
If it cannot find an appropriate slot for \fIut\fP,
.BR pututline ()
will append the new entry to the end of the file.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR getutent (),
.BR getutid (),
and
/var/run/utmp database of currently logged-in users
.br
/var/log/wtmp database of past user logins
-.SH "CONFORMING TO"
+.SH CONFORMING TO
XPG2, SVr4.
.LP
In XPG2 and SVID 2 the function
their counterparts without the "x" (e.g.,
.BR getutxent ()
is an alias for
-.BR gettutent ()).
+.BR getutent ()).
.SH NOTES
-.SS Glibc Notes
+.SS Glibc notes
The above functions are not thread-safe.
Glibc adds reentrant versions
.sp
.nf
.BR "#define _GNU_SOURCE" " /* or _SVID_SOURCE or _BSD_SOURCE;
-.RB "\& see " feature_test_macros(7) " */"
+.RB "\& see " feature_test_macros "(7) */"
.B #include <utmp.h>
.sp
.BI "int getutent_r(struct utmp *" ubuf ", struct utmp **" ubufp );
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getutmp (3),
.BR utmp (5)
.\" Copyright (c) 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH GETUTMP 3 2010-09-10 "Linux" "Linux Programmer's Manual"
.SH NAME
.\" Copyright (c) 1995 by Jim Van Zandt <jrv@vanzandt.mv.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
+.\"
.TH GETW 3 2010-09-26 "GNU" "Linux Programmer's Manual"
.SH NAME
getw, putw \- input and output of words (ints)
It is provided for compatibility with SVr4, but we recommend you use
.BR fwrite (3)
instead.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
Normally,
.BR getw ()
returns the word read, and
.BR putw ()
returns 0.
On error, they return \fBEOF\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, SUSv2. Not present in POSIX.1-2001.
.SH BUGS
The value returned on error is also a legitimate data value.
.BR ferror (3)
can be used to distinguish between the two cases.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ferror (3),
.BR fread (3),
.BR fwrite (3),
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.PP
For a nonlocking counterpart, see
.BR unlocked_stdio (3).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR getwchar ()
function returns the next wide-character from
standard input, or
.BR WEOF .
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
will actually
read a multibyte sequence from standard input and then
convert it to a wide character.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fgetwc (3),
.BR unlocked_stdio (3)
.\" Copyright (c) 1993 by Thomas Koenig (ig25@rz.uni-karlsruhe.de)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
+.\"
.\" Modified Wed Jul 28 11:12:17 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified Mon May 13 23:08:50 1996 by Martin Schulze (joey@linux.de)
.\" Modified 11 May 1998 by Joseph S. Myers (jsm28@cam.ac.uk)
is set to the flags specified, \fBor\fRed with
.B GLOB_MAGCHAR
if any metacharacters were found.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On successful completion,
.BR glob ()
returns zero.
.TP
.B GLOB_NOMATCH
for no found matches.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.2, POSIX.1-2001.
.SH NOTES
The structure elements
execvp("ls", &globbuf.gl_pathv[0]);
.in
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ls (1),
.BR sh (1),
.BR stat (2),
.\" Copyright (c) 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH GNU_GET_LIBC_VERSION 3 2010-09-10 "Linux" "Linux Programmer's Manual"
+.TH GNU_GET_LIBC_VERSION 3 2012-08-26 "Linux" "Linux Programmer's Manual"
.SH NAME
gnu_get_libc_version, gnu_get_libc_release \- get glibc version and release
.SH SYNOPSIS
.nf
-.BR "#define _GNU_SOURCE" " /* See feature_test_macros(7) */"
.B #include <gnu/libc-version.h>
.B const char *gnu_get_libc_version(void);
-.\" Hey Emacs! This file is -*- nroff -*- source.
+.\" %%%LICENSE_START(PUBLIC_DOMAIN)
.\" This page is in the public domain. - aeb
+.\" %%%LICENSE_END
.\"
.TH GRANTPT 3 2008-06-14 "GNU" "Linux Programmer's Manual"
.SH NAME
is unspecified if a signal handler is installed to catch
.B SIGCHLD
signals.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
When successful,
.BR grantpt ()
returns 0.
.SH VERSIONS
.BR grantpt ()
is provided in glibc since version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
This is part of the UNIX 98 pseudoterminal support, see
Many systems implement this function via a set-user-ID helper binary
called "pt_chown".
With Linux devpts no such helper binary is required.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR open (2),
.BR posix_openpt (3),
.BR ptsname (3),
.\" Copyright (C) 2002 Andries Brouwer <aeb@cwi.nl>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" This replaces an earlier man page written by Walter Harms
.\" <walter.harms@informatik.uni-oldenburg.de>.
The range of possible values
.I signum
varies (often 1-15 or 1-17).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are available under AIX, DG/UX, HP-UX, SCO, Solaris, Tru64.
They are called obsolete under most of these systems, and are
broken under Linux libc and glibc.
.BR gsignal_r ()
and
.BR ssignal_r ().
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR kill (2),
.BR signal (2),
.BR raise (3)
.\" Copyright (c) 1990, 1993
.\" The Regents of the University of California. All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)hash.3 8.6 (Berkeley) 8/18/94
.\"
.BR dbopen (3).
.SH BUGS
Only big and little endian byte order are supported.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR btree (3),
.BR dbopen (3),
.BR mpool (3),
.BR recno (3)
-.sp
+
.IR "Dynamic Hash Tables" ,
Per-Ake Larson, Communications of the ACM, April 1988.
-.sp
+
.IR "A New Hash Package for UNIX" ,
Margo Seltzer, USENIX Proceedings, Winter 1991.
-.\" Hey Emacs! This file is -*- nroff -*- source.
.\" Copyright 1993 Ulrich Drepper (drepper@karlsruhe.gmd.de)
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" SunOS 4.1.1 man pages
in that a pointer to the found item is returned in
.IR *retval ,
rather than as the function result.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR hcreate ()
and
.BR hcreate_r ()
POSIX.1-2001 only specifies the
.B ENOMEM
error.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The functions
.BR hcreate (),
.BR hsearch (),
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR bsearch (3),
.BR lsearch (3),
.BR malloc (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.\" FIXME . Is it intentional that these functions do not set errno?
.\" They do set errno for the overflow case.
.\" Bug raised: http://sources.redhat.com/bugzilla/show_bug.cgi?id=6795
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
also conforms to
SVr4, 4.3BSD.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cabs (3),
.BR sqrt (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
In this case, the
.BR iconv ()
function sets \fIcd\fP's conversion state to the initial state.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR iconv ()
function returns the number of characters converted in a
An incomplete multibyte sequence has been encountered in the input.
.SH VERSIONS
This function is available in glibc since version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
Although
for accessing characters in the appropriate character set.
This includes ensuring correct alignment on platforms that have
tight restrictions on alignment.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR iconv_close (3),
.BR iconv_open (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
function deallocates a conversion descriptor \fIcd\fP
previously allocated using
.BR iconv_open (3).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
When successful, the
.BR iconv_close ()
function returns 0.
and returns \-1.
.SH VERSIONS
This function is available in glibc since version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
UNIX98, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR iconv (3),
.BR iconv_open (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
To bring the state back to the initial state, use
.BR iconv (3)
with NULL as \fIinbuf\fP argument.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR iconv_open ()
function returns a freshly allocated conversion
implementation.
.SH VERSIONS
This function is available in glibc since version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
UNIX98, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR iconv (1),
.BR iconv (3),
.BR iconv_close (3)
--- /dev/null
+.so man3/if_nameindex.3
--- /dev/null
+.so man3/if_nametoindex.3
--- /dev/null
+.\" Copyright (c) 2012 YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
+.\" and Copyright (c) 2012 Michael Kerrisk <mtk.manpages@gmail.com>
+.\"
+.\" %%%LICENSE_START(VERBATIM)
+.\" Permission is granted to make and distribute verbatim copies of this
+.\" manual provided the copyright notice and this permission notice are
+.\" preserved on all copies.
+.\"
+.\" Permission is granted to copy and distribute modified versions of
+.\" this manual under the conditions for verbatim copying, provided that
+.\" the entire resulting derived work is distributed under the terms of
+.\" a permission notice identical to this one.
+.\"
+.\" Since the Linux kernel and libraries are constantly changing, this
+.\" manual page may be incorrect or out-of-date. The author(s) assume.
+.\" no responsibility for errors or omissions, or for damages resulting.
+.\" from the use of the information contained herein. The author(s) may.
+.\" not have taken the same level of care in the production of this.
+.\" manual, which is licensed free of charge, as they might when working.
+.\" professionally.
+.\"
+.\" Formatted or processed versions of this manual, if unaccompanied by
+.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
+.\"
+.TH IF_NAMEINDEX 3 2012-11-21 "GNU" "Linux Programmer's Manual"
+.SH NAME
+if_nameindex, if_freenameindex \- get network interface names and indexes
+.SH SYNOPSIS
+.nf
+.B #include <net/if.h>
+.sp
+.BI "struct if_nameindex *if_nameindex(void);
+.BI "void if_freenameindex(struct if_nameindex *" "ptr" );
+.fi
+.SH DESCRIPTION
+The
+.BR if_nameindex ()
+function returns an array of
+.I if_nameindex
+structures, each containing information
+about one of the network interfaces on the local system.
+The
+.I if_nameindex
+structure contains at least the following entries:
+.sp
+.in +4n
+.nf
+ unsigned int if_index; /* Index of interface (1, 2, ...) */
+ char *if_name; /* Null-terminated name ("eth0", etc.) */
+.fi
+.in
+.PP
+The
+.I if_index
+field contains the interface index.
+The
+.I ifa_name
+field points to the null-terminated interface name.
+The end of the array is indicated by entry with
+.I if_index
+set to zero and
+.I ifa_name
+set to NULL.
+.PP
+The data structure returned by
+.BR if_nameindex ()
+is dynamically allocated and should be freed using
+.BR if_freenameindex ()
+when no longer needed.
+.SH RETURN VALUE
+On success,
+.BR if_nameindex ()
+returns pointer to the array;
+on error, a NULL pointer is returned, and
+.I errno
+is set appropriately.
+.SH ERRORS
+.BR if_nameindex ()
+may fail and set
+.I errno
+if:
+.TP
+.B ENOBUFS
+Insufficient resources available.
+.PP
+.BR if_nameindex ()
+may also fail for any of the errors specified for
+.BR socket (2),
+.BR bind (2),
+.BR ioctl (2),
+.BR getsockname (2),
+.BR recvmsg (2),
+.BR sendto (2),
+or
+.BR malloc (3).
+.SH VERSIONS
+The
+.BR if_nameindex ()
+function first appeared in glibc 2.1, but before glibc 2.3.4,
+the implementation only supported interfaces with IPv4 addresses.
+Support of interfaces that don't have IPv4 addresses is only available
+on kernels that support netlink.
+.SH CONFORMING TO
+RFC\ 3493, POSIX.1-2001.
+
+This function first appeared in BSDi.
+.SH EXAMPLE
+The program below demonstrates the use of the functions described
+on this page.
+An example of the output this program might produce is the following:
+.in +4n
+.nf
+$ \fB./a.out\fI
+1: lo
+2: wlan0
+3: em1
+.fi
+.in
+.SS Program source
+.nf
+#include <net/if.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <unistd.h>
+
+int
+main(int argc, char *argv[])
+{
+ struct if_nameindex *if_ni, *i;
+
+ if_ni = if_nameindex();
+ if (if_ni == NULL) {
+ perror("if_nameindex");
+ exit(EXIT_FAILURE);
+ }
+
+ for (i = if_ni; ! (i\->if_index == 0 && i\->if_name == NULL); i++)
+ printf("%u: %s\\n", i\->if_index, i\->if_name);
+
+ if_freenameindex(if_ni);
+
+ exit(EXIT_SUCCESS);
+}
+.fi
+.SH SEE ALSO
+.BR getsockopt (2),
+.BR setsockopt (2),
+.BR getifaddrs (3),
+.BR if_indextoname (3),
+.BR if_nametoindex (3),
+.BR ifconfig (8)
--- /dev/null
+.\" Copyright (c) 2012 YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
+.\"
+.\" %%%LICENSE_START(VERBATIM)
+.\" Permission is granted to make and distribute verbatim copies of this
+.\" manual provided the copyright notice and this permission notice are
+.\" preserved on all copies.
+.\"
+.\" Permission is granted to copy and distribute modified versions of
+.\" this manual under the conditions for verbatim copying, provided that
+.\" the entire resulting derived work is distributed under the terms of
+.\" a permission notice identical to this one.
+.\"
+.\" Since the Linux kernel and libraries are constantly changing, this
+.\" manual page may be incorrect or out-of-date. The author(s) assume.
+.\" no responsibility for errors or omissions, or for damages resulting.
+.\" from the use of the information contained herein. The author(s) may.
+.\" not have taken the same level of care in the production of this.
+.\" manual, which is licensed free of charge, as they might when working.
+.\" professionally.
+.\"
+.\" Formatted or processed versions of this manual, if unaccompanied by
+.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
+.\"
+.TH IF_NAMETOINDEX 3 2012-12-14 "GNU" "Linux Programmer's Manual"
+.SH NAME
+if_nametoindex, if_indextoname \- mappings between network interface
+names and indexes
+.SH SYNOPSIS
+.nf
+.B #include <net/if.h>
+.sp
+.BI "unsigned int if_nametoindex(const char *" "ifname" );
+.sp
+.BI "char *if_indextoname(unsigned int ifindex, char *" ifname );
+.fi
+.SH DESCRIPTION
+The
+.BR if_nametoindex ()
+function returns the index of the network interface
+corresponding to the name
+.IR ifname .
+
+The
+.BR if_indextoname ()
+function returns the name of the network interface
+corresponding to the interface index
+.IR ifindex .
+The name is placed in the buffer pointed to by
+.IR ifname .
+The buffer must allow for the storage of at least
+.B IF_NAMESIZE
+bytes.
+.SH RETURN VALUE
+On success,
+.BR if_nametoindex ()
+returns the index number of the network interface;
+on error, 0 is returned and
+.I errno
+is set appropriately.
+
+On success,
+.BR if_indextoname ()
+returns
+.IR ifname ;
+on error, NULL is returned and
+.I errno
+is set appropriately.
+.SH ERRORS
+.BR if_indextoname ()
+may fail and set
+.I errno
+if:
+.TP
+.B ENXIO
+No interface found for the index.
+.PP
+.BR if_nametoindex ()
+and
+.BR if_indextoname ()
+may also fail for any of the errors specified for
+.BR socket (2)
+or
+.BR ioctl (2).
+.SH CONFORMING TO
+RFC\ 3493, POSIX.1-2001.
+
+This function first appeared in BSDi.
+.SH SEE ALSO
+.BR getifaddrs (3),
+.BR if_nameindex (3),
+.BR ifconfig (8)
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Inspired by a page by Walter Harms created 2002-08-10
.\"
.\" or raise an exception?
.\" log(), log2(), log10() do set errno
.\" Bug raised: http://sources.redhat.com/bugzilla/show_bug.cgi?id=6794
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR log (3),
.BR logb (3),
.BR significand (3)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.PP
The terminating null byte (\(aq\\0\(aq) is considered to be a part of the
strings.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR index ()
and
.BR rindex ()
functions return a pointer to
the matched character or NULL if the character is not found.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD; marked as LEGACY in POSIX.1-2001.
POSIX.1-2008 removes the specifications of
.BR index ()
and
.BR strrchr (3)
instead.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR memchr (3),
.BR strchr (3),
.BR string (3),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\" and Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.\" Add discussion of Classful Addressing, noting that it is obsolete.
.\" Added an EXAMPLE program.
.\"
-.TH INET 3 2008-06-19 "GNU" "Linux Programmer's Manual"
+.TH INET 3 2013-02-10 "GNU" "Linux Programmer's Manual"
.SH NAME
inet_aton, inet_addr, inet_network, inet_ntoa, inet_makeaddr, inet_lnaof,
inet_netof \- Internet address manipulation routines
};
.fi
.in
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD.
.BR inet_addr ()
and
}
if (inet_aton(argv[1], &addr) == 0) {
- perror("inet_aton");
+ fprintf(stderr, "Invalid address\\n");
exit(EXIT_FAILURE);
}
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR byteorder (3),
.BR getaddrinfo (3),
.BR gethostbyname (3),
.\" Copyright 2000 Sam Varshavchik <mrsam@courier-mta.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References: RFC 2553
.TH INET_NTOP 3 2008-11-11 "Linux" "Linux Programmer's Manual"
must be at least
.B INET6_ADDRSTRLEN
bytes long.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR inet_ntop ()
returns a non-NULL pointer to
.B ENOSPC
The converted address string would exceed the size given by
.IR size .
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
Note that RFC\ 2553 defines a prototype where the last argument
.I size
.SH EXAMPLE
See
.BR inet_pton (3).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getnameinfo (3),
.BR inet (3),
.BR inet_pton (3)
.\" Copyright 2000 Sam Varshavchik <mrsam@courier-mta.com>
.\" and Copyright (c) 2008 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References: RFC 2553
.TH INET_PTON 3 2008-06-18 "Linux" "Linux Programmer's Manual"
.RE
.IP
See RFC 2373 for further details on the representation of IPv6 addresses.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR inet_pton ()
returns 1 on success (network address was successfully converted).
0 is returned if
.I errno
is set to
.BR EAFNOSUPPORT .
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
Unlike
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getaddrinfo (3),
.BR inet (3),
.BR inet_ntop (3)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
to represent infinity or anything else to represent NaN.
\fIerrno\fP
is also set.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
If \fIerror\fP is
.B ERANGE
(Infinity),
.TP
.B ERANGE
The value of \fIerror\fP is positive infinity or negative infinity.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD.
.SH NOTES
This obsolete function was provided in
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
The
.I user
argument must be non-NULL.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR initgroups ()
function returns 0 on success.
.nf
\fI/etc/group\fP group database file
.fi
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getgroups (2),
.BR setgroups (2),
.BR credentials (7)
.\" $Id: insque.3,v 1.2 1996/10/30 21:03:39 meem Exp meem $
.\" and Copyright (c) 2010, Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code (5.4.7)
.BR remque ()
function removes the element pointed to by \fIelem\fP from the
doubly-linked list.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
-.SH "NOTES"
+.SH NOTES
Traditionally (e.g., SunOS, Linux libc 4 and libc 5),
the arguments of these functions were of type \fIstruct qelem *\fP,
defined as:
.\" Copyright (C) 2007 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 2007-10-23 mtk, Nearly a complete rewrite of the earlier page.
.TH INTRO 3 2010-11-11 "Linux" "Linux Programmer's Manual"
.SH NAME
-intro \- Introduction to library functions
+intro \- introduction to library functions
.SH DESCRIPTION
Section 3 of the manual describes all library functions excluding the library
functions (system call wrappers) described in section 2,
.\" .IP (3X)
.\" Various special libraries. The manual pages documenting their functions
.\" specify the library names.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
Certain terms and abbreviations are used to indicate UNIX variants
and standards to which calls in this section conform.
See
.BR standards (7).
.SH NOTES
-.SS Authors and Copyright Conditions
+.SS Authors and copyright conditions
Look at the header of the manual page source for the author(s) and copyright
conditions.
Note that these can be different from page to page!
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR intro (2),
.BR errno (3),
.BR capabilities (7),
.\" Copyright (c) 1993 by Thomas Koenig (ig25@rz.uni-karlsruhe.de)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
.\"
.\" Modified Sat Jul 24 19:10:00 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified Sun Aug 21 17:51:50 1994 by Rik Faith (faith@cs.unc.edu)
checks for a hexadecimal digits, that is, one of
.br
.BR "0 1 2 3 4 5 6 7 8 9 a b c d e f A B C D E F" .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The values returned are nonzero if the character
.I c
falls into the tested class, and a zero value
if not.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, 4.3BSD.
C89 specifies all of these functions except
.BR isascii ()
will not recognize an A-umlaut (\(:A) as an uppercase letter in the default
.B "C"
locale.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR iswalnum (3),
.BR iswalpha (3),
.BR iswblank (3),
.\" Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH ISATTY 3 2008-12-03 "Linux" "Linux Programmer's Manual"
.SH NAME
.BR ENOTTY
.\" FIXME File a bug for this?
for this case.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fstat (2),
.BR ttyname (3)
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
+.\"
.\" 2002-07-27 Walter Harms
.\" this was done with the help of the glibc manual
.\"
returns 1 if \fIx\fP or \fIy\fP is NaN and 0 otherwise.
.SH ERRORS
No errors occur.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
.SH NOTES
Not all hardware supports these functions,
and where hardware support isn't provided, they will be emulated by macros.
This will result in a performance penalty.
Don't use these functions if NaN is of no concern for you.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fpclassify (3),
.BR isnan (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.PP
The wide-character class "alnum" always contains at least the letters \(aqA\(aq
to \(aqZ\(aq, \(aqa\(aq to \(aqz\(aq and the digits \(aq0\(aq to \(aq9\(aq.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR iswalnum ()
function returns nonzero
if \fIwc\fP is a wide character
belonging to the wide-character class "alnum".
Otherwise it returns zero.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.B LC_CTYPE
category of the
current locale.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR isalnum (3),
.BR iswctype (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.PP
The wide-character class "alpha" always contains at least the
letters \(aqA\(aq to \(aqZ\(aq and \(aqa\(aq to \(aqz\(aq.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR iswalpha ()
function returns nonzero
if \fIwc\fP is a wide character
belonging to the wide-character class "alpha".
Otherwise it returns zero.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.B LC_CTYPE
category of the
current locale.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR isalpha (3),
.BR iswctype (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
The wide-character class "blank" always contains
at least the space character
and the control character \(aq\\t\(aq.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR iswblank ()
function returns nonzero
if \fIwc\fP is a wide character
belonging to the wide-character class "blank".
Otherwise it returns zero.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
The behavior of
.B LC_CTYPE
category of the
current locale.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR isblank (3),
.BR iswctype (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
For an unsigned char \fIc\fP, \fIiscntrl(c)\fP
implies \fIiswcntrl(btowc(c))\fP,
but not vice versa.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR iswcntrl ()
function returns nonzero if \fIwc\fP is a
wide character belonging to the wide-character class "cntrl".
Otherwise it returns zero.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.B LC_CTYPE
category of the
current locale.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR iscntrl (3),
.BR iswctype (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
returned by the
.BR wctype (3)
function.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR iswctype ()
function returns nonzero if
the \fIwc\fP has the designated
property.
Otherwise it returns 0.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.B LC_CTYPE
category of the
current locale.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR iswalnum (3),
.BR iswalpha (3),
.BR iswblank (3),
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.PP
The wide-character class "digit" always
contains exactly the digits \(aq0\(aq to \(aq9\(aq.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR iswdigit ()
function returns nonzero
if \fIwc\fP is a wide character
belonging to the wide-character class "digit".
Otherwise it returns zero.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.B LC_CTYPE
category of the
current locale.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR isdigit (3),
.BR iswctype (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
wide-character class "print" except the space character.
It therefore contains
the wide-character classes "alnum" and "punct".
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR iswgraph ()
function returns nonzero
if \fIwc\fP is a wide character
belonging to the wide-character class "graph".
Otherwise it returns zero.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.B LC_CTYPE
category of the
current locale.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR isgraph (3),
.BR iswctype (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.PP
The wide-character class "lower" always contains
at least the letters \(aqa\(aq to \(aqz\(aq.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR iswlower ()
function returns nonzero
if \fIwc\fP is a wide character
belonging to the wide-character class "lower".
Otherwise it returns zero.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.PP
This function is not very appropriate for dealing with Unicode characters,
because Unicode knows about three cases: upper, lower and title case.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR islower (3),
.BR iswctype (3),
.BR towlower (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
"cntrl".
.PP
The wide-character class "print" contains the wide-character class "graph".
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR iswprint ()
function returns nonzero if \fIwc\fP is a
wide character belonging to the wide-character class "print".
Otherwise it returns zero.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.B LC_CTYPE
category of the
current locale.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR isprint (3),
.BR iswctype (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
the wide-character class
"punct" is disjoint from the wide-character class "space" and its subclass
"blank".
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR iswpunct ()
function returns nonzero
if \fIwc\fP is a wide-character
belonging to the wide-character class "punct".
Otherwise it returns zero.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
This function's name is a misnomer when dealing with Unicode characters,
because the wide-character class "punct" contains both punctuation characters
and symbol (math, currency, etc.) characters.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ispunct (3),
.BR iswctype (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
The wide-character class "space" always contains at least the space character
and the control
characters \(aq\\f\(aq, \(aq\\n\(aq, \(aq\\r\(aq, \(aq\\t\(aq, \(aq\\v\(aq.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR iswspace ()
function returns nonzero if \fIwc\fP is a wide character
belonging to the wide-character class "space".
Otherwise it returns zero.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.B LC_CTYPE
category of the
current locale.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR isspace (3),
.BR iswctype (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.PP
The wide-character class "upper" always contains at least the
letters \(aqA\(aq to \(aqZ\(aq.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR iswupper ()
function returns nonzero if \fIwc\fP is a wide character
belonging to the wide-character class "upper".
Otherwise it returns zero.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.PP
This function is not very appropriate for dealing with Unicode characters,
because Unicode knows about three cases: upper, lower and title case.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR isupper (3),
.BR iswctype (3),
.BR towupper (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
The wide-character class "xdigit" always contains at least the
letters \(aqA\(aq to \(aqF\(aq, \(aqa\(aq to \(aqf\(aq
and the digits \(aq0\(aq to \(aq9\(aq.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR iswxdigit ()
function returns nonzero if \fIwc\fP is a wide character
belonging to the wide-character class "xdigit".
Otherwise it returns zero.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.B LC_CTYPE
category of the
current locale.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR iswctype (3),
.BR isxdigit (3)
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.\" FIXME . Is it intentional that these functions do not raise exceptions?
.\" e.g., j0(1.5e16)
.\" Bug raised: http://sources.redhat.com/bugzilla/show_bug.cgi?id=6805
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The functions returning
.I double
conform to SVr4, 4.3BSD,
.\" Copyright 2002 walter harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
+.\"
.\" I had no way the check the functions out
.\" be careful
.TH KEY_SETSECRET 3 2002-07-18 "" "Linux Programmer's Manual"
.BR key_secretkey_is_set ()
can be used to determine whether a key has been
set for the effective UID of the calling process.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
These functions return 1 on success and 0 on failure.
.SH NOTES
Note that we talk about two types of encryption here.
64-bit DES.
.PP
These routines were part of the Linux/Doors-project, abandoned by now.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR crypt (3)
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
An underflow floating-point exception
.RB ( FE_UNDERFLOW )
is raised.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
also conforms to
SVr4, 4.3BSD, C89.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR frexp (3),
.BR modf (3),
.BR scalbln (3)
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
-.\" Distributed under GPL
-.\" based on glibc infopages
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
+.\" Distributed under GPL
+.\" %%%LICENSE_END
+.\"
+.\" based on glibc infopages
+.\"
.TH LGAMMA 3 2010-09-11 "" "Linux Programmer's Manual"
.SH NAME
lgamma, lgammaf, lgammal, lgamma_r, lgammaf_r, lgammal_r, signgam \-
is raised.
.\" glibc (as at 2.8) also supports an inexact
.\" exception for various cases.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The
.BR lgamma ()
functions are specified in C99 and POSIX.1-2001.
instead of the POSIX-mandated
.BR ERANGE .
Since version 2.10, glibc does the right thing.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR tgamma (3)
.\" Copyright (C) 2010, Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.TH LIO_LISTIO 3 2012-05-08 "" "Linux Programmer's Manual"
.SH NAME
The
.BR lio_listio ()
function is available since glibc 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001, POSIX.1-2008.
.SH NOTES
It is a good idea to zero out the control blocks before use.
Simultaneous I/O operations specifying the same
.I aiocb
structure produce undefined results.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR aio_cancel (3),
.BR aio_error (3),
.BR aio_fsync (3),
.\" Copyright (c) 1993 by Thomas Koenig (ig25@rz.uni-karlsruhe.de)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
+.\"
.\" Modified Sat Jul 24 19:01:20 1993 by Rik Faith (faith@cs.unc.edu)
.TH LOCALECONV 3 1993-04-25 "GNU" "Linux Programmer's Manual"
.SH NAME
and
.BR strfmon (3),
which behave according to the actual locale in use.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C89, C99.
.SH BUGS
The
.BR printf (3)
family of functions may or may not honor the current locale.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR locale (1),
.BR localedef (1),
.BR isalpha (3),
.\" Copyright 1997 Nicolás Lichtmaier <nick@debian.org>
.\" Created Thu Aug 7 00:44:00 ART 1997
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
.\" GNU General Public License for more details.
.\"
+.\" You should have received a copy of the GNU General Public
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
+.\"
.\" Added section stuff, aeb, 2002-04-22.
.\" Corrected include file, drepper, 2003-06-15.
.\"
-.TH LOCKF 3 2011-09-11 "GNU" "Linux Programmer's Manual"
+.TH LOCKF 3 2012-07-07 "GNU" "Linux Programmer's Manual"
.SH NAME
lockf \- apply, test or remove a POSIX lock on an open file
.SH SYNOPSIS
.RB ( EACCES
on some other systems),
if another process holds a lock.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.TP
.B EDEADLK
The command was
-.B T_LOCK
+.B F_LOCK
and this lock operation would cause a deadlock.
.TP
.B EINVAL
.TP
.B ENOLCK
Too many segment locks open, lock table is full.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fcntl (2),
.BR flock (2)
-.br
-There are also
+
.I locks.txt
and
.I mandatory-locking.txt
-in the kernel source directory
-.IR Documentation/filesystems .
-(On older kernels, these files are directly under the
-.I Documentation/
+in the Linux kernel source directory
+.IR Documentation/filesystems
+(on older kernels, these files are directly under the
+.I Documentation
directory, and
.I mandatory-locking.txt
is called
-.IR mandatory.txt .)
+.IR mandatory.txt )
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
A divide-by-zero floating-point exception
.RB ( FE_DIVBYZERO )
is raised.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
of a NaN produces a bogus invalid floating-point
.RB ( FE_INVALID )
exception.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cbrt (3),
.BR clog (3),
.BR log10 (3),
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
For a discussion of the errors that can occur for these functions, see
.BR log (3).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
also conforms to
SVr4, 4.3BSD, C89.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cbrt (3),
.BR clog10 (3),
.BR exp10 (3),
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified 2002-07-27 by Walter Harms
.\" (walter.harms@informatik.uni-oldenburg.de)
.\" FIXME . Is it intentional that these functions do not set errno?
.\" log(), log2(), log10() do set errno
.\" Bug raised: http://sources.redhat.com/bugzilla/show_bug.cgi?id=6792
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
.\" BSD
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR exp (3),
.BR expm1 (3),
.BR log (3)
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.BR log (3).
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
also conforms to
SVr4, 4.3BSD.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cbrt (3),
.BR clog2 (3),
.BR log (3),
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Inspired by a page by Walter Harms created 2002-08-10
.\"
.\" .BR logb ()
.\" function occurs in 4.3BSD.
.\" see IEEE.3 in the 4.3BSD manual
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ilogb (3),
.BR log (3)
+.\" Derived from text written by Martin Schulze (or taken from glibc.info)
+.\" and text written by Paul Thompson - both copyright 2002.
+.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139,
-.\" USA.
-.\"
-.\" Derived from text written by Martin Schulze (or taken from glibc.info)
-.\" and text written by Paul Thompson - both copyright 2002.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.TH LOGIN 3 2004-05-06 "GNU" "Linux Programmer's Manual"
.SH NAME
The function
.BR logout ()
clears the entry in the utmp file again.
-.SS "GNU Details"
+.SS GNU details
More precisely,
.BR login ()
takes the argument
Then it tries to fill the field
.IR ut\->ut_line .
It takes the first of \fIstdin\fP, \fIstdout\fP, \fIstderr\fP
-that is a tty, and
+that is a terminal, and
stores the corresponding pathname minus a possible leading \fI/dev/\fP
into this field, and then writes the struct to the utmp file.
-On the other hand, if no tty name was found, this field is filled with "???"
+On the other hand, if no terminal name was found, this field is filled with "???"
and the struct is not written to the utmp file.
After this, the struct is written to the wtmp file.
.LP
.I ut_type
(if there is such a field) to
.BR DEAD_PROCESS .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR logout ()
function returns 1 if the entry was successfully written to the
.B _PATH_WTMP
in
.I <paths.h>
-.SH "CONFORMING TO"
+.SH CONFORMING TO
Not in POSIX.1-2001.
Present on the BSDs.
.SH NOTES
.I ut_user
in
.IR <utmp.h> .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getutent (3),
.BR utmp (5)
.\" Written by Michael Haardt, Fri Nov 25 14:51:42 MET 1994
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Added siglongjmp, Sun Mar 2 22:03:05 EST 1997, jrv@vanzandt.mv.com
.\" Modifications, Sun Feb 26 14:39:45 1995, faith@cs.unc.edu
.BR siglongjmp ()
also restores the signal mask that was saved by
.BR sigsetjmp (3).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
These functions never return.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C89, C99, and POSIX.1-2001 specify
.BR longjmp ().
POSIX.1-2001 specifies
make programs hard to
understand and maintain.
If possible an alternative should be used.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR setjmp (3),
.BR sigsetjmp (3)
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH LRINT 3 2010-09-20 "" "Linux Programmer's Manual"
.SH NAME
.BR rint (3),
etc., the return type of these functions differs from
that of their arguments.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
These functions return the rounded integer value.
If
.\" Bug raised: http://sources.redhat.com/bugzilla/show_bug.cgi?id=6798
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ceil (3),
.BR floor (3),
.BR lround (3),
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH LROUND 3 2010-09-20 "" "Linux Programmer's Manual"
.SH NAME
.BR ceil (3),
etc., the return type of these functions differs from
that of their arguments.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
These functions return the rounded integer value.
If
.\" Bug raised: http://sources.redhat.com/bugzilla/show_bug.cgi?id=6797
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ceil (3),
.BR floor (3),
.BR lrint (3),
-.\" Hey Emacs! This file is -*- nroff -*- source.
.\" Copyright 1995 Jim Van Zandt <jrv@vanzandt.mv.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Corrected prototype and include, aeb, 990927
.TH LSEARCH 3 1999-09-27 "GNU" "Linux Programmer's Manual"
incremented.
In particular, one should know that a matching element
exists, or that more room is available.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR lfind ()
returns a pointer to a matching member of the array, or
NULL if no match is found.
returns a pointer to
a matching member of the array, or to the newly added member if no
match is found.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
Present in libc since libc-4.6.27.
.SH BUGS
The naming is unfortunate.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR bsearch (3),
.BR hsearch (3),
.BR tsearch (3)
.\" Copyright 2004 Andries Brouwer <aeb@cwi.nl>.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH LSEEK64 3 2004-12-11 "Linux" "Linux Programmer's Manual"
.SH NAME
.sp
For more details, see
.BR llseek (2).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR llseek (2),
.BR lseek (2)
\" Copyright (C) 2001 Andries Brouwer (aeb@cwi.nl)
.\" and Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
+.\"
.\" 2006-08-02, mtk, Added example program
.\"
-.TH MAKECONTEXT 3 2009-03-31 "GNU" "Linux Programmer's Manual"
+.TH MAKECONTEXT 3 2013-02-12 "GNU" "Linux Programmer's Manual"
.SH NAME
makecontext, swapcontext \- manipulate user context
.SH SYNOPSIS
In a System V-like environment, one has the type \fIucontext_t\fP defined in
.I <ucontext.h>
and the four functions
-.BR getcontext (2),
-.BR setcontext (2),
+.BR getcontext (3),
+.BR setcontext (3),
.BR makecontext ()
and
.BR swapcontext ()
between multiple threads of control within a process.
.LP
For the type and the first two functions, see
-.BR getcontext (2).
+.BR getcontext (3).
.LP
The
.BR makecontext ()
function modifies the context pointed to
by \fIucp\fP (which was obtained from a call to
-.BR getcontext (2)).
+.BR getcontext (3)).
Before invoking
.BR makecontext (),
the caller must allocate a new stack
assign its address to \fIucp\->uc_link\fP.
When this context is later activated (using
-.BR setcontext (2)
+.BR setcontext (3)
or
.BR swapcontext ())
the function \fIfunc\fP is called,
function saves the current context in
the structure pointed to by \fIoucp\fP, and then activates the
context pointed to by \fIucp\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
When successful,
.BR swapcontext ()
does not return.
and
.BR swapcontext ()
are provided in glibc since version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SUSv2, POSIX.1-2001.
POSIX.1-2008 removes the specifications of
.BR makecontext ()
.SH EXAMPLE
.PP
The example program below demonstrates the use of
-.BR getcontext (2),
+.BR getcontext (3),
.BR makecontext (),
and
.BR swapcontext ().
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
-.BR getcontext (2),
+.SH SEE ALSO
.BR sigaction (2),
.BR sigaltstack (2),
.BR sigprocmask (2),
+.BR getcontext (3),
.BR sigsetjmp (3)
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH MAKEDEV 3 2012-05-10 "Linux" "Linux Programmer's Manual"
.SH NAME
.BI "unsigned int major(dev_t " dev );
.BI "unsigned int minor(dev_t " dev );
-
.fi
.SH DESCRIPTION
A device ID consists of two parts:
These macros can be useful to, for example,
decompose the device IDs in the structure returned by
.BR stat (2).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The
.BR makedev (),
.BR major (),
and
.BR gnu_dev_minor ().
The latter names are exported, but the traditional names are more portable.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mknod (2),
.BR stat (2)
'\" t
.\" Copyright (c) 2012 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH MALLINFO 3 2012-05-06 "Linux" "Linux Programmer's Manual"
.SH NAME
The fields of the
.I mallinfo
structure contain the following information:
-
.TP 10
.I arena
The total amount of memory allocated by means other than
.\" Copyright (c) 1993 by Thomas Koenig (ig25@rz.uni-karlsruhe.de)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
+.\"
.\" Modified Sat Jul 24 19:00:59 1993 by Rik Faith (faith@cs.unc.edu)
.\" Clarification concerning realloc, iwj10@cus.cam.ac.uk (Ian Jackson), 950701
.\" Documented MALLOC_CHECK_, Wolfram Gloger (wmglo@dent.med.uni-muenchen.de)
.\"
.TH MALLOC 3 2012-05-10 "GNU" "Linux Programmer's Manual"
.SH NAME
-malloc, free, calloc, realloc \- Allocate and free dynamic memory
+malloc, free, calloc, realloc \- allocate and free dynamic memory
.SH SYNOPSIS
.nf
.B #include <stdlib.h>
If the area pointed to was moved, a
.I free(ptr)
is done.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR malloc ()
and
If
.BR realloc ()
fails the original block is left untouched; it is not freed or moved.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C89, C99.
.SH NOTES
By default, Linux follows an optimistic memory allocation strategy.
.IR /proc/sys/vm/oom_adj
in
.BR proc (5),
-and the kernel source file
+and the Linux kernel source file
.IR Documentation/vm/overcommit-accounting .
Normally,
implementation which is tunable via environment variables.
For details, see
.BR mallopt (3).
-.SH "SEE ALSO"
+.SH SEE ALSO
.\" http://g.oswego.edu/dl/html/malloc.html
.\" A Memory Allocator - by Doug Lea
.\"
.\" malloc() Performance in a Multithreaded Linux Environment -
.\" Check Lever, David Boreham
.\"
+.ad l
+.nh
.BR brk (2),
.BR mmap (2),
.BR alloca (3),
.\" Copyright (c) 2012 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH MALLOC_GET_STATE 3 2012-05-04 "GNU" "Linux Programmer's Manual"
.SH NAME
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
+.\"
.\" Heavily based on glibc documentation
.\" Polished, added docs, removed glibc doc bug, 2002-07-20, aeb
.\"
points at a function that is called each time after
.BR sbrk (2)
was asked for more memory.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are GNU extensions.
.SH NOTES
The use of these hook functions is not safe in multithreaded programs,
.\" http://sourceware.org/bugzilla/show_bug.cgi?id=9957
Programmers should instead preempt calls to the relevant functions
by defining and exporting functions such as "malloc" and "free".
-.SH "EXAMPLE"
+.SH EXAMPLE
Here is a short example of how to use these variables.
.sp
.nf
return result;
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mallinfo (3),
.BR malloc (3),
.BR mcheck (3),
.\" Copyright (c) 2012 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH MALLOC_INFO 3 2012-04-28 "GNU" "Linux Programmer's Manual"
.SH NAME
.I options
was nonzero.
.SH VERSIONS
-.BR malloc_info (3)
+.BR malloc_info ()
was added to glibc in version 2.10.
.SH CONFORMING TO
This function is a GNU extension.
'\" t
.\" Copyright (c) 2012 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH MALLOC_STATS 3 2012-05-06 "Linux" "Linux Programmer's Manual"
.SH NAME
'\" t
.\" Copyright (c) 2012 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH MALLOC_TRIM 3 2012-03-29 "Linux" "Linux Programmer's Manual"
.SH NAME
This function cannot release free memory located at places
other than the top of the heap.
-.SH NOTES
-This function only releases memory in the main arena.
+
+This function releases only memory in the main arena.
.\" malloc/malloc.c::mTRIm():
.\" return result | (av == &main_arena ? sYSTRIm (pad, av) : 0);
.SH SEE ALSO
.\" Copyright (c) 2012 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH MALLOC_USABLE_SIZE 3 2012-03-29 "GNU" "Linux Programmer's Manual"
.SH NAME
'\" t
.\" Copyright (c) 2012 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH MALLOPT 3 2012-04-30 "Linux" "Linux Programmer's Manual"
.SH NAME
.\" These macros aren't enabled in production releases until 2.15?
.\" (see glibc malloc/Makefile)
.\"
-.SS Environment Variables
+.SS Environment variables
A number of environment variables can be defined
to modify some of the same parameters as are controlled by
.BR mallopt ().
.SH SEE ALSO
.ad l
.nh
-.BR mmap (2)
+.BR mmap (2),
.BR sbrk (2),
.BR mallinfo (3),
.BR malloc (3),
.\" Copyright (c) 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH MATHERR 3 2010-09-10 "Linux" "Linux Programmer's Manual"
.SH NAME
(exc\->type == PLOSS) ? "PLOSS" : "???",
exc\->name);
fprintf(stderr, " args: %f, %f\\n",
- exc\->arg1, exc->arg2);
+ exc\->arg1, exc\->arg2);
fprintf(stderr, " retval: %f\\n", exc\->retval);
if (change_retval)
if (argc < 2) {
fprintf(stderr, "Usage: %s <argval>"
- " [<matherr\-ret> [<new\-func-retval>]]\\n", argv[0]);
+ " [<matherr\-ret> [<new\-func\-retval>]]\\n", argv[0]);
exit(EXIT_FAILURE);
}
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
resets the shift state, only known to this function, to the initial state, and
returns nonzero if the encoding has nontrivial shift state, or zero if the
encoding is stateless.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR mblen ()
function returns the number of
It returns \-1, if an
invalid multibyte sequence was encountered or if it couldn't parse a complete
multibyte character.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.BR mbrlen (3)
provides a better interface to the same
functionality.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mbrlen (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
If \fIps\fP is a NULL pointer, a static anonymous state only known to the
.BR mbrlen ()
function is used instead.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR mbrlen ()
function returns the number of bytes
encountered.
It returns \fI(size_t)\ \-2\fP if it couldn't parse a complete multibyte
character, meaning that \fIn\fP should be increased.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.B LC_CTYPE
category of the
current locale.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mbrtowc (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.in +4n
memset(&a, 0, sizeof(a));
.in
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR mbrtowc ()
function returns the number of bytes parsed from the
encountered.
It returns \fI(size_t)\ \-2\fP if it couldn't parse a complete multibyte
character, meaning that \fIn\fP should be increased.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.B LC_CTYPE
category of the
current locale.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mbsrtowcs (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.BR mbsinit ()
tests whether \fI*ps\fP corresponds to an
initial state.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR mbsinit ()
returns nonzero if \fI*ps\fP is an initial state, or if
\fIps\fP is a NULL pointer.
Otherwise it returns 0.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.B LC_CTYPE
category of the
current locale.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mbsrtowcs (3),
.BR wcsrtombs (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.PP
The programmer must ensure that there is room for at least \fIlen\fP wide
characters at \fIdest\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR mbsnrtowcs ()
function returns the number of wide characters
encountered,
.I (size_t)\ \-1
is returned, and \fIerrno\fP set to \fBEILSEQ\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
.SH NOTES
The behavior of
current locale.
.PP
Passing NULL as \fIps\fP is not multithread safe.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR iconv (3),
.BR mbsrtowcs (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.PP
The programmer must ensure that there is room for at least \fIlen\fP wide
characters at \fIdest\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR mbsrtowcs ()
function returns the number of wide characters that make
encountered,
.I (size_t)\ \-1
is returned, and \fIerrno\fP set to \fBEILSEQ\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
current locale.
.PP
Passing NULL as \fIps\fP is not multithread safe.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR iconv (3),
.BR mbsnrtowcs (3),
.BR mbstowcs (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.PP
In order to avoid the case 2 above, the programmer should make sure \fIn\fP is
greater or equal to \fImbstowcs(NULL,src,0)+1\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR mbstowcs ()
function returns the number of wide characters that make
encountered,
.I (size_t)\ \-1
is returned.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.BR mbsrtowcs (3)
provides a better interface to the same
functionality.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mbsrtowcs (3),
-.BR wcstombs(3)
+.BR wcstombs (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
to the initial state, and
returns nonzero if the encoding has nontrivial shift state, or zero if the
encoding is stateless.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
If \fIs\fP is not NULL, the
.BR mbtowc ()
function returns the number of
function
returns nonzero if the encoding
has nontrivial shift state, or zero if the encoding is stateless.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.BR mbrtowc (3)
provides
a better interface to the same functionality.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR MB_CUR_MAX (3),
.BR mbrtowc (3),
.BR mbstowcs (3)
.\" Copyright (c) 2012 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH MCHECK 3 2012-04-18 "GNU" "Linux Programmer's Manual"
.SH NAME
.B void mcheck_check_all(void);
.BI "enum mcheck_status mprobe(void *" ptr );
-
.fi
.SH DESCRIPTION
The
.BR mcheck_check_all ()
functions are available since glibc 2.2.
The
-.BR mcheck()
+.BR mcheck ()
and
-.BR mprobe()
+.BR mprobe ()
functions are present since at least glibc 2.0
.SH CONFORMING TO
These functions are GNU extensions.
.B MALLOC_CHECK_
does not require the application to be relinked.
.\" But is MALLOC_CHECK_ slower?
-
.SH EXAMPLE
The program below calls
.BR mcheck ()
.fi
.SH SEE ALSO
.BR malloc (3),
-.\" FIXME add SEE ALSO pointer from malloc(3) to here
-.\" FIXME add SEE ALSO pointer from mallopt(3) to here
-.\" FIXME add SEE ALSO pointer from mtrace(3) to here
.BR mallopt (3),
.BR mtrace (3)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
character \fIc\fP is found.
If the memory areas overlap, the results are undefined.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR memccpy ()
function returns a pointer to the next character
in \fIdest\fP after \fIc\fP, or NULL if \fIc\fP was not found in the
first \fIn\fP characters of \fIsrc\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR bcopy (3),
.BR memcpy (3),
.BR memmove (3),
.\" and Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified Mon Apr 12 12:49:57 1993, David Metcalfe
.\" Modified Sat Jul 24 18:56:22 1993, Rik Faith (faith@cs.unc.edu)
char *p = rawmemchr(s,\ \(aq\\0\(aq);
.fi
.in
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR memchr ()
and
.BR memrchr ()
first appeared in glibc in version 2.2.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The
.BR memchr ()
function conforms to SVr4, 4.3BSD, C89, C99, POSIX.1-2001.
The
.BR rawmemchr ()
function is a GNU extension, available since glibc 2.1.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ffs (3),
.BR index (3),
.BR rindex (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.\" Lewine's _POSIX Programmer's Guide_ (O'Reilly & Associates, 1991)
.\" 386BSD man pages
.\" Modified Sat Jul 24 18:55:27 1993 by Rik Faith (faith@cs.unc.edu)
-.TH MEMCMP 3 2011-09-14 "" "Linux Programmer's Manual"
+.TH MEMCMP 3 2012-11-25 "" "Linux Programmer's Manual"
.SH NAME
memcmp \- compare memory areas
.SH SYNOPSIS
function compares the first \fIn\fP bytes (each interpreted as
.IR "unsigned char" )
of the memory areas \fIs1\fP and \fIs2\fP.
-It returns an integer less than,
-equal to, or greater than zero if \fIs1\fP is found, respectively, to
-be less than, to match, or be greater than \fIs2\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR memcmp ()
function returns an integer less than, equal to, or
greater than zero if the first \fIn\fP bytes of \fIs1\fP is found,
respectively, to be less than, to match, or be greater than the first
\fIn\fP bytes of \fIs2\fP.
-.SH "CONFORMING TO"
+
+For a nonzero return value, the sign is determined by the sign of
+the difference between the first pair of bytes (interpreted as
+.IR "unsigned char" )
+that differ in
+.I s1
+and
+.IR s2 .
+.SH CONFORMING TO
SVr4, 4.3BSD, C89, C99, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR bcmp (3),
.BR strcasecmp (3),
.BR strcmp (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
Use
.BR memmove (3)
if the memory areas do overlap.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR memcpy ()
function returns a pointer to \fIdest\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, C89, C99, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR bcopy (3),
.BR memccpy (3),
.BR memmove (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.PP
Note that this function is not a proper encryption routine as the XOR
constant is fixed, and is only suitable for hiding strings.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR memfrob ()
function returns a pointer to the encrypted memory
area.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The
.BR memfrob ()
function is unique to the
GNU C Library.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR strfry (3)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
function finds the start of the first occurrence
of the substring \fIneedle\fP of length \fIneedlelen\fP in the memory
area \fIhaystack\fP of length \fIhaystacklen\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR memmem ()
function returns a pointer to the beginning of the
substring, or NULL if the substring is not found.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This function is a GNU extension.
.SH BUGS
This function was broken in Linux libraries up to and including libc 5.0.9;
And glibc 2.0 makes it worse, returning a pointer to the
last byte of \fIhaystack\fP.
This is fixed in glibc 2.1.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR strstr (3)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.IR dest ,
and the bytes are then copied from the temporary array to
.IR dest .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR memmove ()
function returns a pointer to \fIdest\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, C89, C99, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR bcopy (3),
.BR memccpy (3),
.BR memcpy (3),
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
+.\"
.\" Heavily based on glibc infopages, copyright Free Software Foundation
.\"
.\" aeb, 2003, polished a little
type arguments and copies
.I n
wide characters.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
\fIdest\fP + \fIn\fP.
.SH VERSIONS
.BR mempcpy ()
first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This function is a GNU extension.
-.SH "EXAMPLE"
+.SH EXAMPLE
.nf
void *
combine(void *o1, size_t s1, void *o2, size_t s2)
return result;
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR memccpy (3),
.BR memcpy (3),
.BR memmove (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.BR memset ()
function fills the first \fIn\fP bytes of the
memory area pointed to by \fIs\fP with the constant byte \fIc\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR memset ()
function returns a pointer to the memory area
\fIs\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, C89, C99, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR bzero (3),
.BR swab (3),
.BR wmemset (3)
.\" Based on mkstemp(3), Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\" and GNU libc documentation
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.TH MKDTEMP 3 2010-09-26 "GNU" "Linux Programmer's Manual"
.SH NAME
mkdtemp \- create a unique temporary directory
Since it will be modified,
.I template
must not be a string constant, but should be declared as a character array.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR mkdtemp ()
function returns a pointer to the modified template
for other possible values for \fIerrno\fP.
.SH VERSIONS
Available since glibc 2.1.91.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
This function is present on the BSDs.
.\" As at 2006, this function is being considered for a revision of POSIX.1
.\" Also in NetBSD 1.4.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mkdir (2),
.BR mkstemp (3),
.BR mktemp (3),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 1995 James R. Van Zandt <jrv@vanzandt.mv.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" changed section from 2 to 3, aeb, 950919
.\"
-.TH MKFIFO 3 2008-06-12 "GNU" "Linux Programmer's Manual"
+.TH MKFIFO 3 2013-01-27 "GNU" "Linux Programmer's Manual"
.SH NAME
mkfifo \- make a FIFO special file (a named pipe)
.SH SYNOPSIS
See
.BR fifo (7)
for nonblocking handling of FIFO special files.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success
.BR mkfifo ()
returns 0.
One of the directories in \fIpathname\fP did not allow search
(execute) permission.
.TP
+.B EDQUOT
+The user's quota of disk blocks or inodes on the file system has been
+exhausted.
+.TP
.B EEXIST
\fIpathname\fP already exists.
This includes the case where
.TP
.B EROFS
\fIpathname\fP refers to a read-only file system.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mkfifo (1),
.BR close (2),
.BR open (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 2006, Michael Kerrisk
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\"
.TH MKFIFOAT 3 2009-12-13 "Linux" "Linux Programmer's Manual"
is absolute, then
.I dirfd
is ignored.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR mkfifoat ()
returns 0.
It is implemented using
.BR mknod (2),
available on Linux since kernel 2.6.16.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
.SH NOTES
See
.BR openat (2)
for an explanation of the need for
.BR mkfifoat ().
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR openat (2),
.BR mkfifo (3),
.BR path_resolution (7)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\" and Copyright (C) 2008, Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.\" Modified 990328, aeb
.\" 2008-06-19, mtk, Added mkostemp(); various other changes
.\"
-.TH MKSTEMP 3 2012-04-21 "GNU" "Linux Programmer's Manual"
+.TH MKSTEMP 3 2012-12-21 "GNU" "Linux Programmer's Manual"
.SH NAME
mkstemp, mkostemp, mkstemps, mkostemps \- create a unique temporary file
.SH SYNOPSIS
The file is created with
permissions 0600, that is, read plus write for owner only.
-(In glibc versions 2.06 and earlier, the file is created with permissions 0666,
-that is, read and write for all users.)
The returned file descriptor provides both read and write access to the file.
The file is opened with the
.BR open (2)
.BR mkostemp ()
is to
.BR mkstemp ().
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these functions return the file descriptor
of the temporary file.
On error, \-1 is returned, and
and
.BR mkostemps ()
are available since glibc 2.11.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR mkstemp ():
4.3BSD, POSIX.1-2001.
.BR mkostemps ():
are glibc extensions.
.SH NOTES
-The old behavior of creating a file with mode 0666 may be
+In glibc versions 2.06 and earlier, the file is created with permissions 0666,
+that is, read and write for all users.
+This old behavior may be
a security risk, especially since other UNIX flavors use 0600,
and somebody might overlook this detail when porting programs.
+POSIX.1-2008 adds a requirement that the file be created with mode 0600.
More generally, the POSIX specification of
.BR mkstemp ()
.I <unistd.h>
for libc4, libc5, glibc1; glibc2 follows POSIX.1 and has the prototype in
.IR <stdlib.h> .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mkdtemp (3),
.BR mktemp (3),
.BR tempnam (3),
.\" Copyright (C) 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
Since it will be modified,
.I template
must not be a string constant, but should be declared as a character array.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR mktemp ()
function always returns \fItemplate\fP.
.TP
.B EINVAL
The last six characters of \fItemplate\fP were not XXXXXX.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD, POSIX.1-2001.
POSIX.1-2008 removes the specification of
.BR mktemp ().
is a security risk.
The race is avoided by
.BR mkstemp (3).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mkstemp (3),
.BR tempnam (3),
.BR tmpfile (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
function breaks the argument \fIx\fP into an integral
part and a fractional part, each of which has the same sign as \fIx\fP.
The integral part is stored in the location pointed to by \fIiptr\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR modf ()
function returns the fractional part of \fIx\fP.
is set to positive infinity (negative infinity).
.SH ERRORS
No errors occur.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
also conforms to
SVr4, 4.3BSD, C89.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR frexp (3),
.BR ldexp (3)
.\" Copyright (c) 1990, 1993
.\" The Regents of the University of California. All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)mpool.3 8.1 (Berkeley) 6/4/93
.\"
.I errno
for any of the errors specified for the library routine
.BR free (3).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
Not in POSIX.1-2001.
Present on the BSDs.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR btree (3),
.BR dbopen (3),
.BR hash (3),
'\" t
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH MQ_CLOSE 3 2010-08-29 "Linux" "Linux Programmer's Manual"
.SH NAME
All open message queues are automatically closed on process termination,
or upon
.BR execve (2).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mq_getattr (3),
.BR mq_notify (3),
.BR mq_open (3),
'\" t
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH MQ_GETATTR 3 2010-08-29 "Linux" "Linux Programmer's Manual"
.SH NAME
are library functions layered on top of the
.BR mq_getsetattr (2)
system call.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mq_close (3),
.BR mq_notify (3),
.BR mq_open (3),
'\" t
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH MQ_NOTIFY 3 2010-10-04 "Linux" "Linux Programmer's Manual"
.SH NAME
struct sigevent sev;
if (argc != 2) {
- fprintf(stderr, "Usage: %s <mq-name>\\n", argv[0]);
+ fprintf(stderr, "Usage: %s <mq\-name>\\n", argv[0]);
exit(EXIT_FAILURE);
}
pause(); /* Process will be terminated by thread function */
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mq_close (3),
.BR mq_getattr (3),
.BR mq_open (3),
'\" t
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH MQ_OPEN 3 2009-02-20 "Linux" "Linux Programmer's Manual"
.SH NAME
In kernels before 2.6.14,
the process umask was not applied to the permissions specified in
.IR mode .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mq_close (3),
.BR mq_getattr (3),
.BR mq_notify (3),
'\" t
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH MQ_RECEIVE 3 2010-09-20 "Linux" "Linux Programmer's Manual"
.SH NAME
attribute of the queue (see
.BR mq_getattr (3)).
If
-.I prio
+.I msg_prio
is not NULL, then the buffer to which it points is used
to return the priority associated with the received message.
is a system call, and
.BR mq_receive ()
is a library function layered on top of that system call.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mq_close (3),
.BR mq_getattr (3),
.BR mq_notify (3),
'\" t
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH MQ_SEND 3 2010-09-20 "Linux" "Linux Programmer's Manual"
.SH NAME
is a system call, and
.BR mq_send ()
is a library function layered on top of that system call.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mq_close (3),
.BR mq_getattr (3),
.BR mq_notify (3),
'\" t
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH MQ_UNLINK 3 2010-08-29 "Linux" "Linux Programmer's Manual"
.SH NAME
.IR name .
.SH CONFORMING TO
POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mq_close (3),
.BR mq_getattr (3),
.BR mq_notify (3),
.\" Copyright (c) 2012 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH MTRACE 3 2012-04-18 "GNU" "Linux Programmer's Manual"
.SH NAME
does nothing.
When
-.BR mtrace (3)
+.BR mtrace ()
is called, it checks the value of the environment variable
.BR MALLOC_TRACE ,
which should contain the pathname of a file in which
is ignored, and
.BR mtrace ()
has no effect.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are GNU extensions.
.SH NOTES
In normal usage,
.BR calloc (3)
(which in turn calls
.BR malloc (3)).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mtrace (1),
.BR malloc (3),
.BR malloc_hook (3),
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
+.\"
.\" Based on glibc infopages
.\"
.\" Corrections by aeb
+.\"
.TH NAN 3 2010-09-20 "GNU" "Linux Programmer's Manual"
.SH NAME
nan, nanf, nanl \- return 'Not a Number'
On other systems it may do nothing.
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
See also IEC 559 and the appendix with
recommended functions in IEEE 754/IEEE 854.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR isnan (3),
.BR strtod (3),
.BR math_error (7)
-.\" This manpage copyright 1998 by Andi Kleen. Subject to the GPL.
+.\" This manpage copyright 1998 by Andi Kleen.
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
+.\" Subject to the GPL.
+.\" %%%LICENSE_END
+.\"
.\" Based on the original comments from Alexey Kuznetsov
.\" $Id: netlink.3,v 1.1 1999/05/14 17:17:24 freitag Exp $
-.TH NETLINK 3 1999-05-14 "GNU" "Linux Programmer's Manual"
+.\"
+.TH NETLINK 3 2012-08-05 "GNU" "Linux Programmer's Manual"
.SH NAME
netlink \- Netlink macros
.SH SYNOPSIS
It is often better to use netlink via
.I libnetlink
than via the low-level kernel interface.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR netlink (7)
-.br
-and ftp://ftp.inr.ac.ru/ip-routing/iproute2* for libnetlink
+
+.UR ftp://ftp.inr.ac.ru\:/ip-routing\:/iproute2*
+.UE
+for libnetlink
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
+.\"
.\" Based on glibc infopages
+.\"
.TH NEXTAFTER 3 2010-09-20 "GNU" "Linux Programmer's Manual"
.SH NAME
nextafter, nextafterf, nextafterl, nexttoward, nexttowardf, nexttowardl \-
.IR errno .
.\" FIXME . Is it intentional that these functions do not set errno?
.\" Bug raised: http://sources.redhat.com/bugzilla/show_bug.cgi?id=6799
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
This function is defined in IEC 559 (and the appendix with
recommended functions in IEEE 754/IEEE 854).
floating-point
.RB ( FE_UNDERFLOW )
exception when an underflow occurs.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR nearbyint (3)
.\" Copyright (c) 2001 Markus Kuhn <mkuhn@acm.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 manual
The above list covers just some examples of items that can be requested.
For a more detailed list, consult
.IR "The GNU C Library Reference Manual" .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
If no locale has been selected by
.BR setlocale (3)
for the appropriate category,
.BR nl_langinfo ()
or
.BR setlocale (3).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SUSv2, POSIX.1-2001.
-.SH "EXAMPLE"
+.SH EXAMPLE
The following program sets the character type locale according to the
environment and queries the terminal character set.
.LP
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR locale (1),
.BR localeconv (3),
.BR setlocale (3),
.\" Copyright (C) 2006 Justin Pryzby <pryzbyj@justinpryzby.com>
.\" and Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(PERMISSIVE_MISC)
.\" Permission is hereby granted, free of charge, to any person obtaining
.\" a copy of this software and associated documentation files (the
.\" "Software"), to deal in the Software without restriction, including
.\" CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
.\" TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
.\" SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
+.\" %%%LICENSE_END
.\"
.\" References:
.\" /usr/lib/gcc/i486-linux-gnu/4.1.1/include/stddef.h
A compiler error will result if
\fImember\fP is not aligned to a byte boundary
(i.e., it is a bit field).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR offsetof ()
returns the offset of the given
.I member
within the given
.IR type ,
in units of bytes.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C89, C99, POSIX.1-2001.
.SH EXAMPLE
On a Linux/i386 system, when compiled using the default
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
Upon a successful call to one of the
.BR exec (3)
functions, all registrations are removed.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR on_exit ()
function returns the value 0 if successful; otherwise
it returns a nonzero value.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This function comes from SunOS 4, but is also present in
libc4, libc5 and glibc.
It no longer occurs in Solaris (SunOS 5).
Avoid this function, and use the standard
.BR atexit (3)
instead.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR _exit (2),
.BR atexit (3),
.BR exit (3)
.\" Copyright (C) 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.I fd
is used internally by the implementation,
and should not otherwise be used by the application.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR opendir ()
and
.SH VERSIONS
.BR fdopendir ()
is available in glibc since version 2.4.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR opendir ()
is present on SVr4, 4.3BSD, and specified in POSIX.1-2001.
.BR fdopendir ()
.BR fdopendir ()
will set the close-on-exec flag for the file descriptor,
.IR fd .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR open (2),
.BR closedir (3),
.BR dirfd (3),
.\" Copyright (c) OpenBSD Group
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_3_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" Converted into a manpage again by Martin Schulze <joey@infodrom.org>
.\"
.\"
.TH OPENPTY 3 2010-06-13 "GNU" "Linux Programmer's Manual"
.SH NAME
-openpty, login_tty, forkpty \- tty utility functions
+openpty, login_tty, forkpty \- terminal utility functions
.SH SYNOPSIS
.nf
.B #include <pty.h>
The
.BR login_tty ()
-function prepares for a login on the tty
+function prepares for a login on the terminal
.I fd
-(which may be a real tty device, or the slave of a pseudoterminal as
+(which may be a real terminal device, or the slave of a pseudoterminal as
returned by
.BR openpty ())
by creating a new session, making
arguments, if not NULL,
will determine the terminal attributes and window size of the slave
side of the pseudoterminal.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
If a call to
.BR openpty (),
.BR login_tty (),
will fail if:
.TP
.B ENOENT
-There are no available ttys.
+There are no available terminals.
.LP
.BR login_tty ()
will fail if
or
.BR fork (2)
fails.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These are BSD functions, present in libc5 and glibc2.
They are not standardized in POSIX.
.SH NOTES
with non-NULL
.I name
may not be secure.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fork (2),
.BR ttyname (3),
.BR pty (7)
.\" (michael@cantor.informatik.rwth-aachen.de), 1995-03-16
.\" Copyright (c) 1996 Andries Brouwer (aeb@cwi.nl), 1996-01-13
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 1996-01-13 aeb: merged in some text contributed by Melvin Smith
.\" (msmith@falcon.mercer.peachnet.edu) and various other changes.
.IR sys_errlist "[]"
is nowadays deprecated.
-
When a system call fails, it usually returns \-1 and sets the
variable
.I errno
the value of
.I errno
should be saved.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The function
.BR perror ()
and the external
.\" and
.\" .I _sys_errlist
.\" are provided.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR err (3),
.BR errno (3),
.BR error (3),
.\" Copyright 1991 The Regents of the University of California.
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)popen.3 6.4 (Berkeley) 4/30/91
.\"
function waits for the associated process to terminate and returns the exit
status of the command as returned by
.BR wait4 (2).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR popen ()
function returns NULL if the
.I errno
is set to
.BR ECHILD .
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
The \(aqe\(aq value for
.\" and a
.\" .BR pclose ()
.\" function appeared in Version 7 AT&T UNIX.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sh (1),
.BR fork (2),
.BR pipe (2),
.\" Copyright (c) 2006, Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH POSIX_FALLOCATE 3 2010-09-20 "GNU" "Linux Programmer's Manual"
+.TH POSIX_FALLOCATE 3 2013-02-12 "GNU" "Linux Programmer's Manual"
.SH NAME
posix_fallocate \- allocate file space
.SH SYNOPSIS
.IR offset + len ,
then the file is increased to this size;
otherwise the file size is left unchanged.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR posix_fallocate ()
returns zero on success, or an error number on failure.
Note that
.I errno
is not set.
-.SH "ERRORS"
+.SH ERRORS
.TP
.B EBADF
.I fd
.SH VERSIONS
.BR posix_fallocate ()
is available since glibc 2.1.94.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
POSIX.1-2008 says that an implementation
give the error if
.I len
equals zero.
-.SH "SEE ALSO"
+.SH SEE ALSO
+.BR fallocate (1),
.BR fallocate (2),
.BR lseek (2),
.BR posix_fadvise (2)
.\" Copyright (c) 2001 by John Levon <moz@compsoc.man.ac.uk>
.\" Based in part on GNU libc documentation.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
.\"
.\" 2001-10-11, 2003-08-22, aeb, added some details
.\" 2012-03-23, Michael Kerrisk <mtk.manpages@mail.com>
.\" Document pvalloc() and aligned_alloc()
.TH POSIX_MEMALIGN 3 2012-03-23 "GNU" "Linux Programmer's Manual"
.SH NAME
-posix_memalign, aligned_alloc, memalign, valloc, pvalloc \- Allocate aligned memory
+posix_memalign, aligned_alloc, memalign, valloc, pvalloc \- allocate aligned memory
.SH SYNOPSIS
.nf
.B #include <stdlib.h>
should be a multiple of
.IR alignment .
-
The obsolete function
.BR valloc ()
allocates
the next multiple of the system page size.
For all of these functions, the memory is not zeroed.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR aligned_alloc (),
.BR memalign (),
.BR valloc (),
Note that
.I errno
is not set.
-.SH "ERRORS"
+.SH ERRORS
.TP
.B EINVAL
The
The function
.BR posix_memalign ()
is available since glibc 2.1.91.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The function
.BR valloc ()
appeared in 3.0BSD.
.BR malloc (3)
always returns 8-byte aligned memory addresses, so these functions are only
needed if you require larger alignment values.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR brk (2),
.BR getpagesize (2),
.BR free (3),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2004 Michael Kerrisk
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH POSIX_OPENPT 3 2012-04-20 "" "Linux Programmer's Manual"
.SH NAME
.TP
.B O_NOCTTY
Do not make this device the controlling terminal for the process.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR posix_openpt ()
returns a nonnegative file descriptor which is the lowest
Glibc support for
.BR posix_openpt ()
has been provided since version 2.2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR posix_openpt ()
is part of the UNIX 98 pseudoterminal support (see
.BR pts (4)).
The pathname of the slave device can be obtained using
.BR ptsname (3).
The slave device pathname exists only as long as the master device is open.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR open (2),
.BR getpt (3),
.BR grantpt (3),
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
An underflow floating-point exception
.RB ( FE_UNDERFLOW )
is raised.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
generates a bogus invalid floating-point exception
.RB ( FE_INVALID )
in addition to the overflow or underflow exception.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cbrt (3),
.BR cpow (3),
.BR sqrt (3)
.\" Copyright 2004 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH POW10 3 2008-08-11 "" "Linux Programmer's Manual"
.SH NAME
power \fIx\fP.
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This is a GNU extension.
.SH NOTES
These functions are identical to the functions listed under
.BR exp10 (3).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR exp10 (3),
.BR pow (3)
.\" Copyright (c) 1999 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" Earlier versions of this page influenced the present text.
+.\" It was derived from a Berkeley page with version
+.\" @(#)printf.3 6.14 (Berkeley) 7/30/91
+.\" converted for Linux by faith@cs.unc.edu, updated by
+.\" Helmut.Geyer@iwr.uni-heidelberg.de, agulbra@troll.no and Bruno Haible.
+.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
-.\"
-.\"
-.\" Earlier versions of this page influenced the present text.
-.\" It was derived from a Berkeley page with version
-.\" @(#)printf.3 6.14 (Berkeley) 7/30/91
-.\" converted for Linux by faith@cs.unc.edu, updated by
-.\" Helmut.Geyer@iwr.uni-heidelberg.de, agulbra@troll.no and Bruno Haible.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 1999-11-25 aeb - Rewritten, using SUSv2 and C99.
.\" 2000-07-26 jsm28@hermes.cam.ac.uk - three small fixes
.\" 2000-10-16 jsm28@hermes.cam.ac.uk - more fixes
.\"
-.TH PRINTF 3 2011-09-28 "GNU" "Linux Programmer's Manual"
+.TH PRINTF 3 2013-03-05 "GNU" "Linux Programmer's Manual"
.SH NAME
printf, fprintf, sprintf, snprintf, vprintf, vfprintf, vsprintf,
vsnprintf \- formatted output conversion
(e.g., if the target string array and one of the supplied input arguments
refer to the same buffer).
See NOTES.
-.SS "Return value"
+.SS Return value
Upon successful return, these functions return the number of characters
printed (excluding the null byte used to end output to strings).
(See also below under NOTES.)
If an output error is encountered, a negative value is returned.
-.SS "Format of the format string"
+.SS Format of the format string
The format string is a character string, beginning and ending
in its initial shift state, if any.
The format string is composed of zero or more directives: ordinary
.in
results in "1234567.89" in the POSIX locale, in "1234567,89" in the
nl_NL locale, and in "1.234.567,89" in the da_DK locale.
-.SS "The flag characters"
+.SS The flag characters
The character % is followed by zero or more of the following flags:
.TP
.B #
For example, since glibc 2.2.3 this will give Arabic-Indic digits
in the Persian ("fa_IR") locale.
.\" outdigits keyword in locale file
-.SS "The field width"
+.SS The field width
An optional decimal digit string (with nonzero first digit) specifying
a minimum field width.
If the converted value has fewer characters
In no case does a nonexistent or small field width cause truncation of a
field; if the result of a conversion is wider than the field width, the
field is expanded to contain the conversion result.
-.SS "The precision"
+.SS The precision
An optional precision, in the form of a period (\(aq.\(aq) followed by an
optional decimal digit string.
Instead of a decimal digit string one may write "*" or "*m$"
and
.B S
conversions.
-.SS "The length modifier"
+.SS The length modifier
Here, "integer conversion" stands for
.BR d ,
.BR i ,
.BR Lf ,
.BR Lg ,
.BR LG ).
-.SS "The conversion specifier"
+.SS The conversion specifier
A character that specifies the type of conversion to be applied.
The conversion specifiers and their meanings are:
.TP
No argument is converted.
The complete conversion
specification is \(aq%%\(aq.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The
.BR fprintf (),
.BR printf (),
.PP
To allocate a sufficiently large string and print into it
(code correct for both glibc 2.0 and glibc 2.1):
+.PP
+If truncation occurs in glibc versions prior to 2.0.6, this is treated as an
+error instead of being handled gracefully.
.nf
#include <stdio.h>
make_message(const char *fmt, ...)
{
int n;
- int size = 100; /* Guess we need no more than 100 bytes. */
+ int size = 100; /* Guess we need no more than 100 bytes */
char *p, *np;
va_list ap;
while (1) {
- /* Try to print in the allocated space. */
+ /* Try to print in the allocated space */
va_start(ap, fmt);
n = vsnprintf(p, size, fmt, ap);
va_end(ap);
- /* If that worked, return the string. */
+ /* Check error code */
- if (n > \-1 && n < size)
+ if (n < 0)
+ return NULL;
+
+ /* If that worked, return the string */
+
+ if (n < size)
return p;
- /* Else try again with more space. */
+ /* Else try again with more space */
+
+ size = n + 1; /* Precisely what is needed */
- if (n > \-1) /* glibc 2.1 */
- size = n+1; /* precisely what is needed */
- else /* glibc 2.0 */
- size *= 2; /* twice the old size */
if ((np = realloc (p, size)) == NULL) {
free(p);
}
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR printf (1),
.BR asprintf (3),
.BR dprintf (3),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 1993 Rickard E. Faith (faith@cs.unc.edu)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified Fri Jun 23 01:35:19 1995 Andries Brouwer <aeb@cwi.nl>
.\" (prompted by Bas V. de Bakker <bas@phys.uva.nl>)
If
.I buf
is NULL, profiling is disabled.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
Zero is always returned.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
Similar to a call in SVr4 (but not POSIX.1-2001).
.SH BUGS
.BR profil ()
True kernel profiling provides more accurate results.
Libc 4.4 contained a kernel patch providing a system call profil.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR gprof (1),
.BR setitimer (2),
.BR sigaction (2),
.\" Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(PERMISSIVE_MISC)
.\" Permission is hereby granted, free of charge, to any person obtaining
.\" a copy of this software and associated documentation files (the
.\" "Software"), to deal in the Software without restriction, including
.\" CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
.\" TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
.\" SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
+.\" %%%LICENSE_END
+.\"
.TH INVOCATION_NAME 3 2006-04-29 "GNU" "Linux Programmer's Manual"
.SH NAME
program_invocation_name, program_invocation_short_name \- \
These variables are automatically initialized by the glibc run-time
startup code.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These variables are GNU extensions, and should not be
used in programs intended to be portable.
.SH NOTES
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
The array \fIsys_siglist\fP holds the signal description strings
indexed by signal number.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR psignal ()
and
The
.BR psiginfo ()
function was added to glibc in version 2.10.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008, 4.3BSD.
.SH BUGS
In glibc versions up to 2.12,
Additional details are not displayed for real-time signals.
.\" FIXME http://sourceware.org/bugzilla/show_bug.cgi?id=12108
.\" Reportedly now fixed; check glibc 2.13
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sigaction (2),
.BR perror (3),
.BR strsignal (3),
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_ATTR_INIT 3 2008-11-11 "Linux" "Linux Programmer's Manual"
.SH NAME
}
.fi
.SH SEE ALSO
+.ad l
+.nh
.BR pthread_attr_setaffinity_np (3),
.BR pthread_attr_setdetachstate (3),
.BR pthread_attr_setguardsize (3),
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_ATTR_SETAFFINITY_NP 3 2010-09-10 "Linux" "Linux Programmer's Manual"
.SH NAME
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_ATTR_SETDETACHSTATE 3 2010-02-03 "Linux" "Linux Programmer's Manual"
.SH NAME
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_ATTR_SETGUARDSIZE 3 2008-10-24 "Linux" "Linux Programmer's Manual"
.SH NAME
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_ATTR_SETINHERITSCHED 3 2012-03-15 "Linux" "Linux Programmer's Manual"
.SH NAME
See
.BR pthread_setschedparam (3).
.SH SEE ALSO
+.ad l
+.nh
.BR sched_setscheduler (2),
.BR pthread_attr_init (3),
.BR pthread_attr_setschedparam (3),
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_ATTR_SETSCHEDPARAM 3 2012-03-15 "Linux" "Linux Programmer's Manual"
.SH NAME
See
.BR pthread_setschedparam (3).
.SH SEE ALSO
+.ad l
+.nh
.BR sched_get_priority_min (2),
.BR sched_setscheduler (2),
.BR pthread_attr_init (3),
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_ATTR_SETSCHEDPOLICY 3 2010-02-03 "Linux" "Linux Programmer's Manual"
.SH NAME
See
.BR pthread_setschedparam (3).
.SH SEE ALSO
+.ad l
+.nh
.BR sched_setscheduler (2),
.BR pthread_attr_init (3),
.BR pthread_attr_setinheritsched (3),
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_ATTR_SETSCOPE 3 2008-10-24 "Linux" "Linux Programmer's Manual"
.SH NAME
.SH NOTES
The
.B PTHREAD_SCOPE_SYSTEM
-contention scope typically indicates that a userspace thread is
+contention scope typically indicates that a user-space thread is
bound directly to a single kernel-scheduling entity.
This is the case on Linux for the obsolete LinuxThreads implementation
and the modern NPTL implementation,
POSIX.1-2001 specifies that the default contention scope is
implementation-defined.
.SH SEE ALSO
+.ad l
+.nh
.BR pthread_attr_init (3),
.BR pthread_attr_setaffinity_np (3),
.BR pthread_attr_setinheritsched (3),
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_ATTR_SETSTACK 3 2008-10-24 "Linux" "Linux Programmer's Manual"
.SH NAME
See
.BR pthread_attr_init (3).
.SH SEE ALSO
+.ad l
+.nh
.BR mmap (2),
.BR mprotect (2),
.BR posix_memalign (3),
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_ATTR_SETSTACKADDR 3 2008-10-24 "Linux" "Linux Programmer's Manual"
.SH NAME
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_ATTR_SETSTACKSIZE 3 2012-03-15 "Linux" "Linux Programmer's Manual"
.SH NAME
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_CANCEL 3 2008-11-17 "Linux" "Linux Programmer's Manual"
.SH NAME
}
.fi
.SH SEE ALSO
+.ad l
+.nh
.BR pthread_cleanup_push (3),
.BR pthread_create (3),
.BR pthread_exit (3),
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_CLEANUP_PUSH 3 2008-11-24 "Linux" "Linux Programmer's Manual"
.SH NAME
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_CLEANUP_PUSH_DEFER_NP 3 2008-12-04 "Linux" "Linux Programmer's Manual"
.SH NAME
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH PTHREAD_CREATE 3 2012-03-15 "Linux" "Linux Programmer's Manual"
+.TH PTHREAD_CREATE 3 2012-08-03 "Linux" "Linux Programmer's Manual"
.SH NAME
pthread_create \- create a new thread
.SH SYNOPSIS
static void *
thread_start(void *arg)
{
- struct thread_info *tinfo = (struct thread_info *) arg;
+ struct thread_info *tinfo = arg;
char *uargv, *p;
printf("Thread %d: top of stack near %p; argv_string=%s\\n",
- tinfo\->thread_num, &p, tinfo->argv_string);
+ tinfo\->thread_num, &p, tinfo\->argv_string);
uargv = strdup(tinfo\->argv_string);
if (uargv == NULL)
}
.fi
.SH SEE ALSO
+.ad l
+.nh
.BR getrlimit (2),
.BR pthread_attr_init (3),
.BR pthread_cancel (3),
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_DETACH 3 2008-11-27 "Linux" "Linux Programmer's Manual"
.SH NAME
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_EQUAL 3 2009-03-30 "Linux" "Linux Programmer's Manual"
.SH NAME
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_EXIT 3 2009-03-30 "Linux" "Linux Programmer's Manual"
.SH NAME
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_GETATTR_NP 3 2010-09-10 "Linux" "Linux Programmer's Manual"
.SH NAME
{
if (msg != NULL)
fputs(msg, stderr);
- fprintf(stderr, "Usage: %s [\-s stack-size [\-a]]"
- " [\-g guard-size]\\n", pname);
+ fprintf(stderr, "Usage: %s [\-s stack\-size [\-a]]"
+ " [\-g guard\-size]\\n", pname);
fprintf(stderr, "\\t\\t\-a means program should allocate stack\\n");
exit(EXIT_FAILURE);
}
}
.fi
.SH SEE ALSO
+.ad l
+.nh
.BR pthread_attr_getaffinity_np (3),
.BR pthread_attr_getdetachstate (3),
.BR pthread_attr_getguardsize (3),
.\" Copyright (c) 2009 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_GETCPUCLOCKID 3 2009-02-08 "Linux" "Linux Programmer's Manual"
.SH NAME
--- /dev/null
+.so man3/pthread_setname_np.3
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_JOIN 3 2008-11-27 "Linux" "Linux Programmer's Manual"
.SH NAME
.\" Copyright (c) 2009 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH PTHREAD_KILL 3 2009-01-28 "Linux" "Linux Programmer's Manual"
+.TH PTHREAD_KILL 3 2012-08-19 "Linux" "Linux Programmer's Manual"
.SH NAME
pthread_kill \- send a signal to a thread
.SH SYNOPSIS
.I sig
to
.IR thread ,
-another thread in the same process as the caller.
+a thread in the same process as the caller.
The signal is asynchronously directed to
.IR thread .
but if the disposition of the signal is "stop", "continue", or "terminate",
this action will affect the whole process.
.SH SEE ALSO
-.BR kill (2)
+.BR kill (2),
.BR sigaction (2),
.BR sigpending (2),
.BR pthread_self (3),
.\" Copyright (c) 2009 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_KILL_OTHER_THREADS_NP 3 2010-09-09 "Linux" "Linux Programmer's Manual"
.SH NAME
(Nothing needs to be done,
because the implementation does the right thing during an
.BR execve (2).)
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR execve (2),
.BR pthread_cancel (3),
.BR pthread_setcancelstate (3),
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_SELF 3 2008-10-24 "Linux" "Linux Programmer's Manual"
.SH NAME
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_SETAFFINITY_NP 3 2010-09-10 "Linux" "Linux Programmer's Manual"
.SH NAME
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_SETCANCELSTATE 3 2008-11-24 "Linux" "Linux Programmer's Manual"
.SH NAME
.\" Copyright (c) 2009 Michael Kerrisk, <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_SETCONCURRENCY 3 2009-04-10 "Linux" "Linux Programmer's Manual"
.SH NAME
--- /dev/null
+.\" Copyright (C) 2012 Chandan Apsangi <chandan.jc@gmail.com>
+.\" and Copyright (C) 2013 Michael Kerrisk <mtk.manpages@gmail.com>
+.\"
+.\" %%%LICENSE_START(VERBATIM)
+.\" Permission is granted to make and distribute verbatim copies of this
+.\" manual provided the copyright notice and this permission notice are
+.\" preserved on all copies.
+.\"
+.\" Permission is granted to copy and distribute modified versions of this
+.\" manual under the conditions for verbatim copying, provided that the
+.\" entire resulting derived work is distributed under the terms of a
+.\" permission notice identical to this one.
+.\"
+.\" Since the Linux kernel and libraries are constantly changing, this
+.\" manual page may be incorrect or out-of-date. The author(s) assume no
+.\" responsibility for errors or omissions, or for damages resulting from
+.\" the use of the information contained herein. The author(s) may not
+.\" have taken the same level of care in the production of this manual,
+.\" which is licensed free of charge, as they might when working
+.\" professionally.
+.\"
+.\" Formatted or processed versions of this manual, if unaccompanied by
+.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
+.\"
+.TH PTHREAD_SETNAME_NP 3 2013-02-04 "Linux" "Linux Programmer's Manual"
+.SH NAME
+pthread_setname_np, pthread_getname_np \- set/get the name of a thread
+.SH SYNOPSIS
+.nf
+.BR "#define _GNU_SOURCE" " /* See feature_test_macros(7) */"
+.B #include <pthread.h>
+.BI "int pthread_setname_np(pthread_t *" thread ", const char *" name ");
+.BI "int pthread_getname_np(pthread_t *" thread ,
+.BI " const char *" name ", size_t " len );
+.fi
+.sp
+Compile and link with \fI\-pthread\fP.
+.SH DESCRIPTION
+By default, all the threads created using
+.BR pthread_create ()
+inherit the program name.
+The
+.BR pthread_setname_np ()
+function can be used to set a unique name for a thread,
+which can be useful for debugging
+multithreaded applications.
+The thread name is a meaningful C language string, whose length is
+restricted to 16 characters, including the terminating null byte.
+The
+.I thread
+argument specifies the thread whose name is to be changed;
+.I name
+specifies the new name.
+
+The
+.BR pthread_getname_np ()
+function can be used to retrieve the name of the thread.
+The
+.I thread
+argument specifies the thread whose name is to be retrieved.
+The buffer
+.I name
+is used to return the thread name;
+.I len
+specifies the number of bytes available in
+.IR name .
+The buffer specified by
+.I name
+should be at least 16 characters in length.
+The returned thread name in the output buffer will be null terminated.
+.SH RETURN VALUE
+On success, these functions return 0;
+on error, they return a nonzero error number.
+.SH ERRORS
+The
+.BR pthread_setname_np ()
+function can fail with the following error:
+.TP
+.B ERANGE
+The length of the string specified pointed to by
+.I name
+exceeds the allowed limit.
+.PP
+The
+.BR pthread_getname_np ()
+function can fail with the following error:
+.TP
+.B ERANGE
+The buffer specified by
+.I name
+and
+.I len
+is too small to hold the thread name.
+.PP
+If either of these functions fails to open
+.IR /proc/self/task/[tid]/comm ,
+then the call may fail with one of the errors described in
+.BR open (2).
+.SH VERSIONS
+These functions first appeared in glibc in version 2.12.
+.SH CONFORMING TO
+These functions are nonstandard GNU extensions.
+.SH NOTES
+.BR pthread_setname_np ()
+internally writes to the thread specific comm file under
+.IR /proc
+filesystem:
+.IR /proc/self/task/[tid]/comm .
+.BR pthread_getname_np ()
+retrieves it from the same location.
+.SH EXAMPLE
+.PP
+The program below demonstrates the use of
+.BR pthread_setname_np ()
+and
+.BR pthread_getname_np ().
+
+The following shell session shows a sample run of the program:
+.in +4n
+.nf
+
+.RB "$" " ./a.out"
+Created a thread. Default name is: a.out
+The thread name after setting it is THREADFOO.
+\fB^Z\fP # Suspend the program
+[1]+ Stopped ./a.out
+.RB "$ " "ps H -C a.out -o 'pid tid cmd comm'"
+ PID TID CMD COMMAND
+ 5990 5990 ./a.out a.out
+ 5990 5991 ./a.out THREADFOO
+.RB "$ " "cat /proc/5990/task/5990/comm"
+a.out
+.RB "$ " "cat /proc/5990/task/5991/comm"
+THREADFOO
+.fi
+.in
+.SS Program source
+\&
+.nf
+#define _GNU_SOURCE
+#include <pthread.h>
+#include <stdio.h>
+#include <string.h>
+#include <unistd.h>
+#include <errno.h>
+#include <stdlib.h>
+
+#define NAMELEN 16
+
+#define errExitEN(en, msg) \\
+ do { errno = en; perror(msg); exit(EXIT_FAILURE); \\
+ } while (0)
+
+static void *
+threadfunc(void *parm)
+{
+ sleep(5); // allow main program to set the thread name
+ return NULL;
+}
+
+int
+main(int argc, char **argv)
+{
+ pthread_t thread;
+ int rc;
+ char thread_name[NAMELEN];
+
+ rc = pthread_create(&thread, NULL, threadfunc, NULL);
+ if (rc != 0)
+ errExitEN(rc, "pthread_create");
+
+ rc = pthread_getname_np(thread, thread_name, NAMELEN);
+ if (rc != 0)
+ errExitEN(rc, "pthread_getname_np");
+
+ printf("Created a thread. Default name is: %s\\n", thread_name);
+ rc = pthread_setname_np(thread, (argc > 1) ? argv[1] : "THREADFOO");
+ if (rc != 0)
+ errExitEN(rc, "pthread_setname_np");
+
+ sleep(2);
+
+ rc = pthread_getname_np(thread, thread_name,
+ (argc > 2) ? atoi(argv[1]) : NAMELEN);
+ if (rc != 0)
+ errExitEN(rc, "pthread_getname_np");
+ printf("The thread name after setting it is %s.\\n", thread_name);
+
+ rc = pthread_join(thread, NULL);
+ if (rc != 0)
+ errExitEN(rc, "pthread_join");
+
+ printf("Done\\n");
+ exit(EXIT_SUCCESS);
+}
+.fi
+.SH SEE ALSO
+.ad l
+.nh
+.BR prctl (2),
+.BR pthread_create (3),
+.BR pthreads (7)
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_SETSCHEDPARAM 3 2008-11-17 "Linux" "Linux Programmer's Manual"
.SH NAME
}
.fi
.SH SEE ALSO
+.ad l
+.nh
.BR getrlimit (2),
.BR sched_get_priority_min (2),
.BR sched_setscheduler (2),
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_SETSCHEDPRIO 3 2008-11-06 "Linux" "Linux Programmer's Manual"
.SH NAME
in each scheduling policy, see
.BR sched_setscheduler (2).
.SH SEE ALSO
+.ad l
+.nh
.BR getrlimit (2),
.BR sched_get_priority_min (2),
.BR sched_setscheduler (2),
.\" Copyright (c) 2009 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH PTHREAD_SIGMASK 3 2011-10-16 "Linux" "Linux Programmer's Manual"
+.TH PTHREAD_SIGMASK 3 2012-08-03 "Linux" "Linux Programmer's Manual"
.SH NAME
pthread_sigmask \- examine and change mask of blocked signals
.SH SYNOPSIS
static void *
sig_thread(void *arg)
{
- sigset_t *set = (sigset_t *) arg;
+ sigset_t *set = arg;
int s, sig;
for (;;) {
.SH SEE ALSO
.BR sigaction (2),
.BR sigpending (2),
-.BR sigprocmask (2)
+.BR sigprocmask (2),
.BR pthread_create (3),
.BR pthread_kill (3),
.BR sigsetops (3),
.\" Copyright (c) 2010 Michael Kerrisk, <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH PTHREAD_SIGQUEUE 3 2011-09-23 "Linux" "Linux Programmer's Manual"
+.TH PTHREAD_SIGQUEUE 3 2012-08-19 "Linux" "Linux Programmer's Manual"
.SH NAME
pthread_sigqueue \- queue a signal and data to a thread
.SH SYNOPSIS
.BR pthread_sigqueue ()
function performs a similar task to
.BR sigqueue (3),
-but, rather than sending a signal to another process,
-it sends a signal to another thread in the same process as the
+but, rather than sending a signal to a process,
+it sends a signal to a thread in the same process as the
calling thread.
The
.I thread
-argument is the ID of another thread in the same process as the caller.
+argument is the ID of a thread in the same process as the caller.
The
.I sig
argument specifies the signal to be sent.
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_TESTCANCEL 3 2012-04-14 "Linux" "Linux Programmer's Manual"
.SH NAME
.BR pthread_setcancelstate (3)),
or no cancellation request is pending,
then a call to
-.BR pthread_testcancel (3)
+.BR pthread_testcancel ()
has no effect.
.SH RETURN VALUE
This function does not return a value.
.\" Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREAD_TRYJOIN_NP 3 2010-09-10 "Linux" "Linux Programmer's Manual"
.SH NAME
.\" Copyright (c) 2009 Michael Kerrisk, <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH PTHREAD_YIELD 3 2009-04-10 "Linux" "Linux Programmer's Manual"
+.TH PTHREAD_YIELD 3 2013-03-05 "Linux" "Linux Programmer's Manual"
.SH NAME
pthread_yield \- yield the processor
.SH SYNOPSIS
.nf
+.BR "#define _GNU_SOURCE" " /* See feature_test_macros(7) */"
.B #include <pthread.h>
.B int pthread_yield(void);
.BR sched_yield (2).
.SH SEE ALSO
.BR sched_setscheduler (2),
-.BR sched_yield (2)
+.BR sched_yield (2),
.BR pthreads (7)
-.\" Hey Emacs! This file is -*- nroff -*- source.
+.\" %%%LICENSE_START(PUBLIC_DOMAIN)
.\" This page is in the public domain. - aeb
+.\" %%%LICENSE_END
.\"
.\" 2004-12-17, mtk, added description of ptsname_r() + ERRORS
.\"
.I buflen
argument specifies the number of bytes available in
.IR buf .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR ptsname ()
returns a pointer to a string in static storage which will be
.SH VERSIONS
.BR ptsname ()
is provided in glibc since version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR ptsname ()
is part of the UNIX 98 pseudoterminal support (see
.BR pts (4)).
.I errno
set to indicate the error.
Avoid using this function in portable programs.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR grantpt (3),
.BR posix_openpt (3),
.BR ttyname (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
\fIvalue\fP.
The string pointed to by \fIstring\fP becomes part of the environment,
so altering the string changes the environment.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR putenv ()
function returns zero on success,
.TP
.B ENOMEM
Insufficient space to allocate new environment.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001, 4.3BSD.
.SH NOTES
The
The 4.4BSD version, like glibc 2.0, uses a copy.
.LP
SUSv2 removes the \fIconst\fP from the prototype, and so does glibc 2.1.3.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR clearenv (3),
.BR getenv (3),
.BR setenv (3),
.\" Copyright 2003 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH PUTGRENT 3 2003-09-09 "GNU" "Linux Programmer's Manual"
.SH NAME
};
.fi
.in
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The function returns zero on success, and a nonzero value on error.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This function is a GNU extension.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fgetgrent (3),
.BR getgrent (3),
.BR group (5)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
};
.fi
.in
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR putpwent ()
function returns 0 on success, or \-1 if an error
.TP
.B EINVAL
Invalid (NULL) argument given.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR endpwent (3),
.BR fgetpwent (3),
.BR getpw (3),
.\" Copyright (c) 1993 by Thomas Koenig (ig25@rz.uni-karlsruhe.de)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
+.\"
.\" Modified Sat Jul 24 18:42:59 1993 by Rik Faith (faith@cs.unc.edu)
.TH PUTS 3 2011-09-28 "GNU" "Linux Programmer's Manual"
.SH NAME
.PP
For nonlocking counterparts, see
.BR unlocked_stdio (3).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR fputc (),
.BR putc ()
and
return a nonnegative number on success, or
.B EOF
on error.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C89, C99.
.SH BUGS
It is not advisable to mix calls to output functions from the
.BR write (2)
for the file descriptor associated with the same output stream; the results
will be undefined and very probably not what you want.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR write (2),
.BR ferror (3),
.BR fopen (3),
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.PP
For a nonlocking counterpart, see
.BR unlocked_stdio (3).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR putwchar ()
function returns \fIwc\fP if no error occurred, or
.B WEOF
to indicate an error.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.BR putwchar ()
will actually write
the multibyte sequence corresponding to the wide character \fIwc\fP.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fputwc (3),
.BR unlocked_stdio (3)
.\" Copyright (C) 2002 Andries Brouwer <aeb@cwi.nl>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" This replaces an earlier man page written by Walter Harms
.\" <walter.harms@informatik.uni-oldenburg.de>.
.BR ecvt (3)
and
.BR gcvt (3).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4.
Not seen in most common UNIX implementations,
but occurs in SunOS.
Instead,
.BR sprintf (3)
is recommended.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ecvt (3),
.BR ecvt_r (3),
.BR gcvt (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
In this way, the comparison function does not need to use global variables to
pass through arbitrary arguments, and is therefore reentrant and safe to
use in threads.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR qsort ()
and
.SH VERSIONS
.BR qsort_r ()
was added to glibc in version 2.8.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The
.BR qsort ()
function conforms to SVr4, 4.3BSD, C89, C99.
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sort (1),
.BR alphasort (3),
.BR strcmp (3),
.\" Copyright (c) 1993
.\" The Regents of the University of California. All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)queue.3 8.2 (Berkeley) 1/24/94
.\"
removes the element
.I elm
from the list.
-.SS List Example
+.SS List example
.nf
LIST_HEAD(listhead, entry) head;
struct listhead *headp; /* List head. */
while (head.lh_first != NULL) /* Delete. */
LIST_REMOVE(head.lh_first, entries);
.fi
-.SS Tail Queues
+.SS Tail queues
A tail queue is headed by a structure defined by the
.B TAILQ_HEAD
macro.
removes the element
.I elm
from the tail queue.
-.SS Tail Queue Example
+.SS Tail queue example
.nf
TAILQ_HEAD(tailhead, entry) head;
struct tailhead *headp; /* Tail queue head. */
while (head.tqh_first != NULL)
TAILQ_REMOVE(&head, head.tqh_first, entries);
.fi
-.SS Circular Queues
+.SS Circular queues
A circular queue is headed by a structure defined by the
.B CIRCLEQ_HEAD
macro.
removes the element
.I elm
from the circular queue.
-.SS Circular Queue Example
+.SS Circular queue example
.nf
CIRCLEQ_HEAD(circleq, entry) head;
struct circleq *headp; /* Circular queue head. */
while (head.cqh_first != (void *)&head)
CIRCLEQ_REMOVE(&head, head.cqh_first, entries);
.fi
-.SH "CONFORMING TO"
+.SH CONFORMING TO
Not in POSIX.1-2001.
Present on the BSDs.
The
.\" Copyright (c) 1993 by Thomas Koenig (ig25@rz.uni-karlsruhe.de)
.\" and Copyright (C) 2008 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
+.\"
.\" Modified Sat Jul 24 18:40:56 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified 1995 by Mike Battersby (mib@deakin.edu.au)
.\"
If the signal causes a handler to be called,
.BR raise ()
will only return after the signal handler has returned.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR raise ()
returns 0 on success, and nonzero for failure.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C89, C99, POSIX.1-2001.
.SH NOTES
Since version 2.3.3, glibc implements
.BR raise ()
using
.BR kill (2).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getpid (2),
.BR kill (2),
.BR sigaction (2),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
Try
.BR drand48_r (3)
instead.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR rand ()
and
The
.BR srand ()
function returns no value.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The functions
.BR rand ()
and
}
.fi
.in
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR drand48 (3),
.BR random (3)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.BR initstate ()
or be the result of a previous call of
.BR setstate ().
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR random ()
function returns a value between 0 and
.B EINVAL
A state array of less than 8 bytes was specified to
.BR initstate ().
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD, POSIX.1-2001.
.SH NOTES
Current "optimal" values for the size of the state array \fIn\fP are
.IR "The Art of Computer Programming" ,
volume 2 (Seminumerical Algorithms), 2nd ed.; Reading, Massachusetts:
Addison-Wesley Publishing Company, 1981.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR drand48 (3),
.BR rand (3),
.BR random_r (3),
.\" Copyright 2008 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\"
.TH RANDOM_R 3 2008-03-07 "GNU" "Linux Programmer's Manual"
except that it modifies the state in the object pointer to by
.IR buf ,
rather than modifying the global state variable.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
All of these functions return 0 on success, or \-1 on error.
.SH ERRORS
.TP
argument to
.BR random_r ()
was NULL.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are nonstandard glibc extensions.
.\" These functions appear to be on Tru64, but don't seem to be on
.\" Solaris, HP-UX, or FreeBSD.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR drand48 (3),
.BR rand (3),
.BR random (3)
.\" Copyright (c) 1983, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)rcmd.3 8.1 (Berkeley) 6/4/93
.\"
and
.BR ruserok_af ()
functions are provide in glibc since version 2.2.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
Not in POSIX.1-2001.
Present on the BSDs, Solaris, and many other systems.
These
.\" Copyright (C), 1995, Graeme W. Wilford. (Wilf.)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Wed Jun 14 16:10:28 BST 1995 Wilf. (G.Wilford@@ee.surrey.ac.uk)
.\"
.I string
matches the previously compiled
.IR regex .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR re_comp ()
returns NULL on successful compilation of
.I regex
.BR re_exec ()
returns 1 for a successful match, zero for failure.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD.
.SH NOTES
These functions are obsolete; the functions documented in
.BR regcomp (3)
should be used instead.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR regcomp (3),
.BR regex (7),
GNU regex manual
.\" Copyright (C) 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.\" Rework discussion of nonstandard structure fields.
.\" 2008-09-11, mtk, Document readdir_r().
.\"
-.TH READDIR 3 2010-09-10 "" "Linux Programmer's Manual"
+.TH READDIR 3 2012-07-07 "" "Linux Programmer's Manual"
.SH NAME
readdir, readdir_r \- read a directory
.SH SYNOPSIS
if the end of the directory stream was encountered,
then NULL is instead returned in
.IR *result .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR readdir ()
returns a pointer to a
.TP
.B EBADF
Invalid directory stream descriptor \fIdirp\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
.SH NOTES
Only the fields
.in +4n
.nf
-len = offsetof(struct dirent, d_name) +
- pathconf(dirpath, _PC_NAME_MAX) + 1
+name_max = pathconf(dirpath, _PC_NAME_MAX);
+if (name_max == \-1) /* Limit not defined, or error */
+ name_max = 255; /* Take a guess */
+len = offsetof(struct dirent, d_name) + name_max + 1;
entryp = malloc(len);
.fi
.I d_name
is the last field in a
.IR "struct dirent" .)
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getdents (2),
.BR read (2),
.BR closedir (3),
.\" Copyright (C) 1999 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Rewritten old page, 990824, aeb@cwi.nl
.\" 2004-12-14, mtk, added discussion of resolved_path == NULL
.\"
-.TH REALPATH 3 2012-05-05 "" "Linux Programmer's Manual"
+.TH REALPATH 3 2013-03-15 "" "Linux Programmer's Manual"
.SH NAME
realpath \- return the canonicalized absolute pathname
.SH SYNOPSIS
.\" The
.\" .BR realpath ()
.\" function first appeared in 4.4BSD, contributed by Jan-Simon Pendry.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
If there is no error,
.BR realpath ()
returns a pointer to the
.IR resolved_path .
-Otherwise it returns a NULL pointer, and the contents
+Otherwise, it returns a NULL pointer, the contents
of the array
.I resolved_path
are undefined, and
.B ENOTDIR
A component of the path prefix is not a directory.
.SH VERSIONS
-On Linux this function appeared in libc 4.5.21.
-.SH "CONFORMING TO"
+On Linux, this function appeared in libc 4.5.21.
+.SH CONFORMING TO
4.4BSD, POSIX.1-2001.
POSIX.1-2001 says that the behavior if
is NULL is implementation-defined.
POSIX.1-2008 specifies the behavior described in this page.
.SH NOTES
-In 4.4BSD and Solaris the limit on the pathname length is
+In 4.4BSD and Solaris, the limit on the pathname length is
.B MAXPATHLEN
(found in \fI<sys/param.h>\fP).
SUSv2 prescribes
.BR realpath ()
is given in \fI<unistd.h>\fP in libc4 and libc5,
but in \fI<stdlib.h>\fP everywhere else.
+.SS GNU extensions
+If the call fails with either
+.BR EACCES
+or
+.BR ENOENT
+and
+.I resolved_path
+is not NULL, then the prefix of
+.I path
+that is not readable or does not exist is returned in
+.IR resolved_path .
.SH BUGS
The POSIX.1-2001 standard version of this function is broken by design,
since it is impossible to determine a suitable size for the output buffer,
feature, not standardized in POSIX.1-2001,
but standardized in POSIX.1-2008, allows this design problem to be avoided.
.LP
-The libc4 and libc5 implementation contains a buffer overflow
+The libc4 and libc5 implementation contained a buffer overflow
(fixed in libc-5.4.13).
Thus, set-user-ID programs like
.BR mount (8)
-need a private version.
-.SH "SEE ALSO"
+needed a private version.
+.SH SEE ALSO
.BR readlink (2),
.BR canonicalize_file_name (3),
.BR getcwd (3),
.\" Copyright (c) 1990, 1993
.\" The Regents of the University of California. All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)recno.3 8.5 (Berkeley) 8/18/94
.\"
was too large to fit.
.SH BUGS
Only big and little endian byte order is supported.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR btree (3),
.BR dbopen (3),
.BR hash (3),
.BR mpool (3)
-.sp
+
.IR "Document Processing in a Relational Database System" ,
Michael Stonebraker, Heidi Stettner, Joseph Kalash, Antonin Guttman,
Nadene Lynn, Memorandum No. UCB/ERL M82/32, May 1982.
.\" Copyright (C), 1995, Graeme W. Wilford. (Wilf.)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Wed Jun 14 16:10:28 BST 1995 Wilf. (G.Wilford@ee.surrey.ac.uk)
.\" Tiny change in formatting - aeb, 950812
.in \\n(INu+\\$1
.ti -\\$1
..
-.TH REGEX 3 2011-09-27 "GNU" "Linux Programmer's Manual"
+.TH REGEX 3 2013-02-11 "GNU" "Linux Programmer's Manual"
.SH NAME
regcomp, regexec, regerror, regfree \- POSIX regex functions
.SH SYNOPSIS
.BI "void regfree(regex_t *" preg );
.fi
.SH DESCRIPTION
-.SS "POSIX Regex Compiling"
+.SS POSIX regex compiling
.BR regcomp ()
is used to compile a regular expression into a form that is suitable
for subsequent
searches using this pattern buffer will be case insensitive.
.TP
.B REG_NOSUB
-Support for substring addressing of matches is not required.
+Do not report position of matches.
The
.I nmatch
and
.I eflags
contains
.BR REG_NOTEOL .
-.SS "POSIX Regex Matching"
+.SS POSIX regex matching
.BR regexec ()
is used to match a null-terminated string
against the precompiled pattern buffer,
compilation flag
.B REG_NEWLINE
above)
-.SS "Byte Offsets"
+.SS Byte offsets
Unless
.B REG_NOSUB
was set for the compilation of the pattern buffer, it is possible to
-obtain substring match addressing information.
+obtain match addressing information.
.I pmatch
must be dimensioned to have at least
.I nmatch
These are filled in by
.BR regexec ()
with substring match addresses.
+The offsets of the subexpression starting at the
+.IR i th
+open parenthesis are stored in
+.IR pmatch[i] .
+The entire regular expression's match addresses are stored in
+.IR pmatch[0] .
+(Note that to return the offsets of
+.I N
+subexpression matches,
+.I nmatch
+must be at least
+.IR N+1 .)
Any unused structure elements will contain the value \-1.
The
.I rm_eo
element indicates the end offset of the match,
which is the offset of the first character after the matching text.
-.SS "Posix Error Reporting"
+.SS POSIX error reporting
.BR regerror ()
is used to turn the error codes that can be returned by both
.BR regcomp ()
is filled in with the first
.I "errbuf_size \- 1"
characters of the error message and a terminating null byte (\(aq\\0\(aq).
-.SS "POSIX Pattern Buffer Freeing"
+.SS POSIX pattern buffer freeing
Supplying
.BR regfree ()
with a precompiled pattern buffer,
will free the memory allocated to the pattern buffer by the compiling
process,
.BR regcomp ().
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR regcomp ()
returns zero for a successful compilation or an error code for failure.
Unknown character class name.
.TP
.B REG_EEND
-Non specific error.
+Nonspecific error.
This is not defined by POSIX.2.
.TP
.B REG_EESCAPE
.TP
.B REG_ESUBREG
Invalid back reference to a subexpression.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR grep (1),
-.BR regex (7),
-GNU regex manual
+.BR regex (7)
+.br
+The glibc manual section,
+.I "Regular Expression Matching"
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
The
.BR drem ()
function does precisely the same thing.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these
functions return the floating-point remainder,
\fIx\fP\-\fIn\fP*\fIy\fP.
An invalid floating-point exception
.RB ( FE_INVALID )
is raised.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.\" IEC 60559.
The functions
.BR remainder (),
.\" Bug raised: http://sources.redhat.com/bugzilla/show_bug.cgi?id=6779
.SH EXAMPLE
The call "remainder(29.0, 3.0)" returns \-1.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR div (3),
.BR fmod (3),
.BR remquo (3)
.\" This file is derived from unlink.2, which has the following copyright:
.\"
-.\" --snip--
.\" This manpage is Copyright (C) 1992 Drew Eckhardt;
.\" 1993 Ian Jackson.
.\"
+.\" Edited into remove.3 shape by:
+.\" Graeme W. Wilford (G.Wilford@ee.surrey.ac.uk) on 13th July 1994
+.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" --snip--
-.\"
-.\" Edited into remove.3 shape by:
-.\" Graeme W. Wilford (G.Wilford@ee.surrey.ac.uk) on 13th July 1994
+.\" %%%LICENSE_END
.\"
.TH REMOVE 3 2008-12-03 "GNU" "Linux Programmer's Manual"
.SH NAME
If the name referred to a socket, FIFO, or device, the name is removed,
but processes which have the object open may continue to use it.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.BR unlink (2)
and
.BR rmdir (2).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C89, C99, 4.3BSD, POSIX.1-2001.
.SH NOTES
Under libc4 and libc5,
.SH BUGS
Infelicities in the protocol underlying NFS can cause the unexpected
disappearance of files which are still being used.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR rm (1),
.BR unlink (1),
.BR link (2),
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
+.\"
.\" based on glibc infopages
.\" polished, aeb
+.\"
.TH REMQUO 3 2010-09-20 "GNU" "Linux Programmer's Manual"
.SH NAME
remquo, remquof, remquol \- remainder and part of quotient
.\" Bug raised: http://sources.redhat.com/bugzilla/show_bug.cgi?id=6802
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fmod (3),
.BR logb (3),
.BR remainder (3)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.\" Modified 1993-07-25 by Rik Faith (faith@cs.unc.edu)
.\" Modified 2004-10-31 by aeb
.\"
-.TH RESOLVER 3 2012-04-23 "GNU" "Linux Programmer's Manual"
+.TH RESOLVER 3 2013-03-05 "GNU" "Linux Programmer's Manual"
.SH NAME
res_init, res_query, res_search, res_querydomain, res_mkquery, res_send,
dn_comp, dn_expand \- resolver routines
The
.BR res_init ()
function reads the configuration files (see
-resolv.conf(5)) to get the default domain name, search order and name
+.BR resolv.conf (5))
+to get the default domain name, search order and name
server address(es).
If no server is given, the local host is tried.
If no domain is given, that associated with the local host is used.
.TP
.B RES_DEBUG
Print debugging messages.
+This option is only available if glibc was built with debugging enabled,
+.\" See resolv/README.
+.\" Support for RES_DEBUG was made conditional in glibc 2.2.
+which is not the default.
.TP
.B RES_AAONLY
Accept authoritative answers only.
This list is not complete.
You can find some other flags described in
.BR resolv.conf (5).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR res_init ()
function returns 0 on success, or \-1 if an error
/etc/resolv.conf resolver configuration file
/etc/host.conf resolver configuration file
.fi
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR gethostbyname (3),
.BR resolv.conf (5),
.BR resolver (5),
.\" Copyright (C) 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.BR rewinddir ()
function resets the position of the directory
stream \fIdirp\fP to the beginning of the directory.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR rewinddir ()
function returns no value.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR closedir (3),
.BR opendir (3),
.BR readdir (3),
.\" Copyright (c) 1983, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)rexec.3 8.1 (Berkeley) 6/4/93
.\" $FreeBSD: src/lib/libcompat/4.3/rexec.3,v 1.12 2004/07/02 23:52:14 ru Exp $
The
.BR rexec_af ()
function was added to glibc in version 2.2.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are not in POSIX.1-2001.
The
.BR rexec ()
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH RINT 3 2010-09-20 "" "Linux Programmer's Manual"
.SH NAME
checkable via
.BR fetestexcept (3))
when the result differs in value from the argument.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
These functions return the rounded integer value.
If \fIx\fP is integral, +0, \-0, NaN, or infinite,
.SH ERRORS
No errors occur.
POSIX.1-2001 documents a range error for overflows, but see NOTES.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
.SH NOTES
SUSv2 and POSIX.1-2001 contain text about overflow (which might set
you probably want to use one of the functions described in
.BR lrint (3)
instead.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ceil (3),
.BR floor (3),
.BR lrint (3),
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH ROUND 3 2010-09-20 "" "Linux Programmer's Manual"
.SH NAME
is 1.0, and
.IR round(\-0.5)
is \-1.0.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
These functions return the rounded integer value.
If \fIx\fP is integral, +0, \-0, NaN, or infinite,
POSIX.1-2001 documents a range error for overflows, but see NOTES.
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
.SH NOTES
POSIX.1-2001 contains text about overflow (which might set
you probably want to use one of the functions described in
.BR lround (3)
instead.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ceil (3),
.BR floor (3),
.BR lround (3),
.\" This page was taken from the 4.4BSD-Lite CDROM (BSD license)
.\"
+.\" %%%LICENSE_START(BSD_ONELINE_CDROM)
+.\" This page was taken from the 4.4BSD-Lite CDROM (BSD license)
+.\" %%%LICENSE_END
+.\"
.\" @(#)rpc.3n 2.4 88/08/08 4.0 RPCSRC; from 1.19 88/06/24 SMI
.\"
.\" 2007-12-30, mtk, Convert function prototypes to modern C syntax
.TH RPC 3 2008-07-17 "" "Linux Programmer's Manual"
.SH NAME
rpc \- library routines for remote procedure calls
-.SH "SYNOPSIS AND DESCRIPTION"
+.SH SYNOPSIS AND DESCRIPTION
These routines allow C programs to make procedure
calls on other machines across the network.
First, the client calls a procedure to send a data packet to the server.
typedef int \fIbool_t\fP;
-typedef bool_t (*\fIxdrproc_t\fP) (XDR *, void *,...);
+typedef bool_t (*\fIxdrproc_t\fP) (XDR *, void *, ...);
typedef bool_t (*\fIresultproc_t\fP) (caddr_t resp,
struct sockaddr_in *raddr);
This routine modifies the global variable
.IR svc_fds .
Service implementors usually do not need this routine.
-.SH "SEE ALSO"
+.SH SEE ALSO
.\" We don't have an rpc_secure.3 page in the set at the moment -- MTK, 19 Sep 05
.\" .BR rpc_secure (3),
.BR xdr (3)
-.br
+
The following manuals:
.RS
Remote Procedure Calls: Protocol Specification
rpcgen Programming Guide
.br
.RE
+
.IR "RPC: Remote Procedure Call Protocol Specification" ,
RFC\ 1050, Sun Microsystems, Inc.,
USC-ISI.
.\" Copyright (C) 2006 Justin Pryzby <pryzbyj@justinpryzby.com>
.\"
+.\" %%%LICENSE_START(PERMISSIVE_MISC)
.\" Permission is hereby granted, free of charge, to any person obtaining
.\" a copy of this software and associated documentation files (the
.\" "Software"), to deal in the Software without restriction, including
.\" CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
.\" TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
.\" SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
+.\" %%%LICENSE_END
.\"
.\" References:
.\" glibc manual and source
Regardless of the locale, responses matching \fB^[Yy]\fP are always
accepted as affirmative, and those matching \fB^[Nn]\fP are always
accepted as negative.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
After examining
.IR response ,
.BR rpmatch ()
is not available from \fIerrno\fP or anywhere else, but indicates a
failure of the regex engine (but this case is indistinguishable from
that of an unrecognized value of \fIresponse\fP).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR rpmatch ()
is not required by any standard, but
is available on a few other systems.
.\" Copyright 2003 walter harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
+.\"
.\" Modified 2003-04-04 Walter Harms
.\" <walter.harms@informatik.uni-oldenburg.de>
.\"
.\" Slightly polished, aeb, 2003-04-06
.\"
-.TH RTIME 3 2010-02-25 "GNU" "Linux Programmer's Manual"
+.TH RTIME 3 2012-08-03 "GNU" "Linux Programmer's Manual"
.SH NAME
rtime \- get time from a remote machine
.SH SYNOPSIS
.I timeout
is non-NULL, the udp/time socket (port 37) is used.
Otherwise, the tcp/time socket (port 37) is used.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, 0 is returned, and the obtained 32-bit time value is stored in
.IR timep\->tv_sec .
In case of error \-1 is returned, and
.TP
.B ETIMEDOUT
The waiting time as defined in timeout has expired.
-.SH "NOTES"
+.SH NOTES
Only IPv4 is supported.
.LP
Some
.I <sys/time.h>
instead of
.IR <rpc/auth_des.h> .
-.SH "BUGS"
+.SH BUGS
.BR rtime ()
in glibc 2.2.5 and earlier does not work properly on 64-bit machines.
-.SH "EXAMPLE"
+.SH EXAMPLE
This example requires that port 37 is up and open.
You may check
that the time entry within
struct hostent *hent;
int ret;
- memset((char *) &name, 0, sizeof(name));
+ memset(&name, 0, sizeof(name));
sethostent(1);
hent = gethostbyname(servername);
- memcpy((char *) &name.sin_addr, hent\->h_addr, hent\->h_length);
+ memcpy(&name.sin_addr, hent\->h_addr, hent\->h_length);
ret = rtime(&name, &time1, use_tcp ? NULL : &timeout);
if (ret < 0)
perror("rtime error");
- else
- printf("%s\\n", ctime((time_t *) &time1.tv_sec));
+ else {
+ time_t t = time1.tv_sec;
+ printf("%s\\n", ctime(&t));
+ }
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.\" .BR netdate (1),
.BR ntpdate (1),
.\" .BR rdate (1),
.\" This man page is Copyright (C) 1999 Andi Kleen <ak@muc.de>.
+.\"
+.\" %%%LICENSE_START(VERBATIM_ONE_PARA)
.\" Permission is granted to distribute possibly modified copies
.\" of this page provided the header is included verbatim,
.\" and in case of nontrivial modification author and date
.\" of the modification is added to the header.
+.\" %%%LICENSE_END
+.\"
.\" $Id: rtnetlink.3,v 1.2 1999/05/18 10:35:10 freitag Exp $
+.\"
.TH RTNETLINK 3 2012-03-24 "GNU" "Linux Programmer's Manual"
.SH NAME
rtnetlink \- macros to manipulate rtnetlink messages
memcpy(RTA_DATA(rta), &mtu, sizeof(mtu));
send(rtnetlink_sk, &req, req.nh.nlmsg_len);
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR netlink (3),
.BR netlink (7),
.BR rtnetlink (7)
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH SCALB 3 2010-09-20 "" "Linux Programmer's Manual"
.SH NAME
.\" FIXME . Is it intentional that these functions do not set errno?
.\" Bug raised: http://sources.redhat.com/bugzilla/show_bug.cgi?id=6803
.\" Bug raised: http://sources.redhat.com/bugzilla/show_bug.cgi?id=6804
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR scalb ()
is specified in POSIX.1-2001, but marked obsolescent.
POSIX.1-2008 removes the specification of
is nevertheless present on several other systems
.\" Looking at header files: scalbf() is present on the
.\" BSDs, Tru64, HP-UX 11, Irix 6.5; scalbl() is on HP-UX 11 and Tru64.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ldexp (3),
.BR scalbln (3)
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH SCALBLN 3 2010-09-20 "" "Linux Programmer's Manual"
.SH NAME
.\" Bug raised: http://sources.redhat.com/bugzilla/show_bug.cgi?id=6803
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
.SH NOTES
These functions differ from the obsolete functions described in
.BR scalbn ()
is equivalent to
.BR ldexp (3).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ldexp (3),
.BR scalb (3)
.\" Copyright (C) 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
the latter using
.BR strverscmp (3)
on the strings \fI(*a)\->d_name\fP and \fI(*b)\->d_name\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR scandir ()
function returns the number of directory entries
.SH VERSIONS
.BR versionsort ()
was added to glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR alphasort ()
and
.BR scandir ()
}
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR closedir (3),
.BR fnmatch (3),
.BR opendir (3),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 2012, Mark R. Bannister <cambridge@users.sourceforge.net>
.\" based on text in mkfifoat.3 Copyright (c) 2006, Michael Kerrisk
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.TH SCANDIRAT 3 2012-03-17 "Linux" "Linux Programmer's Manual"
.SH NAME
is absolute, then
.I dirfd
is ignored.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR scandirat ()
returns the number of directory entries selected.
.SH VERSIONS
.BR scandirat ()
was added to glibc in version 2.15.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This function is a GNU extension.
.SH NOTES
See
.BR openat (2)
for an explanation of the need for
.BR scandirat ().
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR openat (2),
.BR scandir (3),
.BR path_resolution (7)
.\" Chris Torek and the American National Standards Committee X3,
.\" on Information Processing Systems.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)scanf.3 6.14 (Berkeley) 1/8/93
.\"
.\" Add ERRORS section.
.\" Document the 'a' and 'm' modifiers for dynamic string allocation.
.\"
-.TH SCANF 3 2011-09-28 "GNU" "Linux Programmer's Manual"
+.TH SCANF 3 2013-01-30 "GNU" "Linux Programmer's Manual"
.SH NAME
scanf, fscanf, sscanf, vscanf, vsscanf, vfscanf \- input format conversion
.SH SYNOPSIS
.BR scanf ().
.TP
\(bu
-An optional \(aqa\(aq character.
-This is used with string conversions, and relieves the caller of the
+An optional \(aqm\(aq character.
+This is used with string conversions
+.RI ( %s ,
+.IR %c ,
+.IR %[ ),
+and relieves the caller of the
need to allocate a corresponding buffer to hold the input: instead,
.BR scanf ()
allocates a buffer of sufficient size,
The caller should subsequently
.BR free (3)
this buffer when it is no longer required.
-This is a GNU extension;
-C99 employs the \(aqa\(aq character as a conversion specifier (and
-it can also be used as such in the GNU implementation).
.TP
\(bu
An optional decimal integer which specifies the
not to make any assumptions on the effect of
.B %n
conversions on the return value.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
These functions return the number of input items
successfully matched and assigned,
which can be fewer than provided for,
.B ERANGE
The result of an integer conversion would exceed the size
that can be stored in the corresponding integer type.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The functions
.BR fscanf (),
.BR scanf (),
.I libc (glibc-1.08)
for a more concise description.
.SH NOTES
-The GNU C library supports a nonstandard extension that causes
-the library to dynamically allocate a string of sufficient size
-for input strings for the
-.B %s
-and
-\fB%a[\fP\fIrange\fP\fB]\fP
-conversion specifiers.
-.\" This feature seems to be present at least as far back as glibc 2.0.
-To make use of this feature, specify
+The GNU C library supported the dynamic allocation conversion specifier
+(as a nonstandard extension) via the
.B a
-as a length modifier (thus
-.B %as
-or
-\fB%a[\fP\fIrange\fP\fB]\fP).
-The caller must
-.BR free (3)
-the returned string, as in the following example:
-.in +4n
-.nf
-
-char *p;
-int n;
-
-errno = 0;
-n = scanf("%a[a-z]", &p);
-if (n == 1) {
- printf("read: %s\\n", p);
- free(p);
-} else if (errno != 0) {
- perror("scanf");
-} else {
- fprintf(stderr, "No matching characters\\n");
-}
-.fi
-.in
+character. This feature
+seems to be present at least as far back as glibc 2.0.
.PP
-As shown in the above example, it is only necessary to call
-.BR free (3)
-if the
-.BR scanf ()
-call successfully read a string.
-.PP
-The
-.B a
-modifier is not available if the program is compiled with
+It is not available if the program is compiled with
.I "gcc -std=c99"
or
.IR "gcc -D_ISOC99_SOURCE"
.IR "gcc -std=c99"
etc.)
.IP *
-It is specified in the upcoming revision of the POSIX.1 standard.
+It is specified in the POSIX.1-2008 standard.
.SH BUGS
All functions are fully C89 conformant, but provide the
additional specifiers
is not the same as on 4.4BSD,
as it may be used in float conversions equivalently to
.BR L .
-.SH "SEE ALSO"
+.SH EXAMPLE
+To use the dynamic allocation conversion specifier, specify
+.B m
+as a length modifier (thus
+.B %ms
+or
+\fB%m[\fP\fIrange\fP\fB]\fP).
+The caller must
+.BR free (3)
+the returned string, as in the following example:
+.in +4n
+.nf
+
+char *p;
+int n;
+
+errno = 0;
+n = scanf("%m[a-z]", &p);
+if (n == 1) {
+ printf("read: %s\\n", p);
+ free(p);
+} else if (errno != 0) {
+ perror("scanf");
+} else {
+ fprintf(stderr, "No matching characters\\n");
+}
+.fi
+.in
+.PP
+As shown in the above example, it is only necessary to call
+.BR free (3)
+if the
+.BR scanf ()
+call successfully read a string.
+.SH SEE ALSO
.BR getc (3),
.BR printf (3),
.BR setlocale (3),
.\" Copyright (c) 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH SCHED_GETCPU 3 2010-10-31 "Linux" "Linux Programmer's Manual"
.SH NAME
--- /dev/null
+.so man3/getenv.3
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.I offset
returned by
.BR telldir (3).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR seekdir ()
function returns no value.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD, POSIX.1-2001.
.SH NOTES
In glibc up to version 2.1.1, the type of the
POSIX.1-2001 specifies
.IR long ,
and this is the type used since glibc 2.1.2.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR lseek (2),
.BR closedir (3),
.BR opendir (3),
'\" t
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH SEM_CLOSE 3 2006-03-25 "Linux" "Linux Programmer's Manual"
+.TH SEM_CLOSE 3 2012-05-13 "Linux" "Linux Programmer's Manual"
.SH NAME
sem_close \- close a named semaphore
.SH SYNOPSIS
.BI "int sem_close(sem_t *" sem );
.fi
.sp
-Link with \fI\-lrt\fP or \fI\-pthread\fP.
+Link with \fI\-pthread\fP.
.SH DESCRIPTION
.BR sem_close ()
closes the named semaphore referred to by
All open named semaphores are automatically closed on process
termination, or upon
.BR execve (2).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sem_getvalue (3),
.BR sem_open (3),
.BR sem_post (3),
'\" t
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH SEM_DESTROY 3 2006-03-25 "Linux" "Linux Programmer's Manual"
+.TH SEM_DESTROY 3 2012-05-13 "Linux" "Linux Programmer's Manual"
.SH NAME
sem_destroy \- destroy an unnamed semaphore
.SH SYNOPSIS
.BI "int sem_destroy(sem_t *" sem );
.fi
.sp
-Link with \fI\-lrt\fP or \fI\-pthread\fP.
+Link with \fI\-pthread\fP.
.SH DESCRIPTION
.BR sem_destroy ()
destroys the unnamed semaphore at the address pointed to by
before the memory in which it is located is deallocated.
Failure to do this can result in resource leaks on some implementations.
.\" But not on NPTL, where sem_destroy () is a no-op..
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sem_init (3),
.BR sem_post (3),
.BR sem_wait (3),
'\" t
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH SEM_GETVALUE 3 2006-03-25 "Linux" "Linux Programmer's Manual"
+.TH SEM_GETVALUE 3 2012-05-13 "Linux" "Linux Programmer's Manual"
.SH NAME
sem_getvalue \- get the value of a semaphore
.SH SYNOPSIS
.BI "int sem_getvalue(sem_t *" sem ", int *" sval );
.fi
.sp
-Link with \fI\-lrt\fP or \fI\-pthread\fP.
+Link with \fI\-pthread\fP.
.SH DESCRIPTION
.BR sem_getvalue ()
places the current value of the semaphore pointed to
The value of the semaphore may already have changed by the time
.BR sem_getvalue ()
returns.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sem_post (3),
.BR sem_wait (3),
.BR sem_overview (7)
'\" t
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH SEM_INIT 3 2008-07-27 "Linux" "Linux Programmer's Manual"
+.TH SEM_INIT 3 2012-05-13 "Linux" "Linux Programmer's Manual"
.SH NAME
sem_init \- initialize an unnamed semaphore
.SH SYNOPSIS
.BI "int sem_init(sem_t *" sem ", int " pshared ", unsigned int " value );
.fi
.sp
-Link with \fI\-lrt\fP or \fI\-pthread\fP.
+Link with \fI\-pthread\fP.
.SH DESCRIPTION
.BR sem_init ()
initializes the unnamed semaphore at the address pointed to by
be returned by a successful call to
.BR sem_init ().
POSIX.1-2008 rectifies this, specifying the zero return on success.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sem_destroy (3),
.BR sem_post (3),
.BR sem_wait (3),
'\" t
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH SEM_OPEN 3 2009-02-20 "Linux" "Linux Programmer's Manual"
+.TH SEM_OPEN 3 2012-05-13 "Linux" "Linux Programmer's Manual"
.SH NAME
sem_open \- initialize and open a named semaphore
.SH SYNOPSIS
.BI " mode_t " mode ", unsigned int " value );
.fi
.sp
-Link with \fI\-lrt\fP or \fI\-pthread\fP.
+Link with \fI\-pthread\fP.
.SH DESCRIPTION
.BR sem_open ()
creates a new POSIX semaphore or opens an existing semaphore.
Insufficient memory.
.SH CONFORMING TO
POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sem_close (3),
.BR sem_getvalue (3),
.BR sem_post (3),
'\" t
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH SEM_POST 3 2009-03-30 "Linux" "Linux Programmer's Manual"
+.TH SEM_POST 3 2012-05-13 "Linux" "Linux Programmer's Manual"
.SH NAME
sem_post \- unlock a semaphore
.SH SYNOPSIS
.BI "int sem_post(sem_t *" sem );
.fi
.sp
-Link with \fI\-lrt\fP or \fI\-pthread\fP.
+Link with \fI\-pthread\fP.
.SH DESCRIPTION
.BR sem_post ()
increments (unlocks) the semaphore pointed to by
.SH EXAMPLE
See
.BR sem_wait (3).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sem_getvalue (3),
.BR sem_wait (3),
.BR sem_overview (7)
'\" t
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH SEM_UNLINK 3 2006-03-25 "Linux" "Linux Programmer's Manual"
+.TH SEM_UNLINK 3 2012-05-13 "Linux" "Linux Programmer's Manual"
.SH NAME
sem_unlink \- remove a named semaphore
.SH SYNOPSIS
.BI "int sem_unlink(const char *" name );
.fi
.sp
-Link with \fI\-lrt\fP or \fI\-pthread\fP.
+Link with \fI\-pthread\fP.
.SH DESCRIPTION
.BR sem_unlink ()
removes the named semaphore referred to by
.IR name .
.SH CONFORMING TO
POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sem_getvalue (3),
.BR sem_open (3),
.BR sem_post (3),
'\" t
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH SEM_WAIT 3 2012-02-12 "Linux" "Linux Programmer's Manual"
+.TH SEM_WAIT 3 2012-05-13 "Linux" "Linux Programmer's Manual"
.SH NAME
sem_wait, sem_timedwait, sem_trywait \- lock a semaphore
.SH SYNOPSIS
.BI "int sem_timedwait(sem_t *" sem ", const struct timespec *" abs_timeout );
.fi
.sp
-Link with \fI\-lrt\fP or \fI\-pthread\fP.
+Link with \fI\-pthread\fP.
.sp
.in -4n
Feature Test Macro Requirements for glibc (see
exit((s == 0) ? EXIT_SUCCESS : EXIT_FAILURE);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR clock_gettime (2),
.BR sem_getvalue (3),
.BR sem_post (3),
.\" Copyright 2003 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.\" Polished a bit, added a little, aeb
.\"
};
.fi
.in
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The functions
.BR getaliasent_r ()
and
This can be changed in the
.I /etc/nsswitch.conf
file.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These routines are glibc-specific.
The NeXT system has similar routines:
.in +4n
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getgrent (3),
.BR getpwent (3),
.BR getspent (3),
.\" the American National Standards Committee X3, on Information
.\" Processing Systems.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)setbuf.3 6.10 (Berkeley) 6/29/91
.\"
.\" Correction, 2000-03-03, Andreas Jaeger <aj@suse.de>
.\" Added return value for setvbuf, aeb,
.\"
-.TH SETBUF 3 2008-06-26 "Linux" "Linux Programmer's Manual"
+.TH SETBUF 3 2012-08-03 "Linux" "Linux Programmer's Manual"
.SH NAME
setbuf, setbuffer, setlinebuf, setvbuf \- stream buffering operations
.SH SYNOPSIS
function is exactly equivalent to the call:
.PP
.in +4n
-setvbuf(stream, (char *) NULL, _IOLBF, 0);
+setvbuf(stream, NULL, _IOLBF, 0);
.in
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The function
.BR setvbuf ()
returns 0 on success.
on failure.
The other functions do not return a value.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The
.BR setbuf ()
and
return 0;
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fclose (3),
.BR fflush (3),
.BR fopen (3),
--- /dev/null
+.so man3/getcontext.3
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\" and Copyright (C) 2004, 2007 Michael kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.I name
does not exist in the environment,
then the function succeeds, and the environment is unchanged.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR setenv ()
function returns zero on success,
or \-1 on error, with
.I errno
set to indicate the cause of the error.
-.SH "ERRORS"
+.SH ERRORS
.TP
.B EINVAL
.I name
.TP
.B ENOMEM
Insufficient memory to add a new variable to the environment.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD, POSIX.1-2001.
-.SH "NOTES"
+.SH NOTES
POSIX.1-2001 does not require
.BR setenv ()
or
.BR EINVAL ;
however, versions of glibc before 2.3.4 allowed an \(aq=\(aq sign in
.IR name .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR clearenv (3),
.BR getenv (3),
.BR putenv (3),
.\" Written by Michael Haardt, Fri Nov 25 14:51:42 MET 1994
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Added sigsetjmp, Sun Mar 2 22:03:05 EST 1997, jrv@vanzandt.mv.com
.\" Modifications, Sun Feb 26 14:39:45 1995, faith@cs.unc.edu
and will be restored if a
.BR siglongjmp (3)
is later performed with this \fIenv\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR setjmp ()
and
.BR sigsetjmp ()
or
.BR siglongjmp (3)
using the saved context.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C89, C99, and POSIX.1-2001 specify
.BR setjmp ().
POSIX.1-2001 specifies
make programs hard to understand
and maintain.
If possible an alternative should be used.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR longjmp (3),
.BR siglongjmp (3)
.\" Copyright (c) 1993 by Thomas Koenig (ig25@rz.uni-karlsruhe.de)
.\" and Copyright 1999 by Bruno Haible (haible@clisp.cons.org)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
+.\"
.\" Modified Sat Jul 24 18:20:12 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified Tue Jul 15 16:49:10 1997 by Andries Brouwer (aeb@cwi.nl)
.\" Modified Sun Jul 4 14:52:16 1999 by Bruno Haible (haible@clisp.cons.org)
.BR strxfrm (3),
.BR wcsxfrm (3)
to compare strings.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
A successful call to
.BR setlocale ()
returns an opaque string that corresponds to the locale set.
and its associated category will restore that part of the process's
locale.
The return value is NULL if the request cannot be honored.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C89, C99, POSIX.1-2001.
.SH NOTES
Linux (that is, glibc) supports the portable locales
return the right answer.
These days non-English speaking Europeans have to work a bit harder,
and must install actual locale files.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR locale (1),
.BR localedef (1),
.BR isalpha (3),
.\" Copyright (C) 2001 Andries Brouwer <aeb@cwi.nl>.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH SETLOGMASK 3 2001-10-05 "" "Linux Programmer's Manual"
.SH NAME
The bit corresponding to a priority \fIp\fP is \fBLOG_MASK\fP(\fIp\fP).
Some systems also provide a macro \fBLOG_UPTO\fP(\fIp\fP) for the mask
of all priorities in the above list up to and including \fIp\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
This function returns the previous log priority mask.
.SH ERRORS
None.
.\" .SH NOTES
.\" The glibc logmask handling was broken in versions before glibc 2.1.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
Note that the description in POSIX.1-2001 is flawed.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR closelog (3),
.BR openlog (3),
.BR syslog (3)
.\" Copyright 2002 walter harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
+.\"
.\" based on glibc infopages
.\" polished - aeb
+.\"
.TH SETNETGRENT 3 2007-07-26 "GNU" "Linux Programmer's Manual"
.SH NAME
setnetgrent, endnetgrent, getnetgrent, getnetgrent_r, innetgr \-
can be used for this without calling the above three functions.
Again, a NULL pointer is a wildcard and matches any string.
The function is thread-safe.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
These functions return 1 on success and 0 for failure.
.SH FILES
.I /etc/netgroup
In the BSD implementation,
.BR setnetgrent ()
returns void.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sethostent (3),
.BR setprotoent (3),
.BR setservent (3)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2002 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" FIXME . Add an example to this page
.TH SHM_OPEN 3 2009-02-25 "Linux" "Linux Programmer's Manual"
.SH NAME
-shm_open, shm_unlink \- Create/open or unlink POSIX shared memory objects
+shm_open, shm_unlink \- create/open or unlink POSIX shared memory objects
.SH SYNOPSIS
.B #include <sys/mman.h>
.br
will fail (unless
.B O_CREAT
was specified, in which case a new, distinct object is created).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR shm_open ()
returns a nonnegative file descriptor.
that does not exist.
.SH VERSIONS
These functions are provided in glibc 2.2 and later.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.LP
POSIX.1-2001 says that the group ownership of a newly created shared
memory object is set to either the calling process's effective group ID
or "a system default group ID".
-.SH "NOTES"
+.SH NOTES
.LP
POSIX leaves the behavior of the combination of
.B O_RDONLY
of a dedicated file system, which is normally
mounted under
.IR /dev/shm .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR close (2),
.BR fchmod (2),
.BR fchown (2),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
If the \fIflag\fP argument is true (1) and data transfer has started,
then the system call will be interrupted and will return the actual
amount of data transferred.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR siginterrupt ()
function returns 0 on success, or \-1 if the
.TP
.B EINVAL
The specified signal number is invalid.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD, POSIX.1-2001.
POSIX.1-2008 marks
.BR siginterrupt ()
with the
.B SA_RESTART
flag instead.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR signal (2)
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
+.\"
.\" Based on glibc infopages, copyright Free Software Foundation
+.\"
.TH SIGNBIT 3 2010-09-20 "GNU" "Linux Programmer's Manual"
.SH NAME
signbit \- test sign of a real floating-point number
is negative; otherwise it returns zero.
.SH ERRORS
No errors occur.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
This function is defined in IEC 559 (and the appendix with
recommended functions in IEEE 754/IEEE 854).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR copysign (3)
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
+.\"
.\" heavily based on glibc infopages, copyright Free Software Foundation
+.\"
.TH SIGNIFICAND 3 2009-02-04 "GNU" "Linux Programmer's Manual"
.SH NAME
significand, significandf, significandl \-
version is available on a number of other systems.
.\" .SH HISTORY
.\" This function came from BSD.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ilogb (3),
.BR scalb (3)
.\" Copyright (C) 2004 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH SIGPAUSE 3 2010-09-12 "Linux" "Linux Programmer's Manual"
.SH NAME
It changes the process's signal mask (set of blocked signals),
and then waits for a signal to arrive.
Upon arrival of a signal, the original signal mask is restored.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
If
.BR sigpause ()
returns, it was interrupted by a signal and the return value is \-1
.I "sigset_t *"
argument (instead of an
.IR int ).
-.SS Linux Notes
+.SS Linux notes
On Linux, this routine is a system call only on the Sparc (sparc64)
architecture.
.\" For the BSD version, one usually uses a zero
.\" .I sigmask
.\" to indicate that no signals are to be blocked.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR kill (2),
.BR sigaction (2),
.BR sigprocmask (2),
.\" Copyright (c) 2002 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" added note on self-signaling, aeb, 2002-06-07
.\" added note on CAP_KILL, mtk, 2004-06-16
.I si_code
field of that structure will be set to
.BR SI_QUEUE .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR sigqueue ()
returns 0, indicating that the signal was successfully
.IR pid .
.SH VERSIONS
This system call first appeared in Linux 2.2.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
If this function results in the sending of a signal to the process
uinfo.si_value = val; /* argument supplied to sigqueue() */
.fi
.in
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR kill (2),
.BR rt_sigqueueinfo (2),
.BR sigaction (2),
'\" t
.\" Copyright (c) 2005 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH SIGSET 3 2010-09-20 "Linux" "Linux Programmer's Manual"
.SH NAME
.BR sigignore (),
see the errors under
.BR sigaction (2).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001.
These functions are obsolete: do not use them in new programs.
POSIX.1-2008 marks
Instead, the previous disposition of the signal is returned.
These problems have been fixed since glibc 2.5.
.\" See http://sourceware.org/bugzilla/show_bug.cgi?id=1951
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR kill (2),
.BR pause (2),
.BR sigaction (2),
.\" Copyright (c) 1994 Mike Battersby
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified by aeb, 960721
.\" 2005-11-21, mtk, added descriptions of sigisemptyset(), sigandset(),
and
.BR sigorset ()).
The results are undefined if this is not done.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR sigemptyset (),
.BR sigfillset (),
.BR sigaddset (),
.B EINVAL
.I sig
is not a valid signal.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
-.SS Glibc Notes
+.SS Glibc notes
If the
.B _GNU_SOURCE
feature test macro is defined, then \fI<signal.h>\fP
.PP
These functions are nonstandard (a few other systems provide similar
functions) and their use should be avoided in portable applications.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sigaction (2),
.BR sigpending (2),
.BR sigprocmask (2),
'\" t
.\" Copyright (c) 2005 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH SIGVEC 3 2007-07-26 "Linux" "Linux Programmer's Manual"
+.TH SIGVEC 3 2012-09-06 "Linux" "Linux Programmer's Manual"
.SH NAME
sigvec, sigblock, sigsetmask, siggetmask, sigmask \- BSD signal API
.SH SYNOPSIS
This API is obsolete: new applications should use the POSIX signal API
.RB ( sigaction (2),
.BR sigprocmask (2),
-etc.)
+etc.).
The
.BR sigvec ()
.nf
struct sigvec {
- void (*sv_handler)(); /* Signal disposition */
- int sv_mask; /* Signals to be blocked in handler */
- int sv_flags; /* Flags */
+ void (*sv_handler)(int); /* Signal disposition */
+ int sv_mask; /* Signals to be blocked in handler */
+ int sv_flags; /* Flags */
};
.fi
The
.I sv_handler
field specifies the disposition of the signal, and is either:
-the address of a signal handler function; or
-.B SIG_DFL
+the address of a signal handler function;
+.BR SIG_DFL ,
meaning the default disposition applies for the signal; or
-.B SIG_IGN
+.BR SIG_IGN ,
meaning that the signal is ignored.
If
specifies a mask of signals that are to be blocked while
the handler is executing.
In addition, the signal for which the handler is invoked is
-also blocked by default.
+also blocked.
Attempts to block
.B SIGKILL
or
.BR sigaction (2)
and
.BR sigprocmask (2).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
All of these functions were in
4.3BSD, except
.BR siggetmask (),
See
.BR sigpause (3)
for details.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR kill (2),
.BR pause (2),
.BR sigaction (2),
.\" Copyright (c) 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH SIGWAIT 3 2010-09-10 "Linux" "Linux Programmer's Manual"
+.TH SIGWAIT 3 2012-07-21 "Linux" "Linux Programmer's Manual"
.SH NAME
sigwait \- wait for a signal
.SH SYNOPSIS
.SH DESCRIPTION
The
.BR sigwait ()
-function suspends execution of the calling thread until the
-delivery of one of the signals specified in the signal set
-.IR set .
+function suspends execution of the calling thread until
+one of the signals specified in the signal set
+.IR set
+becomes pending.
The function accepts the signal
(removes it from the pending list of signals),
and returns the signal number in
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
An invalid floating-point exception
.RB ( FE_INVALID )
is raised.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
to
.B EDOM
when a domain error occurred.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR acos (3),
.BR asin (3),
.BR atan (3),
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
-.\" Distributed under GPL, 2002-07-27 Walter Harms
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
+.\" Distributed under GPL
+.\" %%%LICENSE_END
+.\"
.TH SINCOS 3 2008-08-11 "GNU" "Linux Programmer's Manual"
.SH NAME
sincos, sincosf, sincosl \- calculate sin and cos simultaneously
.\" those functions.
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This function is a GNU extension.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cos (3),
.BR sin (3),
.BR tan (3)
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
sinh(x) = (exp(x) \- exp(\-x)) / 2
.fi
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these functions return the hyperbolic sine of
.IR x .
An overflow floating-point exception
.RB ( FE_OVERFLOW )
is raised.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
also conforms to
SVr4, 4.3BSD, C89.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR acosh (3),
.BR asinh (3),
.BR atanh (3),
.\" Copyright (c) 1993 by Thomas Koenig (ig25@rz.uni-karlsruhe.de)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
+.\"
.\" Modified Sat Jul 24 18:16:02 1993 by Rik Faith (faith@cs.unc.edu)
.TH SLEEP 3 2010-02-03 "GNU" "Linux Programmer's Manual"
.SH NAME
-sleep \- Sleep for the specified number of seconds
+sleep \- sleep for the specified number of seconds
.SH SYNOPSIS
.nf
.B #include <unistd.h>
makes the calling thread sleep until
.I seconds
seconds have elapsed or a signal arrives which is not ignored.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
Zero if the requested time has elapsed,
or the number of seconds left to sleep,
if the call was interrupted by a signal handler.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH BUGS
.BR sleep ()
from a signal handler or modifying the handling of
.B SIGALRM
while sleeping will cause undefined results.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR alarm (2),
.BR nanosleep (2),
.BR signal (2),
.\" Copyright (c) 2006, Michael Kerrisk (mtk.manpages@gmail.com)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH SOCKATMARK 3 2008-12-03 "Linux" "Linux Programmer's Manual"
.SH NAME
If the socket is at the mark, then 1 is returned;
if the socket is not at the mark, 0 is returned.
This function does not remove the out-of-band mark.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
A successful call to
.BR sockatmark ()
returns 1 if the socket is at the out-of-band mark, or 0 if it is not.
.SH VERSIONS
.BR sockatmark ()
was added to glibc in version 2.2.4.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
If
}
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fcntl (2),
.BR recv (2),
.BR send (2),
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
The
.BR sqrt ()
function returns the nonnegative square root of \fIx\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these functions return the square root of
.IR x .
An invalid floating-point exception
.RB ( FE_INVALID )
is raised.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
also conforms to
SVr4, 4.3BSD, C89.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cbrt (3),
.BR csqrt (3),
.BR hypot (3)
.\" Copyright (C) 2003 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" The pathconf note is from Walter Harms
.\" This is not a system call on Linux
.BR fstatvfs ()
returns the same information about an open file referenced by descriptor
.IR fd .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, zero is returned.
On error, \-1 is returned, and
.I errno
.TP
.B EOVERFLOW
Some values were too large to be represented in the returned struct.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
The Linux kernel has system calls
.I f_bsize
fields of the return value of
.IR "statvfs(path,buf)" .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR statfs (2)
.\" the American National Standards Committee X3, on Information
.\" Processing Systems.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)stdarg.3 6.8 (Berkeley) 6/29/91
.\"
.\" Converted for Linux, Mon Nov 29 15:11:11 1993, faith@cs.unc.edu
.\" Additions, 2001-10-14, aeb
.\"
-.TH STDARG 3 2001-10-14 "" "Linux Programmer's Manual"
+.TH STDARG 3 2013-03-15 "" "Linux Programmer's Manual"
.SH NAME
stdarg, va_start, va_arg, va_end, va_copy \- variable argument lists
.SH SYNOPSIS
.BR va_end ()
may be a macro or a function.
.SS va_copy()
+The
+.BR va_copy ()
+macro copies the (previously initialized) variable argument list
+.I src
+to
+.IR dest .
+The behavior is as if
+.BR va_start ()
+were applied to
+.IR dest
+with the same
+.I last
+argument, followed by the same number of
+.BR va_arg ()
+invocations that was used to reach the current state of
+.IR src .
+
.\" Proposal from clive@demon.net, 1997-02-28
An obvious implementation would have a
.I va_list
have
.B __va_copy
instead, since that was the name used in the draft proposal.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The
.BR va_start (),
.BR va_arg (),
.\" From dholland@burgundy.eecs.harvard.edu Tue Mar 24 18:08:15 1998
.\"
.\" This man page was written in 1998 by David A. Holland
-.\" and placed in the Public Domain. Polished a bit by aeb.
-.\" 2005-06-16 mtk, mentioned freopen()
+.\" Polished a bit by aeb.
+.\"
+.\" %%%LICENSE_START(PUBLIC_DOMAIN)
+.\" Placed in the Public Domain.
+.\" %%%LICENSE_END
.\"
+.\" 2005-06-16 mtk, mentioned freopen()
.\" 2007-12-08, mtk, Converted from mdoc to man macros
.\"
.TH STDIN 3 2008-07-14 "Linux" "Linux Programmer's Manual"
The standard streams are closed by a call to
.BR exit (3)
and by normal program termination.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The
.IR stdin ,
.IR stdout ,
.\" Copyright (c) 1990, 1991 Regents of the University of California.
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)stdio.3 6.5 (Berkeley) 5/6/91
.\"
.IR stderr .
When opened, the standard error stream is not fully buffered; the standard
input and output streams are fully buffered if and only if the streams do
-not to refer to an interactive device.
+not refer to an interactive device.
.PP
Output streams that refer to terminal devices are always line buffered by
default; pending output to such streams is written automatically whenever
and
.B putchar
exist and will be used if the macros definitions are explicitly removed.
-.SS "List of Functions"
+.SS List of functions
.TS
;
lb lb
vsprintf formatted output conversion
vsscanf input format conversion
.TE
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The
.I stdio
library conforms to C89.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR close (2),
.BR open (2),
.BR read (2),
.\" Copyright (C) 2001 Andries Brouwer <aeb@cwi.nl>.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH STDIO_EXT 3 2001-12-16 "" "Linux Programmer's Manual"
.SH NAME
The
.BR __fpurge ()
function discards the contents of the stream's buffer.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR flockfile (3),
.BR fpurge (3)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 1995 James R. Van Zandt <jrv@vanzandt.mv.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH STPCPY 3 2012-03-15 "GNU" "Linux Programmer's Manual"
.SH NAME
\fIdest\fP.
The strings may not overlap, and the destination string
\fIdest\fP must be large enough to receive the copy.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR stpcpy ()
returns a pointer to the \fBend\fP of the string
\fIdest\fP (that is, the address of the terminating null byte)
rather than the beginning.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This function was added to POSIX.1-2008. Before that, it was not part of
the C or POSIX.1 standards, nor customary on UNIX systems, but was not a
GNU invention either.
}
.fi
.in
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR bcopy (3),
.BR memccpy (3),
.BR memcpy (3),
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.PP
The programmer must ensure that there is room for at least \fIn\fP characters
at \fIdest\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR stpncpy ()
returns a pointer to the terminating null byte
in \fIdest\fP, or, if \fIdest\fP is not null-terminated,
\fIdest + n\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This function was added to POSIX.1-2008. Before that, it was a GNU extension.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR strncpy (3),
.BR wcpncpy (3)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.BR strncasecmp ()
function is similar, except it only compares
the first \fIn\fP bytes of \fIs1\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR strcasecmp ()
and
an integer less than, equal to, or greater than zero if \fIs1\fP
(or the first \fIn\fP bytes thereof) is found, respectively, to be
less than, to match, or be greater than \fIs2\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.4BSD, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR bcmp (3),
.BR memcmp (3),
.BR strcmp (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.\" Modified Sat Jul 24 18:11:47 1993 by Rik Faith (faith@cs.unc.edu)
.\" 2007-06-15, Marc Boyer <marc.boyer@enseeiht.fr> + mtk
.\" Improve discussion of strncat().
-.TH STRCAT 3 2012-05-10 "GNU" "Linux Programmer's Manual"
+.TH STRCAT 3 2012-07-19 "GNU" "Linux Programmer's Manual"
.SH NAME
strcat, strncat \- concatenate two strings
.SH SYNOPSIS
\fIdest\fP, and then adds a terminating null byte.
The strings may not overlap, and the \fIdest\fP string must have
enough space for the result.
+If
+.I dest
+is not large enough, program behavior is unpredictable;
+.IR "buffer overruns are a favorite avenue for attacking secure programs" .
.PP
The
.BR strncat ()
}
.fi
.in
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR strcat ()
and
.BR strncat ()
functions return a pointer to the resulting string \fIdest\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, C89, C99.
-.SH "SEE ALSO"
+.SH NOTES
+Some systems (the BSDs, Solaris, and others) provide the following function:
+
+ size_t strlcat(char *dest, const char *src, size_t size);
+
+This function appends the null-terminated string
+.I src
+to the string
+.IR dest ,
+copying at most
+.IR "size\-strlen(dest)\-1"
+from
+.IR src ,
+and adds a null terminator to the result,
+.I unless
+.IR size
+is less than
+.IR strlen(dest) .
+This function fixes the buffer overrun problem of
+.BR strcat (),
+but the caller must still handle the possibility of data loss if
+.I size
+is too small.
+The function returns the length of the string
+.BR strlcat ()
+tried to create; if the return value is greater than or equal to
+.IR size ,
+data loss occurred.
+If data loss matters, the caller
+.I must
+either check the arguments before the call, or test the function return value.
+.BR strlcat ()
+is not present in glibc and is not standardized by POSIX,
+.\" https://lwn.net/Articles/506530/
+but is available on Linux via the
+.IR libbsd
+library.
+.SH SEE ALSO
.BR bcopy (3),
.BR memccpy (3),
.BR memcpy (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.PP
Here "character" means "byte"; these functions do not work with
wide or multibyte characters.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR strchr ()
and
.SH VERSIONS
.BR strchrnul ()
first appeared in glibc in version 2.1.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR strchr ()
and
.BR strrchr ()
are in SVr4, 4.3BSD, C89, C99.
.BR strchrnul ()
is a GNU extension.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR index (3),
.BR memchr (3),
.BR rindex (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.\" Modified Sat Jul 24 18:08:52 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified 2001-08-31, aeb
.\"
-.TH STRCMP 3 2012-05-10 "" "Linux Programmer's Manual"
+.TH STRCMP 3 2012-11-25 "" "Linux Programmer's Manual"
.SH NAME
strcmp, strncmp \- compare two strings
.SH SYNOPSIS
.BR strncmp ()
function is similar, except it only compares
the first (at most) \fIn\fP bytes of \fIs1\fP and \fIs2\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR strcmp ()
and
less than, equal to, or greater than zero if \fIs1\fP (or the first
\fIn\fP bytes thereof) is found, respectively, to be less than, to
match, or be greater than \fIs2\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, C89, C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR bcmp (3),
.BR memcmp (3),
.BR strcasecmp (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
strings interpreted as appropriate for the program's current locale
for category \fBLC_COLLATE\fP. (See
.BR setlocale (3).)
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR strcoll ()
function returns an integer less than, equal to,
or greater than zero if \fIs1\fP is found, respectively, to be less
than, to match, or be greater than \fIs2\fP, when both are interpreted
as appropriate for the current locale.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, C89, C99.
.SH NOTES
In the \fI"POSIX"\fP or \fI"C"\fP locales
.BR strcoll ()
is equivalent to
.BR strcmp (3).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR bcmp (3),
.BR memcmp (3),
.BR setlocale (3),
.\" Copyright (C) 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.\" 2007-06-15, Marc Boyer <marc.boyer@enseeiht.fr> + mtk
.\" Improve discussion of strncpy().
.\"
-.TH STRCPY 3 2012-05-10 "GNU" "Linux Programmer's Manual"
+.TH STRCPY 3 2012-07-19 "GNU" "Linux Programmer's Manual"
.SH NAME
strcpy, strncpy \- copy a string
.SH SYNOPSIS
to the buffer pointed to by \fIdest\fP.
The strings may not overlap, and the destination string
\fIdest\fP must be large enough to receive the copy.
+.IR "Beware of buffer overruns!"
+(See BUGS.)
.PP
The
.BR strncpy ()
is less than
.IR n ,
.BR strncpy ()
-pads the remainder of
+writes additional null bytes to
.I dest
-with null bytes.
+to ensure that a total of
+.I n
+bytes are written.
.PP
A simple implementation of
.BR strncpy ()
}
.fi
.in
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR strcpy ()
and
.BR strncpy ()
functions return a pointer to
the destination string \fIdest\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, C89, C99.
.SH NOTES
Some programmers consider
.BR strcpy ()
can be used.
+One valid (and intended) use of
+.BR strncpy ()
+is to copy a C string to a fixed-length buffer
+while ensuring both that the buffer is not overflowed
+and that unused bytes in the target buffer are zeroed out
+(perhaps to prevent information leaks if the buffer is to be
+written to media or transmitted to another process via an
+interprocess communication technique).
+
If there is no terminating null byte in the first \fIn\fP
bytes of \fIsrc\fP,
.BR strncpy ()
produces an unterminated string in \fIdest\fP.
-Programmers often prevent this mistake by forcing termination
-as follows:
+You can force termination using something like the following:
.in +4n
.nf
buf[n \- 1]= \(aq\\0\(aq;
.fi
.in
+.PP
+(Of course, the above technique ignores the fact that
+information contained in
+.I src
+is lost in the copying to
+.IR dest .)
+
+Some systems (the BSDs, Solaris, and others) provide the following function:
+
+ size_t strlcpy(char *dest, const char *src, size_t size);
+
+.\" http://static.usenix.org/event/usenix99/full_papers/millert/millert_html/index.html
+.\" "strlcpy and strlcat - consistent, safe, string copy and concatenation"
+.\" 1999 USENIX Annual Technical Conference
+This function is similar to
+.BR strncpy (),
+but it copies at most
+.I size\-1
+bytes to
+.IR dest ,
+always adds a terminating null byte,
+and does not pad the target with (further) null bytes.
+This function fixes some of the problems of
+.BR strcpy ()
+and
+.BR strncpy (),
+but the caller must still handle the possibility of data loss if
+.I size
+is too small.
+The return value of the function is the length of
+.IR src ,
+which allows truncation to be easily detected:
+if the return value is greater than or equal to
+.IR size ,
+truncation occurred.
+If loss of data matters, the caller
+.I must
+either check the arguments before the call,
+or test the function return value.
+.BR strlcpy ()
+is not present in glibc and is not standardized by POSIX,
+.\" https://lwn.net/Articles/506530/
+but is available on Linux via the
+.IR libbsd
+library.
.SH BUGS
If the destination string of a
.BR strcpy ()
This may be unnecessary if you can show that overflow is impossible,
but be careful: programs can get changed over time,
in ways that may make the impossible possible.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR bcopy (3),
.BR memccpy (3),
.BR memcpy (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
They are only available when using the GNU
GCC suite, and suffer from the same limitations described in
.BR alloca (3).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR strdup ()
function returns a pointer to the duplicated
.TP
.B ENOMEM
Insufficient memory available to allocate duplicate string.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.\" 4.3BSD-Reno, not (first) 4.3BSD.
.BR strdup ()
conforms to SVr4, 4.3BSD, POSIX.1-2001.
and
.BR strndupa ()
are GNU extensions.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR alloca (3),
.BR calloc (3),
.BR free (3),
.\" Copyright (C) 1993 David Metcalfe (david@prism.demon.co.uk)
.\" and Copyright (C) 2005, Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.I errnum
is unknown).
The string always includes a terminating null byte.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR strerror ()
and the GNU-specific
or an "Unknown error nnn" message if the error number is unknown.
POSIX.1-2001 and POSIX.1-2008 require that a successful call to
-.BR strerror (3)
+.BR strerror ()
shall leave
.I errno
unchanged, and note that,
.TP
.B ERANGE
Insufficient storage was supplied to contain the error description string.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR strerror ()
is specified by POSIX.1-2001, C89, C99.
.BR strerror_r ()
.B EINVAL
if the error number is unknown.
C99 and POSIX.1-2008 require the return value to be non-NULL.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR err (3),
.BR errno (3),
.BR error (3),
.\" Copyright (c) 2000 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.TH STRFMON 3 2000-12-05 "Linux" "Linux Programmer's Manual"
.SH NAME
One argument of type
.I double
is converted using the locale's national currency format.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR strfmon ()
function returns the number of characters placed
to
.BR E2BIG ,
returns \-1, and the contents of the array is undefined.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
Not in POSIX.1-2001.
Present on several other systems.
.SH EXAMPLE
.br
[ **1234$57Esc] [ **1.234$57PTE ]
.in
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR setlocale (3),
.BR sprintf (3),
.BR locale (7)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.BR rand (3)
to randomly swap characters in the string.
The result is an anagram of \fIstring\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR strfry ()
functions returns a pointer to the randomized
string.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The
.BR strfry ()
function is unique to the
GNU C Library.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR memfrob (3),
.BR string (3)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
The broken-down time structure \fItm\fP is defined in \fI<time.h>\fP.
See also
.BR ctime (3).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR strftime ()
function returns the number of bytes placed
and
.B LC_TIME
are used.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, C89, C99.
There are strict inclusions between the set of conversions
given in ANSI C (unmarked), those given in the Single UNIX Specification
included a double leap second
(there never has been such a minute).
.SH NOTES
-.SS ISO 8601 Week Dates
+.SS ISO 8601 week dates
.BR %G ,
.BR %g ,
and
Thus, the ISO\ 8601 week-based system considers these days to be part of
week 53 (\fB%V\fP) of the year 2009 (\fB%G\fP) ;
week 01 of ISO\ 8601 year 2010 starts on Monday, 4 January 2010.
-.SS Glibc Notes
+.SS Glibc notes
Glibc provides some extensions for conversion specifications.
(These extensions are not specified in POSIX.1-2001, but a few other
systems provide similar features.)
.PP
.in +2n
"%a,\ %d\ %b\ %y\ %T\ %z"
-.SS Example Program
+.SS Example program
The program below can be used to experiment with
.BR strftime ().
.PP
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR date (1),
.BR time (2),
.BR ctime (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
The string functions perform string operations on null-terminated
strings.
See the individual man pages for descriptions of each function.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR index (3),
.BR rindex (3),
.BR stpcpy (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.BR strlen ()
function calculates the length of the string
\fIs\fP, excluding the terminating null byte (\(aq\\0\(aq).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR strlen ()
function returns the number of bytes in the string \fIs\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, C89, C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR string (3),
.BR strnlen (3),
.BR wcslen (3),
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.BR strnlen ()
looks only at the first
\fImaxlen\fP bytes at \fIs\fP and never beyond \fIs+maxlen\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR strnlen ()
function returns \fIstrlen(s)\fP, if that is less than
\fImaxlen\fP, or \fImaxlen\fP
if there is no null byte (\(aq\\0\(aq) among the first
\fImaxlen\fP bytes pointed to by \fIs\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR strlen (3)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.BR strpbrk ()
function locates the first occurrence in the
string \fIs\fP of any of the bytes in the string \fIaccept\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR strpbrk ()
function returns a pointer to the byte in
\fIs\fP that matches one of the bytes in \fIaccept\fP, or NULL
if no such byte is found.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, C89, C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR index (3),
.BR memchr (3),
.BR rindex (3),
.\" Copyright 1993 Mitchum DSouza <m.dsouza@mrc-apu.cam.ac.uk>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified, jmv@lucifer.dorms.spbu.ru, 1999-11-08
.\" Modified, aeb, 2000-04-07
};
.fi
.in
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The return value of the function is a pointer to the first character
not processed in this function call.
In case the input string
fails to match all
of the format string and therefore an error occurred the function
returns NULL.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SUSv2, POSIX.1-2001.
.SH NOTES
.LP
1969-2068 since glibc 2.1.
.\" In libc4 and libc5 the code for %I is broken (fixed in glibc;
.\" %OI was fixed in glibc 2.2.4).
-.SS Glibc Notes
+.SS Glibc notes
For reasons of symmetry, glibc tries to support for
.BR strptime ()
the same format characters as for
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR time (2),
.BR getdate (3),
.BR scanf (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
and \fI*stringp\fP is updated to point past the token.
In case no delimiter was found, the token is taken to be
the entire string \fI*stringp\fP, and \fI*stringp\fP is made NULL.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR strsep ()
function returns a pointer to the token,
that is, it returns the original value of \fI*stringp\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.4BSD.
.SH NOTES
The
This function cannot be used on constant strings.
.IP *
The identity of the delimiting character is lost.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR index (3),
.BR memchr (3),
.BR rindex (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.BR strsignal ()
function should be
used if possible instead of this array.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR strsignal ()
function returns the appropriate description
string, or an unknown signal message if the signal number is invalid.
On some systems (but not on Linux), a NULL pointer may be
returned instead for an invalid signal number.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
Present on Solaris and the BSDs.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR psignal (3),
.BR strerror (3)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
function calculates the length of the initial
segment of \fIs\fP which consists entirely of bytes not in
\fIreject\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR strspn ()
function returns the number of bytes in
function returns the number of bytes in
the initial segment of \fIs\fP which are not in the string
\fIreject\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, C89, C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR index (3),
.BR memchr (3),
.BR rindex (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
function is like
.BR strstr (),
but ignores the case of both arguments.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
These functions return a pointer to the beginning of the
substring, or NULL if the substring is not found.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The
.BR strstr ()
function conforms to C89 and C99.
.BR strstr ().
Later versions (like 4.6.27) work correctly,
and return \fIhaystack\fP when \fIneedle\fP is empty.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR index (3),
.BR memchr (3),
.BR rindex (3),
.\" the American National Standards Committee X3, on Information
.\" Processing Systems.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)strtod.3 5.3 (Berkeley) 6/29/91
.\"
.\" From glibc 2.8's stdlib/strtod_l.c:
.\" We expect it to be a number which is put in the
.\" mantissa of the number.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
These functions return the converted value, if any.
If
.TP
.B ERANGE
Overflow or underflow occurred.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C89 describes
.BR strtod (),
C99
.BR strtol (3)
manual page;
the use of the functions described in this manual page is similar.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR atof (3),
.BR atoi (3),
.BR atol (3),
.\" Copyright (c) 2003 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.TH STRTOIMAX 3 2003-11-28 "" "Linux Programmer's Manual"
.SH NAME
and
.IR uintmax_t ,
respectively.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, the converted value is returned.
If nothing was found to convert, zero is returned.
On overflow or underflow
.I errno
is set to
.BR ERANGE .
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR imaxabs (3),
.BR imaxdiv (3),
.BR strtol (3),
.\" Copyright (C) 1996 Andries Brouwer (aeb@cwi.nl)
.\" and Copyright (C) 2005 Michael Kerrisk (mtk.manpages@gmail.com)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Rewritten old page, 960210, aeb@cwi.nl
.\" Updated, added strtok_r. 2000-02-13 Nicolás Lichtmaier <nick@debian.org>
Different strings may be parsed concurrently using sequences of calls to
.BR strtok_r ()
that specify different \fIsaveptr\fP arguments.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR strtok ()
and
.BR strtok_r ()
functions return a pointer to
the next token, or NULL if there are no more tokens.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.TP
.BR strtok ()
SVr4, POSIX.1-2001, 4.3BSD, C89, C99.
.BR strtok ()
can be found in
.BR getaddrinfo_a (3).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR index (3),
.BR memchr (3),
.BR rindex (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.\" 386BSD man pages
.\" Modified Sun Jul 25 10:53:39 1993 by Rik Faith (faith@cs.unc.edu)
.\" Added correction due to nsd@bbc.com (Nick Duffek) - aeb, 950610
-.TH STRTOL 3 2010-09-20 "GNU" "Linux Programmer's Manual"
+.TH STRTOL 3 2013-02-10 "GNU" "Linux Programmer's Manual"
.SH NAME
strtol, strtoll, strtoq \- convert a string to a long integer
.SH SYNOPSIS
function works just like the
.BR strtol ()
function but returns a long long integer value.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR strtol ()
function returns the result of the conversion,
.LP
The implementation may also set \fIerrno\fP to \fBEINVAL\fP in case
no conversion was performed (no digits seen, and 0 returned).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR strtol ()
conforms to SVr4, 4.3BSD, C89, C99 and POSIX.1-2001, and
.BR strtoll ()
.I errno
has a nonzero value after the call.
-In locales other than the "C" locale, other strings may also be accepted.
-(For example, the thousands separator of the current locale may be
-supported.)
+According to POSIX.1-2001,
+in locales other than the "C" and "POSIX",
+these functions may accept other,
+implementation-defined numeric strings.
.LP
BSD also has
.sp
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR atof (3),
.BR atoi (3),
.BR atol (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
function but returns an
.I "unsigned long long int"
value.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR strtoul ()
function returns either the result of the conversion
.LP
The implementation may also set \fIerrno\fP to \fBEINVAL\fP in case
no conversion was performed (no digits seen, and 0 returned).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.BR strtoul ()
conforms to SVr4, C89, C99 and POSIX-2001, and
.BR strtoull ()
.BR strtol (3)
manual page;
the use of the functions described in this manual page is similar.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR atof (3),
.BR atoi (3),
.BR atol (3),
.\" Copyright (C) 2001 Andries Brouwer <aeb@cwi.nl>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH STRVERSCMP 3 2001-12-19 "GNU" "Linux Programmer's Manual"
.SH NAME
come before digit strings with fewer leading zeros).
Thus, the ordering is
.IR 000 ", " 00 ", " 01 ", " 010 ", " 09 ", " 0 ", " 1 ", " 9 ", " 10 .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR strverscmp ()
function returns an integer
less than, equal to, or greater than zero if \fIs1\fP
is found, respectively, to be earlier than, equal to,
or later than \fIs2\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This function is a GNU extension.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR rename (1),
.BR strcasecmp (3),
.BR strcmp (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
The transformation is based on the program's current
locale for category \fBLC_COLLATE\fP. (See
.BR setlocale (3)).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR strxfrm ()
function returns the number of bytes required to
terminating null byte (\(aq\\0\(aq).
If the value returned is \fIn\fP or more, the
contents of \fIdest\fP are indeterminate.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, C89, C99.
.SH NOTES
In the \fI"POSIX"\fP or \fI"C"\fP locales
is equivalent to
copying the string with
.BR strncpy (3).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR bcmp (3),
.BR memcmp (3),
.BR setlocale (3),
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
When \fIn\fP is positive and odd, it handles \fIn\-1\fP bytes
as above, and does something unspecified with the last byte.
(In other words, \fIn\fP should be even.)
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR swab ()
function returns no value.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR bstring (3)
.\" Copyright (c) 1993 by Thomas Koenig (ig25@rz.uni-karlsruhe.de)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
+.\"
.\" Modified Sat Jul 24 17:51:42 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified Tue Aug 17 11:42:20 1999 by Ariel Scolnicov (ariels@compugen.co.il)
-.TH SYSCONF 3 2012-04-15 "GNU" "Linux Programmer's Manual"
+.TH SYSCONF 3 2013-02-12 "GNU" "Linux Programmer's Manual"
.SH NAME
-sysconf \- Get configuration information at runtime
+sysconf \- get configuration information at run time
.SH SYNOPSIS
.nf
.B #include <unistd.h>
If it is undefined, one should ask at run time.
If it is defined to \-1, then the option is not supported.
If it is defined to 0, then relevant functions and headers exist,
-but one has to ask at runtime what degree of support is available.
+but one has to ask at run time what degree of support is available.
If it is defined to a value other than \-1 or 0, then the option is
supported.
Usually the value (such as 200112L) indicates the year and month
.BR sysconf ()
argument will be
.BR _SC_FOO .
-.SS "POSIX.1 Variables"
+.SS POSIX.1 variables
We give the name of the variable, the name of the
.BR sysconf ()
argument used to inquire about its value,
the value
.B 199009L
indicates the Sept. 1990 revision.
-.SS "POSIX.2 Variables"
+.SS POSIX.2 variables
Next, the POSIX.2 values, giving limits for utilities.
.TP
.BR BC_BASE_MAX " - " _SC_BC_BASE_MAX
supported.
.TP
.BR POSIX2_FORT_RUN " - " _SC_2_FORT_RUN
-indicates whether the POSIX.2 FORTRAN runtime utilities are supported.
+indicates whether the POSIX.2 FORTRAN run-time utilities are supported.
.TP
.BR _POSIX2_LOCALEDEF " - " _SC_2_LOCALEDEF
indicates whether the POSIX.2 creation of locates via
The number of pages of physical memory.
Note that it is possible
for the product of this value and the value of
-.B _SC_PAGE_SIZE
+.B _SC_PAGESIZE
to overflow.
.TP
.BR "" " - " _SC_AVPHYS_PAGES
.TP
.BR "" " - " _SC_NPROCESSORS_ONLN
The number of processors currently online (available).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
If
.I name
is invalid, \-1 is returned, and
In the case of options, a positive value is returned if a queried option
is available, and \-1 if it is not.
In the case of limits, \-1 means that there is no definite limit.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH BUGS
It is difficult to use
.PP
Some returned values may be huge; they are not suitable for allocating
memory.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR bc (1),
.BR expr (1),
.BR getconf (1),
.\" Written Feb 1994 by Steve Greenland (stevegr@neosoft.com)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Updated 1999.12.19 by Karl M. Hegbloom <karlheg@debian.org>
.\"
.\" Modified 13 Dec 2001, Martin Schulze <joey@infodrom.org>
.\" Modified 3 Jan 2002, Michael Kerrisk <mtk.manpages@gmail.com>
.\"
-.TH SYSLOG 3 2012-04-30 "Linux" "Linux Programmer's Manual"
+.TH SYSLOG 3 2012-08-17 "Linux" "Linux Programmer's Manual"
.SH NAME
closelog, openlog, syslog, vsyslog \- send messages to the system logger
.SH SYNOPSIS
facilities will be handled differently.
.TP 15
.B LOG_AUTH
-security/authorization messages (DEPRECATED Use
-.B LOG_AUTHPRIV
-instead)
+security/authorization messages
.TP
.B LOG_AUTHPRIV
security/authorization messages (private)
The function
.BR setlogmask (3)
can be used to restrict logging to specified levels only.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The functions
.BR openlog (),
.BR closelog (),
syslog(priority, "%s", string);
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR logger (1),
.BR setlogmask (3),
.BR syslog.conf (5),
.\" Copyright (c) 1993 by Thomas Koenig (ig25@rz.uni-karlsruhe.de)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
+.\"
.\" Modified Sat Jul 24 17:51:15 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified 11 May 1998 by Joseph S. Myers (jsm28@cam.ac.uk)
.\" Modified 14 May 2001, 23 Sep 2001 by aeb
and
.B SIGQUIT
will be ignored.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The value returned is \-1 on error (e.g.,
.BR fork (2)
failed),
.PP
.BR system ()
does not affect the wait status of any other children.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C89, C99, POSIX.1-2001.
.SH NOTES
.PP
a sure indication that the
.BR execve (2)
call failed.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sh (1),
.BR signal (2),
.BR wait (2),
.\" Copyright (c) 2007 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH SYSV_SIGNAL 3 2007-05-04 "" "Linux Programmer's Manual"
.SH NAME
the signal handler is executing; and
c) if the handler interrupts (certain) blocking system calls,
then the system call is not automatically restarted.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR sysv_signal ()
function returns the previous value of the signal handler, or
.SH ERRORS
As for
.BR signal (2).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This function is nonstandard.
.SH NOTES
Use of
the
.B _GNU_SOURCE
feature test macro is defined.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sigaction (2),
.BR signal (2),
.BR bsd_signal (3),
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
An overflow floating-point exception
.RB ( FE_OVERFLOW )
is raised.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
to
.B EDOM
when a domain error occurred.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR acos (3),
.BR asin (3),
.BR atan (3),
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
tanh(x) = sinh(x) / cosh(x)
.fi
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, these functions return the hyperbolic tangent of
.IR x .
.\" glibc 2.8 does not do this.
.SH ERRORS
No errors occur.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
The variant returning
.I double
also conforms to
SVr4, 4.3BSD, C89.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR acosh (3),
.BR asinh (3),
.BR atanh (3),
.\" Copyright (C) 2002 Andries Brouwer <aeb@cwi.nl>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH TCGETPGRP 3 2003-01-28 "GNU" "Linux Programmer's Manual"
.SH NAME
a
.B SIGTTOU
signal is sent to all members of this background process group.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
When
.I fd
refers to the controlling terminal of the calling process,
.I pgrp
has a supported value, but is not the process group ID of a
process in the same session as the calling process.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
These functions are implemented via the
.SS History
The ioctls appeared in 4.2BSD.
The functions are POSIX inventions.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR setpgid (2),
.BR setsid (2),
.BR credentials (7)
.\" Copyright (C) 2002 Andries Brouwer <aeb@cwi.nl>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH TCGETSID 3 2010-09-10 "GNU" "Linux Programmer's Manual"
.SH NAME
.I fd
as controlling terminal.
This terminal must be the controlling terminal of the calling process.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
When
.I fd
refers to the controlling terminal of our session,
.SH VERSIONS
.BR tcgetsid ()
is provided in glibc since version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
This function is implemented via the
.BR ioctl (2),
present
since Linux 2.1.71.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getsid (2)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.BR telldir ()
function returns the current location associated with
the directory stream \fIdirp\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, the
.BR telldir ()
function returns the current location
.TP
.B EBADF
Invalid directory stream descriptor \fIdirp\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD, POSIX.1-2001.
.SH NOTES
In glibc up to version 2.1.1, the return type of
POSIX.1-2001 specifies
.IR long ,
and this is the type used since glibc 2.1.2.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR closedir (3),
.BR opendir (3),
.BR readdir (3),
.\" Copyright (c) 1999 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH TEMPNAM 3 2008-08-06 "" "Linux Programmer's Manual"
.SH NAME
.BR malloc (3)
and hence should be freed by
.BR free (3).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR tempnam ()
function returns a pointer to a unique temporary
.TP
.B ENOMEM
Allocation of storage failed.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, POSIX.1-2001.
POSIX.1-2008 marks
.BR tempnam ()
or
.BR tmpfile (3)
instead.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mkstemp (3),
.BR mktemp (3),
.BR tmpfile (3),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (c) 1993 Michael Haardt
.\" (michael@moria.de)
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified 1993-07-24 by Rik Faith <faith@cs.unc.edu>
.\" Modified 1995-02-25 by Jim Van Zandt <jrv@vanzandt.mv.com>
.\" Enhanced the discussion of "raw" mode for cfmakeraw().
.\" Document CMSPAR.
.\"
-.TH TERMIOS 3 2011-09-08 "Linux" "Linux Programmer's Manual"
+.TH TERMIOS 3 2013-03-15 "Linux" "Linux Programmer's Manual"
.SH NAME
termios, tcgetattr, tcsetattr, tcsendbreak, tcdrain, tcflush, tcflow,
cfmakeraw, cfgetospeed, cfgetispeed, cfsetispeed, cfsetospeed, cfsetspeed \-
.SH DESCRIPTION
The termios functions describe a general terminal interface that is
provided to control asynchronous communications ports.
-.SS "The termios structure"
+.SS The termios structure
.LP
Many of the functions described here have a \fItermios_p\fP argument
that is a pointer to a \fItermios\fP structure.
.BR VTIME ,
see the description of
noncanonical mode below.
-.SS "Retrieving and changing terminal settings"
+.SS Retrieving and changing terminal settings
.PP
.BR tcgetattr ()
gets the parameters associated with the object referred by \fIfd\fP and
.I fd
has been transmitted, and all input that has been received but not read
will be discarded before the change is made.
-.SS "Canonical and noncanonical mode"
+.SS Canonical and noncanonical mode
The setting of the
.B ICANON
canon flag in
.PP
In noncanonical mode input is available immediately (without
the user having to type a line-delimiter character),
+no input processing is performed,
and line editing is disabled.
The settings of MIN
.RI ( c_cc[VMIN] )
or when the inter-byte timeout expires.
Because the timer is only started after the initial byte
becomes available, at least one byte will be read.
-.SS "Raw mode"
+.SS Raw mode
.LP
.BR cfmakeraw ()
sets the terminal to something like the
termios_p\->c_cflag &= ~(CSIZE | PARENB);
termios_p\->c_cflag |= CS8;
.fi
-.SS "Line control"
+.SS Line control
.LP
.BR tcsendbreak ()
transmits a continuous stream of zero-valued bits for a specific
.LP
The default on open of a terminal file is that neither its input nor its
output is suspended.
-.SS "Line speed"
+.SS Line speed
The baud rate functions are provided for getting and setting the values
of the input and output baud rates in the \fItermios\fP structure.
The new values do not take effect
It takes the same arguments as
.BR cfsetispeed (),
and sets both input and output speed.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.LP
.BR cfgetispeed ()
returns the input baud rate stored in the
.\" libc4.7.6, libc5, glibc for unix: duration in ms.
.\" glibc for bsd: duration in us
.\" glibc for sunos4: ignore duration
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR stty (1),
.BR console_ioctl (4),
.BR tty_ioctl (4),
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
+.\"
.\" Based on glibc infopages
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\" Modified 2004-11-15, fixed error noted by Fabian Kreutz
.\" <kreutz@dbs.uni-hannover.de>
+.\"
.TH TGAMMA 3 2010-09-20 "GNU" "Linux Programmer's Manual"
.SH NAME
tgamma, tgammaf, tgammal \- true gamma function
.\" exception for various cases.
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
.SH NOTES
This function had to be called "true gamma function"
and an
.B FE_INVALID
exception raised), rather than a pole error.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR gamma (3),
.BR lgamma (3)
.\" Copyright (C) 2001 Andries Brouwer <aeb@cwi.nl>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH TIMEGM 3 2007-07-26 "GNU" "Linux Programmer's Manual"
.SH NAME
.BR localtime (3)
and
.BR gmtime (3).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
These functions are nonstandard GNU extensions
that are also present on the BSDs.
Avoid their use; see NOTES.
}
.fi
.in
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR gmtime (3),
.BR localtime (3),
.BR mktime (3),
.\" Copyright (c) 2007 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 2007-07-31, mtk, Created
.\"
.SH CONFORMING TO
Not in POSIX.1-2001.
Present on most BSD derivatives.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR gettimeofday (2),
.BR time (7)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
in binary read/write (w+b) mode.
The file will be automatically deleted when it is closed or the
program terminates.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR tmpfile ()
function returns a stream descriptor, or NULL if
.TP
.B EROFS
Read-only file system.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, C89, C99, SUSv2, POSIX.1-2001.
.SH NOTES
POSIX.1-2001 specifies:
will use.
Glibc will try the path prefix \fIP_tmpdir\fP defined
in \fI<stdio.h>\fP, and if that fails the directory \fI/tmp\fP.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR exit (3),
.BR mkstemp (3),
.BR mktemp (3),
.\" Copyright (c) 1999 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 2003-11-15, aeb, added tmpnam_r
.\"
just like the
.B TMP_MAX
mentioned below.)
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR tmpnam ()
function returns a pointer to a unique temporary
filename, or NULL if a unique name cannot be generated.
.SH ERRORS
No errors are defined.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, 4.3BSD, C89, C99, POSIX.1-2001.
POSIX.1-2008 marks
.BR tmpnam ()
or
.BR tmpfile (3)
instead.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mkstemp (3),
.BR mktemp (3),
.BR tempnam (3),
-.\" Hey Emacs! This file is -*- nroff -*- source.
.\" Copyright (c) 1995 by Jim Van Zandt <jrv@vanzandt.mv.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
.\"
.\" Added BUGS section, aeb, 950919
.\"
converts \fIc\fP to a 7-bit \fIunsigned char\fP value
that fits into the ASCII character set, by clearing the
high-order bits.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The value returned is that of the converted character.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, BSD, POSIX.1-2001.
POSIX.1-2008 marks
.BR toascii ()
.SH BUGS
Many people will be unhappy if you use this function.
This function will convert accented letters into random characters.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR isascii (3),
.BR tolower (3),
.BR toupper (3)
.\" Copyright (c) 1993 by Thomas Koenig (ig25@rz.uni-karlsruhe.de)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
+.\"
.\" Modified Sat Jul 24 17:45:39 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified 2000-02-13 by Nicolás Lichtmaier <nick@debian.org>
.TH TOUPPER 3 1993-04-04 "GNU" "Linux Programmer's Manual"
.BR EOF ,
the behavior of these functions
is undefined.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The value returned is that of the converted letter, or
.I c
if the conversion was not possible.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C89, C99, 4.3BSD.
.SH BUGS
The details of what constitutes an uppercase or lowercase letter depend
In some non-English locales, there are lowercase letters with no
corresponding uppercase equivalent; the German sharp s is one
example.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR isalpha (3),
.BR setlocale (3),
.BR towlower (3),
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
the
.BR wctrans (3)
function.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR towctrans ()
function returns the translated wide character,
or \fBWEOF\fP if \fIwc\fP is \fBWEOF\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.B LC_CTYPE
category of the
current locale.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR towlower (3),
.BR towupper (3),
.BR wctrans (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
lowercase.
Characters which do not have case are returned unchanged.
If \fIwc\fP is \fBWEOF\fP, \fBWEOF\fP is returned.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR towlower ()
function returns the lowercase equivalent of \fIwc\fP,
or \fBWEOF\fP if \fIwc\fP is \fBWEOF\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.PP
This function is not very appropriate for dealing with Unicode characters,
because Unicode knows about three cases: upper, lower and title case.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR iswlower (3),
.BR towctrans (3),
.BR towupper (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
uppercase.
Characters which do not have case are returned unchanged.
If \fIwc\fP is \fBWEOF\fP, \fBWEOF\fP is returned.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR towupper ()
function returns the uppercase equivalent of \fIwc\fP,
or \fBWEOF\fP if \fIwc\fP is \fBWEOF\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.PP
This function is not very appropriate for dealing with Unicode characters,
because Unicode knows about three cases: upper, lower and title case.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR iswupper (3),
.BR towctrans (3),
.BR towlower (3)
.\" Copyright (C) 2001 Andries Brouwer <aeb@cwi.nl>.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH TRUNC 3 2010-09-20 "" "Linux Programmer's Manual"
.SH NAME
.SH DESCRIPTION
These functions round \fIx\fP to the nearest integer
not larger in absolute value.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
These functions return the rounded integer value.
If \fIx\fP is integral, infinite, or NaN, \fIx\fP itself is returned.
No errors occur.
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99, POSIX.1-2001.
.SH NOTES
The integral value returned by these functions may be too large
To avoid an overflow, which will produce undefined results,
an application should perform a range check on the returned value
before assigning it to an integer type.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ceil (3),
.BR floor (3),
.BR lrint (3),
-.\" Hey Emacs! This file is -*- nroff -*- source.
.\" Copyright 1995 by Jim Van Zandt <jrv@vanzandt.mv.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH TSEARCH 3 2008-09-23 "GNU" "Linux Programmer's Manual"
+.TH TSEARCH 3 2012-08-03 "GNU" "Linux Programmer's Manual"
.SH NAME
tsearch, tfind, tdelete, twalk, tdestroy \- manage a binary tree
.SH SYNOPSIS
The first field in each node of the tree is a pointer to the
corresponding data item.
(The calling program must store the actual data.)
-\fIcompar\fP points to a comparison routine, which takes
+.IR compar
+points to a comparison routine, which takes
pointers to two items.
It should return an integer which is negative,
zero, or positive, depending on whether the first item is less than,
.PP
.BR tsearch ()
searches the tree for an item.
-\fIkey\fP points to the item to be searched for.
-\fIrootp\fP points to a variable which points to the root of the tree.
+.IR key
+points to the item to be searched for.
+.IR rootp
+points to a variable which points to the root of the tree.
If the tree is empty,
-then the variable that \fIrootp\fP points to should be set to NULL.
+then the variable that
+.IR rootp
+points to should be set to NULL.
If the item is found in the tree, then
.BR tsearch ()
returns a pointer
.BR twalk ()
performs depth-first, left-to-right traversal of a binary
tree.
-\fIroot\fP points to the starting node for the traversal.
+.IR root
+points to the starting node for the traversal.
If that node is not the root, then only part of the tree will be visited.
.BR twalk ()
-calls the user function \fIaction\fP each time a node is
+calls the user function
+.IR action
+each time a node is
visited (that is, three times for an internal node, and once for a
leaf).
-\fIaction\fP, in turn, takes three arguments.
-The first is a pointer to the node being visited.
-The second is an integer which
-takes on the values \fBpreorder\fP, \fBpostorder\fP, and
-\fBendorder\fP depending on whether this is the first, second, or
-third visit to the internal node, or \fBleaf\fP if it is the single
-visit to a leaf node.
-(These symbols are defined in \fI<search.h>\fP.)
-The third argument is the depth of the node, with
-zero being the root.
+.IR action ,
+in turn, takes three arguments.
+The first argument is a pointer to the node being visited.
+The structure of the node is unspecified,
+but it is possible to cast the pointer to a pointer-to-pointer-to-element
+in order to access the element stored within the node.
+The application must not modify the structure pointed to by this argument.
+The second argument is an integer which
+takes one of the values
+.BR preorder ,
+.BR postorder ,
+or
+.BR endorder
+depending on whether this is the first, second, or
+third visit to the internal node,
+or the value
+.BR leaf
+if this is the single visit to a leaf node.
+(These symbols are defined in
+.IR <search.h> .)
+The third argument is the depth of the node;
+the root node has depth zero.
.PP
-(More commonly, \fBpreorder\fP, \fBpostorder\fP, and \fBendorder\fP
-are known as \fBpreorder\fP, \fBinorder\fP, and \fBpostorder\fP:
+(More commonly,
+.BR preorder ,
+.BR postorder ,
+and
+.BR endorder
+are known as
+.BR preorder ,
+.BR inorder ,
+and
+.BR postorder :
before visiting the children, after the first and before the second,
and after visiting the children.
-Thus, the choice of name \fBpost\%order\fP
+Thus, the choice of name
+.BR post\%order
is rather confusing.)
.PP
.BR tdestroy ()
-removes the whole tree pointed to by \fIroot\fP,
+removes the whole tree pointed to by
+.IR root ,
freeing all resources allocated by the
.BR tsearch ()
function.
-For the data in each tree node the function \fIfree_node\fP is called.
+For the data in each tree node the function
+.IR free_node
+is called.
The pointer to the data is passed as the argument to the function.
-If no such work is necessary \fIfree_node\fP must point to a function
+If no such work is necessary,
+.IR free_node
+must point to a function
doing nothing.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR tsearch ()
returns a pointer to a matching item in the tree, or to
the newly added item, or NULL if there was insufficient memory
and
.BR tdelete ()
also
-return NULL if \fIrootp\fP was NULL on entry.
-.SH "CONFORMING TO"
+return NULL if
+.IR rootp
+was NULL on entry.
+.SH CONFORMING TO
SVr4, POSIX.1-2001.
The function
.BR tdestroy ()
takes a pointer to the root, while the other functions
take a pointer to a variable which points to the root.
.PP
-.BR twalk ()
-uses \fBpostorder\fP to mean "after the left subtree, but
-before the right subtree".
-Some authorities would call this
-"inorder", and reserve "postorder" to mean "after both subtrees".
-.PP
.BR tdelete ()
frees the memory required for the node in the tree.
The user is responsible for freeing the memory for the corresponding
srand(time(NULL));
for (i = 0; i < 12; i++) {
- ptr = (int *) xmalloc(sizeof(int));
+ ptr = xmalloc(sizeof(int));
*ptr = rand() & 0xff;
val = tsearch((void *) ptr, &root, compare);
if (val == NULL)
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR bsearch (3),
.BR hsearch (3),
.BR lsearch (3),
.\" Copyright (c) 1995 Jim Van Zandt <jrv@vanzandt.mv.com>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified 2001-12-13, Martin Schulze <joey@infodrom.org>
.\" Added ttyname_r, aeb, 2002-07-20
.\"
-.TH TTYNAME 3 2008-07-14 "Linux" "Linux Programmer's Manual"
+.TH TTYNAME 3 2012-12-21 "Linux" "Linux Programmer's Manual"
.SH NAME
ttyname, ttyname_r \- return name of a terminal
.SH SYNOPSIS
.I buf
of length
.IR buflen .
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The function
.BR ttyname ()
returns a pointer to a pathname on success.
.BR ttyname_r ()
returns 0 on success, and an error number upon error.
.SH ERRORS
-.BR ttyname_r ():
.TP
.B EBADF
Bad file descriptor.
File descriptor does not refer to a terminal device.
.TP
.B ERANGE
+.RB ( ttyname_r ())
.I buflen
was too small to allow storing the pathname.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.2BSD, POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fstat (2),
+.BR ctermid (3),
.BR isatty (3)
.\" Copyright (C) 2002 Andries Brouwer <aeb@cwi.nl>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" This replaces an earlier man page written by Walter Harms
.\" <walter.harms@informatik.uni-oldenburg.de>.
.LP
Now "What file?" you ask.
Well, let's first look at some history.
-.SS "Ancient History"
+.SS Ancient history
There used to be a file
.I /etc/ttys
in UNIX V6, that was read by the
System V-like systems have
.I /etc/inittab
instead.
-.SS "Ancient History (2)"
+.SS Ancient history (2)
On the other hand, there is the file
.I /etc/utmp
listing the people currently logged in.
call to find the number of the line in
.I /etc/ttys
(counting from 1).
-.SS "The semantics of ttyslot"
+.SS The semantics of ttyslot
Thus, the function
.BR ttyslot ()
returns the index of the controlling terminal of the calling process
Thus, on such systems the documentation says that
.BR ttyslot ()
returns the current user's index in the user accounting data base.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
If successful, this function returns the slot number.
On error (e.g., if none of the file descriptors 0, 1 or 2 is
associated with a terminal that occurs in this data base)
it returns 0 on UNIX V6 and V7 and BSD-like systems,
but \-1 on System V-like systems.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SUSv1; marked as LEGACY in SUSv2; removed in POSIX.1-2001.
SUSv2 requires \-1 on error.
.SH NOTES
.\" .SH HISTORY
.\" .BR ttyslot ()
.\" appeared in UNIX V7.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getttyent (3),
.BR ttyname (3),
.BR utmp (5)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
is a symlink to the file
.I localtime
or to the correct timezone file in the system timezone directory.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001, 4.3BSD.
.SH NOTES
Note that the variable \fIdaylight\fP does not indicate that daylight
West of UTC).
If the second argument was 0, the standard name was used,
otherwise the daylight saving time version.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR date (1),
.BR gettimeofday (2),
.BR time (2),
.\" Copyright (c) 2003 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.TH UALARM 3 2010-09-20 "" "Linux Programmer's Manual"
.SH NAME
signals will be sent every
.I interval
microseconds after the first.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
This function returns the number of microseconds remaining for
any alarm that was previously set, or 0 if no alarm was pending.
.SH ERRORS
.B EINVAL
\fIusecs\fP or \fIinterval\fP is not smaller than 1000000.
(On systems where that is considered an error.)
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD, POSIX.1-2001.
POSIX.1-2001 marks
.BR ualarm ()
.RB ( timer_create (2),
etc.)
instead.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR alarm (2),
.BR getitimer (2),
.BR nanosleep (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 1996 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Moved to man3, aeb, 980612
.\"
.B 4
(Implemented but no symbolic constant provided.)
Return the maximum number of files that the calling process can open.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success,
.BR ulimit ()
returns a nonnegative value.
.TP
.B EPERM
A unprivileged process tried to increase a limit.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
SVr4, POSIX.1-2001.
POSIX.1-2008 marks
.BR ulimit ()
as obsolete.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR bash (1),
.BR getrlimit (2),
.BR setrlimit (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright 1995 Jim Van Zandt
.\" From jrv@vanzandt.mv.com Mon Sep 4 21:11:50 1995
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 1996-11-08, meem@sherilyn.wustl.edu, corrections
.\" 2004-10-31, aeb, changed maintainer address, updated list
.\"
-.TH UNDOCUMENTED 3 2012-05-04 "Linux" "Linux Programmer's Manual"
+.TH UNDOCUMENTED 3 2012-12-21 "Linux" "Linux Programmer's Manual"
.SH NAME
none \- undocumented library functions
.SH SYNOPSIS
similar to that of the other Linux section 3 man pages), and send it to
.B mtk.manpages@gmail.com
for inclusion in the next man page release.
-.SS "The List"
+.SS The list
.BR authdes_create (3),
.BR authdes_getucred (3),
.BR h_errlist (3),
.BR host2netname (3),
.BR hostalias (3),
-.BR if_freenameindex (3),
-.BR if_indextoname (3),
-.BR if_nameindex (3),
-.BR if_nametoindex (3),
.BR inet_nsap_addr (3),
.BR inet_nsap_ntoa (3),
.BR init_des (3),
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
If the implementation supports multiple push-back operations in a row, the
pushed-back wide characters will be read in reverse order; however, only one
level of push-back is guaranteed.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR ungetwc ()
function returns \fIwc\fP when successful, or \fBWEOF\fP upon
failure.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.B LC_CTYPE
category of the
current locale.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fgetwc (3)
.\" Copyright (C) 2001 Andries Brouwer <aeb@cwi.nl>.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH UNLOCKED_STDIO 3 2008-08-29 "" "Linux Programmer's Manual"
.SH NAME
of locks set by others) and hence are thread-unsafe.
See
.BR flockfile (3).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The four functions
.BR getc_unlocked (),
.BR getchar_unlocked (),
.\" putwc_unlocked, putwchar_unlocked, rewind_unlocked, setvbuf_unlocked,
.\" ungetc_unlocked, ungetwc_unlocked.
They should probably not be used.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR flockfile (3),
.BR stdio (3)
-.\" Hey Emacs! This file is -*- nroff -*- source.
+.\" %%%LICENSE_START(PUBLIC_DOMAIN)
.\" This page is in the public domain. - aeb
+.\" %%%LICENSE_END
.\"
.TH UNLOCKPT 3 2008-06-14 "" "Linux Programmer's Manual"
.SH NAME
.PP
.BR unlockpt ()
should be called before opening the slave side of a pseudoterminal.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
When successful,
.BR unlockpt ()
returns 0.
.SH VERSIONS
.BR unlockpt ()
is provided in glibc since version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR grantpt (3),
.BR posix_openpt (3),
.BR ptsname (3),
.\" Copyright 1997 Nicolás Lichtmaier <nick@debian.org>
.\" Created Wed Jul 2 23:27:34 ART 1997
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
.\" GNU General Public License for more details.
.\"
+.\" You should have received a copy of the GNU General Public
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
+.\"
.\" Added info on availability, aeb, 971207
.\" Added -lutil remark, 030718
.\" 2008-07-02, mtk, document updwtmpx()
.TP
.I /var/log/wtmp
database of past user logins
-.SH "CONFORMING TO"
+.SH CONFORMING TO
Not in POSIX.1-2001.
Present on Solaris, NetBSD, and perhaps other systems.
.SH AVAILABILITY
but differs in that it takes a
.I utmpx
structure as its last argument.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getutxent (3),
.BR wtmp (5)
.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
The sleep may be lengthened slightly
by any system activity or by the time spent processing the call or by the
granularity of system timers.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
0 on success, \-1 on error.
.SH ERRORS
.TP
.B EINVAL
\fIusec\fP is not smaller than 1000000.
(On systems where that is considered an error.)
-.SH "CONFORMING TO"
+.SH CONFORMING TO
4.3BSD, POSIX.1-2001.
POSIX.1-2001 declares this function obsolete; use
.BR nanosleep (2)
.BR timer_settime (2),
.BR ualarm (3)
is unspecified.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR alarm (2),
.BR getitimer (2),
.BR nanosleep (2),
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
The programmer must ensure that there
is room for at least \fIwcslen(src)+1\fP
wide characters at \fIdest\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR wcpcpy ()
returns a pointer to the end of the wide-character string
\fIdest\fP, that is, a pointer to the terminating null wide character.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR strcpy (3),
.BR wcscpy (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.PP
The programmer must ensure that there is room for at least \fIn\fP wide
characters at \fIdest\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR wcpncpy ()
returns a pointer to the last wide character written, that is,
\fIdest + n \- 1\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR stpncpy (3),
.BR wcsncpy (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
state only known to the
.BR wcrtomb ()
function is used instead.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR wcrtomb ()
function returns the number of
represented as a multibyte sequence (according to the current locale),
.I (size_t)\ \-1
is returned, and \fIerrno\fP set to \fBEILSEQ\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
current locale.
.PP
Passing NULL as \fIps\fP is not multithread safe.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR wcsrtombs (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
case differences
.RB ( towupper (3),
.BR towlower (3)).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR wcscasecmp ()
function returns zero if the wide-character strings at
The
.BR wcscasecmp ()
function is provided in glibc since version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
This function is not specified in POSIX.1-2001,
and is not widely available on other systems.
.B LC_CTYPE
category of the
current locale.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR strcasecmp (3),
.BR wcscmp (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.PP
The programmer must ensure that there is room for at least
\fIwcslen(dest) + wcslen(src) + 1\fP wide characters at \fIdest\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR wcscat ()
returns \fIdest\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR strcat (3),
.BR wcpcpy (3),
.BR wcscpy (3),
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
function.
It searches the first occurrence of \fIwc\fP in the wide-character
string pointed to by \fIwcs\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR wcschr ()
function returns a pointer to the first occurrence of
\fIwc\fP in the wide-character string pointed to by \fIwcs\fP, or NULL if
\fIwc\fP does not occur in the string.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR strchr (3),
.BR wcspbrk (3),
.BR wcsrchr (3),
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
function.
It compares the wide-character string pointed to by \fIs1\fP and the
wide-character string pointed to by \fIs2\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR wcscmp ()
function returns zero if the wide-character strings at
It returns an integer less than zero if
at the first differing position \fIi\fP, the corresponding wide-character
\fIs1[i]\fP is less than \fIs2[i]\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR strcmp (3),
.BR wcscasecmp (3),
.BR wmemcmp (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
The programmer must ensure that there is
room for at least \fIwcslen(src)+1\fP
wide characters at \fIdest\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR wcscpy ()
returns \fIdest\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR strcpy (3),
.BR wcpcpy (3),
.BR wcscat (3),
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
other words, it searches for the first occurrence in the wide-character
string \fIwcs\fP of any of the characters in the wide-character string
\fIreject\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR wcscspn ()
function returns the number of
of any of the characters in
the wide-character string \fIreject\fP,
or \fIwcslen(wcs)\fP if there is none.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR strcspn (3),
.BR wcspbrk (3),
.BR wcsspn (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.BR malloc (3),
and should be freed with
.BR free (3).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR wcsdup ()
function returns a pointer
.TP
.B ENOMEM
Insufficient memory available to allocate duplicate string.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
This function is not specified in POSIX.1-2001,
and is not widely available on other systems.
.\" present in libc5 and glibc 2.0 and later
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR strdup (3),
.BR wcscpy (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
function.
It determines the length of the wide-character string pointed to
by \fIs\fP, excluding the terminating null wide character (L\(aq\\0\(aq).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR wcslen ()
function returns the
number of wide characters in \fIs\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR strlen (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
\fIn\fP wide characters from each string, ignoring case differences
.RB ( towupper (3),
.BR towlower (3)).
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR wcsncasecmp ()
function returns zero
The
.BR wcsncasecmp ()
function is provided in glibc since version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
This function is not specified in POSIX.1-2001,
and is not widely available on other systems.
.B LC_CTYPE
category of the
current locale.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR strncasecmp (3),
.BR wcsncmp (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.PP
The programmer must ensure that there is room for at least
\fIwcslen(dest) + n + 1\fP wide characters at \fIdest\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR wcsncat ()
returns \fIdest\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR strncat (3),
.BR wcscat (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
characters from each string.
In each string, the comparison extends only up
to the first occurrence of a null wide character (L\(aq\\0\(aq), if any.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR wcsncmp ()
function returns zero if the wide-character strings at
It returns an integer less than zero if at the first
differing position \fIi\fP (\fIi\fP < \fIn\fP), the corresponding
wide-character \fIs1[i]\fP is less than \fIs2[i]\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR strncmp (3),
.BR wcsncasecmp (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.PP
The programmer must ensure that there is room for at least \fIn\fP wide
characters at \fIdest\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR wcsncpy ()
returns \fIdest\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR strncpy (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.BR wcsnlen ()
looks only at the first \fImaxlen\fP
wide characters at \fIs\fP and never beyond \fIs+maxlen\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR wcsnlen ()
function returns \fIwcslen(s)\fP, if that is less than
The
.BR wcsnlen ()
function is provided in glibc since version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR strnlen (3),
.BR wcslen (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.PP
The programmer must ensure that there is room for at least \fIlen\fP bytes
at \fIdest\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR wcsnrtombs ()
function returns
could not be converted,
.I (size_t)\ \-1
is returned, and \fIerrno\fP set to \fBEILSEQ\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2008.
.SH NOTES
The behavior of
current locale.
.PP
Passing NULL as \fIps\fP is not multithread safe.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR iconv (3),
.BR wcsrtombs (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
string pointed to by \fIwcs\fP of any of the
characters in the wide-character
string pointed to by \fIaccept\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR wcspbrk ()
function returns a pointer to the first occurrence in
\fIwcs\fP of any of the characters listed in \fIaccept\fP.
If \fIwcs\fP
contains none of these characters, NULL is returned.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR strpbrk (3),
.BR wcschr (3),
.BR wcscspn (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
function.
It searches the last occurrence of \fIwc\fP in the wide-character
string pointed to by \fIwcs\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR wcsrchr ()
function returns a pointer to the last occurrence of
\fIwc\fP in the wide-character string pointed to by \fIwcs\fP, or NULL if
\fIwc\fP does not occur in the string.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR strrchr (3),
.BR wcschr (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.PP
The programmer must ensure that there is room for at least \fIlen\fP bytes
at \fIdest\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR wcsrtombs ()
function returns
is returned, and
.I errno
set to \fBEILSEQ\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
current locale.
.PP
Passing NULL as \fIps\fP is not multithread safe.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR iconv (3),
.BR wcsnrtombs (3),
.BR wcstombs (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
words, it searches for the first occurrence in the wide-character string
\fIwcs\fP of a wide-character not contained in the wide-character string
\fIaccept\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR wcsspn ()
function returns the number of
occurrence in the wide-character string \fIwcs\fP of a wide-character not
contained in the wide-character string \fIaccept\fP, or \fIwcslen(wcs)\fP
if there is none.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR strspn (3),
.BR wcscspn (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
It searches for the first occurrence of the wide-character string
\fIneedle\fP (without its terminating null wide character (L\(aq\\0\(aq))
as a substring in the wide-character string \fIhaystack\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR wcsstr ()
function returns a pointer to the first occurrence of
Note the special case:
If \fIneedle\fP is the empty wide-character string,
the return value is always \fIhaystack\fP itself.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR strstr (3),
.BR wcschr (3)
.\" Copyright (c) 2003 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.TH WCSTOIMAX 3 2003-11-01 "" "Linux Programmer's Manual"
.SH NAME
and
.IR uintmax_t ,
respectively.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR imaxabs (3),
.BR imaxdiv (3),
.BR strtoimax (3),
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
a null wide character (L\(aq\\0\(aq),
and it updates \fI*ptr\fP so that subsequent calls will
continue searching after the end of recognized token.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR wcstok ()
function returns a pointer to the next token,
or NULL if no further token was found.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The original \fIwcs\fP wide-character string is destructively modified during
...
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR strtok (3),
.BR wcschr (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.PP
In order to avoid the case 2 above, the programmer should make sure \fIn\fP
is greater or equal to \fIwcstombs(NULL,src,0)+1\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR wcstombs ()
function returns the number of bytes that make up the
converted,
.I (size_t)\ \-1
is returned.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.BR wcsrtombs (3)
provides a thread safe interface to
the same functionality.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mbstowcs (3),
.BR wcsrtombs (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
characters.
If a nonprintable wide character occurs among these characters,
\-1 is returned.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR wcswidth ()
function
returns the number of column positions for the
wide-character string \fIs\fP, truncated to at most length \fIn\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
The behavior of
.B LC_CTYPE
category of the
current locale.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR iswprint (3),
.BR wcwidth (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
programs.
Internationalized programs must never distinguish single-byte and
multibyte characters.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR wctob ()
function returns the single-byte representation of \fIc\fP,
if it exists, of \fBEOF\fP otherwise.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
or the thread-safe
.BR wcrtomb (3)
instead.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR btowc (3),
.BR wcrtomb (3),
.BR wctomb (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
to the initial state, and
returns nonzero if the encoding has nontrivial shift state,
or zero if the encoding is stateless.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
If \fIs\fP is not NULL, the
.BR wctomb ()
function
.BR wctomb ()
function returns nonzero if the
encoding has nontrivial shift state, or zero if the encoding is stateless.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.BR wcrtomb (3)
provides
a better interface to the same functionality.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR MB_CUR_MAX (3),
.BR wcrtomb (3),
.BR wcstombs (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
"tolower" \- realizes the \fBtolower\fP(3) mapping
"toupper" \- realizes the \fBtoupper\fP(3) mapping
.fi
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR wctrans ()
function returns a mapping descriptor if the \fIname\fP
is valid.
Otherwise it returns \fI(wctrans_t) 0\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.B LC_CTYPE
category of the
current locale.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR towctrans (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
"upper" \- realizes the \fBisupper\fP(3) classification function
"xdigit" \- realizes the \fBisxdigit\fP(3) classification function
.fi
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR wctype ()
function returns a property descriptor
is valid.
Otherwise it returns
.IR "(wctype_t) 0" .
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.B LC_CTYPE
category of the
current locale.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR iswctype (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
is at least 0.
If \fIc\fP is null wide character (L\(aq\\0\(aq), the value is 0.
Otherwise \-1 is returned.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR wcwidth ()
function returns the number of
column positions for \fIc\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
Note that glibc before 2.2.5 used the prototype
.B LC_CTYPE
category of the
current locale.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR iswprint (3),
.BR wcswidth (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
function.
It searches the \fIn\fP wide characters starting at \fIs\fP for
the first occurrence of the wide character \fIc\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR wmemchr ()
function returns a pointer to the first occurrence of \fIc\fP
among the \fIn\fP wide characters starting at \fIs\fP, or NULL if \fIc\fP does
not occur among these.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR memchr (3),
.BR wcschr (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
function.
It compares the \fIn\fP wide-characters starting at \fIs1\fP and the
\fIn\fP wide-characters starting at \fIs2\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR wmemcmp ()
function returns
(\fIi\fP < \fIn\fP), the corresponding
wide-character \fIs1[i]\fP is less than
\fIs2[i]\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR memcmp (3),
.BR wcscmp (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.PP
The programmer must ensure that there is room for at least \fIn\fP wide
characters at \fIdest\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR wmemcpy ()
returns \fIdest\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR memcpy (3),
.BR wcscpy (3),
.BR wmemmove (3),
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
.PP
The programmer must ensure that there is room for at least \fIn\fP wide
characters at \fIdest\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR wmemmove ()
returns \fIdest\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR memmove (3),
.BR wmemcpy (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
function.
It fills the array of \fIn\fP wide-characters starting at \fIwcs\fP
with \fIn\fP copies of the wide character \fIwc\fP.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.BR wmemset ()
returns \fIwcs\fP.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR memset (3)
.\" Copyright (c) 2003 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.TH WORDEXP 3 2008-07-14 "" "Linux Programmer's Manual"
.SH NAME
its argument, but it frees the array
.I we_wordv
and the strings that points to.
-.SS "The string argument"
+.SS The string argument
Since the expansion is the same as the expansion by the shell (see
.BR sh (1))
of the parameters to a command, the string
contains a word that starts with an unquoted comment character #,
then it is unspecified whether that word and all following words
are ignored, or the # is treated as a non-comment character.
-.SS "The expansion"
+.SS The expansion
The expansion done consists of the following stages:
tilde expansion (replacing ~user by user's home directory),
variable substitution (replacing $FOO by the value of the environment
.LP
Field splitting is done using the environment variable $IFS.
If it is not set, the field separators are space, tab and newline.
-.SS "The output array"
+.SS The output array
The array
.I we_wordv
contains the words found, followed by a NULL.
-.SS "The flags argument"
+.SS The flags argument
The
.I flag
argument is a bitwise inclusive OR of the following values:
.TP
.B WRDE_UNDEF
Consider it an error if an undefined shell variable is expanded.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
In case of success 0 is returned.
In case of error
one of the following five values is returned.
and
.BR wordfree ()
are provided in glibc since version 2.1.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH EXAMPLE
The output of the following example program
char **w;
int i;
- wordexp("[a-c]*.c", &p, 0);
+ wordexp("[a\-c]*.c", &p, 0);
w = p.we_wordv;
for (i = 0; i < p.we_wordc; i++)
printf("%s\en", w[i]);
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fnmatch (3),
.BR glob (3)
.\" Copyright (c) Bruno Haible <haible@clisp.cons.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" GNU glibc-2 source code and manual
The array must contain a terminating null
wide character, unless a precision is given and it is smaller than or equal
to the number of wide characters in the array.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The functions return the number of wide characters written, excluding the
terminating null wide character in
case of the functions
and
.BR vswprintf ().
They return \-1 when an error occurs.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
C99.
.SH NOTES
The behavior of
.BR iconv (3),
followed by
.BR mbstowcs (3)).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fprintf (3),
.BR fputwc (3),
.BR fwide (3),
.\" Copyright 2003 walter harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
+.\"
.\" this is the 3rd type of interface for cryptographic routines
.\" 1. encrypt() expects a bit field
.\" 2. cbc_crypt() byte values
The
.BR xdecrypt ()
function performs the converse operation.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The functions
.BR xencrypt ()
and
glibc 2.1 and later.
.SH BUGS
The prototypes are missing from the abovementioned include file.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cbc_crypt (3)
.\" This page was taken from the 4.4BSD-Lite CDROM (BSD license)
.\"
+.\" %%%LICENSE_START(BSD_ONELINE_CDROM)
+.\" This page was taken from the 4.4BSD-Lite CDROM (BSD license)
+.\" %%%LICENSE_END
+.\"
.\" @(#)xdr.3n 2.2 88/08/03 4.0 RPCSRC; from 1.16 88/03/14 SMI
.\"
.\" 2007-12-30, mtk, Convert function prototypes to modern C syntax
.TH XDR 3 2007-12-30 "" "Linux Programmer's Manual"
.SH NAME
xdr \- library routines for external data representation
-.SH "SYNOPSIS AND DESCRIPTION"
+.SH SYNOPSIS AND DESCRIPTION
.LP
These routines allow C programmers to describe
arbitrary data structures in a machine-independent fashion.
.BR xdr_string (),
one of the most frequently used primitives, requires three.
Returns one if it succeeds, zero otherwise.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR rpc (3)
.LP
The following manuals:
.\" and Copyright 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
An overflow floating-point exception
.RB ( FE_OVERFLOW )
is raised.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The functions returning
.I double
conform to SVr4, 4.3BSD,
.\" Copyright (C) 2011, Hewlett-Packard Development Company, L.P.
.\" Written by Stephen M. Cameron <scameron@beardog.cce.hp.com>
+.\"
+.\" %%%LICENSE_START(GPLv2_ONELINE)
.\" Licensed under GNU General Public License version 2 (GPLv2)
+.\" %%%LICENSE_END
.\"
.\" shorthand for double quote that works everywhere.
.ds q \N'34'
-.TH CCISS 4 2011-09-21 "Linux" "Linux Programmer's Manual"
+.TH CCISS 4 2012-08-05 "Linux" "Linux Programmer's Manual"
.SH NAME
cciss \- HP Smart Array block driver
.SH SYNOPSIS
Smart Array E200i
Smart Array E500
.fi
-.SS Supported Hardware
+.SS Supported hardware
The
.B cciss
driver supports the following Smart Array boards:
Smart Array P712m
Smart Array P711m
.fi
-.SS Configuration Details
+.SS Configuration details
To configure HP Smart Array controllers,
use the HP Array Configuration Utility
(either
or the Offline ROM-based Configuration Utility (ORCA)
run from the Smart Array's option ROM at boot time.
.SH FILES
-.SS Device Nodes
+.SS Device nodes
The device naming scheme is as follows:
.nf
/dev/cciss/c1d1p1 Controller 1, disk 1, partition 1
/dev/cciss/c1d1p2 Controller 1, disk 1, partition 2
/dev/cciss/c1d1p3 Controller 1, disk 1, partition 3
-
.fi
.SS Files in /proc
The files
Sequential access devices: 0
cciss/c2d0: 36.38GB RAID 0
-
.fi
.SS Files in /sys
.TP
the /proc file-system entry,
which the "block" side of the driver creates as
.I /proc/driver/cciss/cciss*
-at runtime.
+at run time.
This is because at driver init time,
the SCSI core may not yet be initialized (because the driver is a block
driver) and attempting to register it with the SCSI core in such a case
Note also that if no sequential access devices or medium changers are
detected, the SCSI core will not be engaged by the action of the above
script.
-
.SS Hot plug support for SCSI tape drives
-
Hot plugging of SCSI tape drives is supported, with some caveats.
The
.B cciss
The logical drives are presented to the block layer
(not to the SCSI midlayer).
It is important for the driver to prevent the kernel from accessing the
-physical drives directlyi, since these drives are used by the array
+physical drives directly, since these drives are used by the array
controller to construct the logical drives.
.SS SCSI error handling for tape drives and medium changers
The Linux SCSI midlayer provides an error-handling protocol that
Typically you must rewind the tape (by issuing
.I "mt -f /dev/st0 rewind"
for example) before I/O can proceed again to a tape drive that was reset.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cciss_vol_status (8),
.BR hpsa (4),
.BR hpacucli (8),
.BR hpacuxe (8),
-.IR http://cciss.sf.net ,
-and the Linux kernel source files
+
+.UR http://cciss.sf.net
+.UE ,
+and
.I Documentation/blockdev/cciss.txt
and
.I Documentation/ABI/testing/sysfs-bus-pci-devices-cciss
+in the Linux kernel source tree
.\" .SH AUTHORS
.\" Don Brace, Steve Cameron, Chase Maupin, Mike Miller, Michael Ni,
.\" Charles White, Francis Wiran
.\" Copyright (c) 1994 Andries Brouwer (aeb@cwi.nl), Mon Oct 31 21:03:19 MET 1994
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" Modified, Sun Feb 26 14:58:45 1995, faith@cs.unc.edu
.\" "
.I /dev/console
.br
.I /dev/tty*
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR chvt (1),
.BR deallocvt (1),
.BR loadkeys (1),
'\" t
.\" Copyright (c) 1996 Andries Brouwer <aeb@cwi.nl>, Mon Oct 31 22:13:04 1996
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" This is combined from many sources.
.\" For Linux, the definitive source is of course console.c.
.\"
.\" 2006-05-27, Several corrections - Thomas E. Dickey
.\"
-.TH CONSOLE_CODES 4 2011-09-15 "Linux" "Linux Programmer's Manual"
+.TH CONSOLE_CODES 4 2012-08-05 "Linux" "Linux Programmer's Manual"
.SH NAME
console_codes \- Linux console escape and control sequences
.SH DESCRIPTION
.BR tput (1),
or
.BR reset (1).
-.SS "Linux Console Controls"
+.SS Linux console controls
This section describes all the control characters and escape sequences
that invoke special functions (i.e., anything other than writing a
glyph at the current cursor location) on the Linux console.
ESC [ 13 ] Unblank the screen.
ESC [ 14 ; \fIn\fP ] Set the VESA powerdown interval in minutes.
.TE
-.SS "Character Sets"
+.SS Character sets
The kernel knows about 4 translations of bytes into console-screen
symbols.
The four tables are: a) Latin1 \-> PC,
The bitmap that corresponds to
s is found in the character ROM, and can be changed using
.BR setfont (8).
-.SS "Mouse Tracking"
+.SS Mouse tracking
The mouse tracking facility is intended to return
.BR xterm (1)-compatible
mouse status reports.
Again \fIx\fP and
\fIy\fP are the x and y coordinates of the mouse event.
The upper left corner is (1,1).
-.SS "Comparisons With Other Terminals"
+.SS Comparisons with other terminals
Many different terminal types are described, like the Linux console,
as being "VT100-compatible".
Here we discuss differences between the
DC3 (0x13, \fB^S\fP, XOFF) caused VT100 to ignore (and stop transmitting)
all codes except XOFF and XON.
.LP
-VT100-like DC1/DC3 processing may be enabled by the tty driver.
+VT100-like DC1/DC3 processing may be enabled by the terminal driver.
.LP
The
.BR xterm (1)
For a chronological overview,
.PP
.in +4n
-http://invisible-island.net/xterm/xterm.log.html
+.UR http://invisible-island.net\:/xterm\:/xterm.log.html
+.UE
.in
.PP
details changes to xterm.
The \fIvttest\fP program
.PP
.in +4n
-http://invisible-island.net/vttest/
+.UR http://invisible-island.net\:/vttest/
+.UE
.in
.PP
demonstrates many of these control sequences.
An older version of this document implied that Linux recognizes the
ECMA-48 control sequence for invisible text.
It is ignored.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR console (4),
.BR console_ioctl (4),
.BR charsets (7)
.\" Copyright (c) 1995 Jim Van Zandt <jrv@vanzandt.mv.com> and aeb
.\" Sun Feb 26 11:46:23 MET 1995
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified, Sun Feb 26 15:04:20 1995, faith@cs.unc.edu
.\" Modified, Thu Apr 20 22:08:17 1995, jrv@vanzandt.mv.com
.PP
The action of the following ioctls depends on the first byte in the struct
pointed to by \fIargp\fP, referred to here as the \fIsubcode\fP.
-These are legal only for the superuser or the owner of the current tty.
+These are legal only for the superuser or the owner of the current terminal.
.IP "\fBTIOCLINUX, subcode=0\fP"
Dump the screen.
Disappeared in 1.1.92. (With kernel 1.1.92 or later, read from
(\fICaution:\fP Powering down frequently will damage the monitor.)
(Since 1.1.76.)
-.SH "RETURN VALUE"
+.SH RETURN VALUE
On success, 0 is returned.
On error \-1 is returned, and \fIerrno\fP is set.
.SH ERRORS
on future versions of Linux.
Use POSIX functions.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR dumpkeys (1),
.BR kbd_mode (1),
.BR loadkeys (1),
.BR charsets (7),
.BR mapscrn (8),
.BR resizecons (8),
-.BR setfont (8),
+.BR setfont (8)
+
.IR /usr/include/linux/kd.h ,
.I /usr/include/linux/vt.h
.\" Copyright (c) 2009 Intel Corporation, Author Andi Kleen
.\" Description based on comments in arch/x86/kernel/cpuid.c
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH CPUID 4 2009-03-31 "Linux" "Linux Programmer's Manual"
.SH NAME
CPUID provides an interface for querying information about the x86 CPU.
This device is accessed by
-.B lseek (2)
+.BR lseek (2)
or
-.B pread (2)
+.BR pread (2)
to the appropriate CPUID level and reading in chunks of 16 bytes.
A larger read size means multiple reads of consecutive levels.
'\" t
.\" Copyright (c) 2000 lars brinkhoff <lars@nocrew.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified, Thu Jan 27 19:16:19 CET 2000, lars@nocrew.org
.\"
-.TH DSP56K 4 2000-03-01 "Linux" "Linux Programmer's Manual"
+.TH DSP56K 4 2012-08-05 "Linux" "Linux Programmer's Manual"
.SH NAME
dsp56k \- DSP56001 interface device
.SH SYNOPSIS
.\" .SH AUTHORS
.\" Fredrik Noring <noring@nocrew.org>, lars brinkhoff <lars@nocrew.org>,
.\" Tomas Berndtsson <tomas@nocrew.org>.
-.SH "SEE ALSO"
+.SH SEE ALSO
.IR linux/include/asm-m68k/dsp56k.h ,
.IR linux/drivers/char/dsp56k.c ,
-.IR http://dsp56k.nocrew.org/ ,
+.UR http://dsp56k.nocrew.org/
+.UE ,
DSP56000/DSP56001 Digital Signal Processor User's Manual
+++ /dev/null
-.so man7/epoll.7
-.\" FIXME . this link will eventually be removed (created Apr 2006)
.\" Copyright (c) 1993 Michael Haardt (michael@cantor.informatik.rwth-aachen.de)
.\" and 1994,1995 Alain Knaff (Alain.Knaff@imag.fr)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified, Sun Feb 26 15:00:02 1995, faith@cs.unc.edu
.\"
\fBfd\fP\fIn\fP\fBh1494\fP 1494K 83 18 2 72
\fBfd\fP\fIn\fP\fBh1600\fP 1600K 80 20 2 92
.TE
-.PP
3.5 inch double density device files:
.TS
lw(1i) l l l l l.
.\" .SH AUTHORS
.\" Alain Knaff (Alain.Knaff@imag.fr), David Niemi
.\" (niemidc@clark.net), Bill Broadhurst (bbroad@netcom.com).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR chown (1),
.BR floppycontrol (1),
.BR getfdprm (1),
+++ /dev/null
-.so man7/fifo.7
-.\" FIXME . this link will eventually be removed (created Apr 2006)
-.\" -*- nroff -*-
-.\"
.\" This man-page is Copyright (C) 1997 John S. Kallal
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" correction, aeb, 970825
.TH FULL 4 2007-11-24 "Linux" "Linux Programmer's Manual"
Seeks on \fI/dev/full\fP will always succeed.
.SH FILES
/dev/full
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mknod (1),
.BR null (4),
.BR zero (4)
+++ /dev/null
-.so man7/futex.7
-.\" FIXME . this link will eventually be removed (created Apr 2006)
.\" Copyright (c) 1993 Michael Haardt (michael@moria.de),
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Sat Jul 24 16:56:20 1993 by Rik Faith <faith@cs.unc.edu>
.\" Modified Mon Oct 21 21:38:51 1996 by Eric S. Raymond <esr@thyrsus.com>
.RE
.SH FILES
/dev/hd*
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR chown (1),
.BR mknod (1),
.BR sd (4),
.\" Copyright (C) 2011, Hewlett-Packard Development Company, L.P.
.\" Written by Stephen M. Cameron <scameron@beardog.cce.hp.com>
+.\"
+.\" %%%LICENSE_START(GPLv2_ONELINE)
.\" Licensed under GNU General Public License version 2 (GPLv2)
+.\" %%%LICENSE_END
.\"
.\" shorthand for double quote that works everywhere.
.ds q \N'34'
-.TH HPSA 4 2011-09-21 "Linux" "Linux Programmer's Manual"
+.TH HPSA 4 2012-08-05 "Linux" "Linux Programmer's Manual"
.SH NAME
hpsa \- HP Smart Array SCSI driver
.SH SYNOPSIS
and
.BR cciss (4)
should still be used for these.
-.SS Supported Hardware
+.SS Supported hardware
The
.B hpsa
driver supports the following Smart Array boards:
Smart Array P712m
Smart Array P711m
StorageWorks P1210m
-
.fi
-.SS Configuration Details
+.SS Configuration details
To configure HP Smart Array controllers,
use the HP Array Configuration Utility (either
.BR hpacuxe (8)
or the Offline ROM-based Configuration Utility (ORCA)
run from the Smart Array's option ROM at boot time.
.SH FILES
-.SS Device Nodes
+.SS Device nodes
Logical drives are accessed via the SCSI disk driver
.RB ( sd (4)),
tape drives via the SCSI tape driver
and
.IR /dev/sg* ,
respectively.
-.SS HPSA-Specific Host Attribute Files in /sys
+.SS HPSA-specific host attribute files in /sys
.TP
.I /sys/class/scsi_host/host*/rescan
This is a write-only attribute.
# \fBcat firmware_revision\fP
7.14
.fi
-
-.SS HPSA-Specific Disk Attribute Files in /sys
+.SS HPSA-specific disk attribute files in /sys
.TP
.I /sys/class/scsi_disk/c:b:t:l/device/unique_id
This attribute contains a 32 hex-digit unique ID for each logical drive.
.B hpsa
driver.
The data structures used by these ioctls are described in
-the kernel source file
+the Linux kernel source file
.IR include/linux/cciss_ioctl.h .
.TP
.BR CCISS_DEREGDISK ", " CCISS_REGNEWDISK ", " CCISS_REGNEWD
See
.I cciss_vol_status
at
-.I http://cciss.sf.net
+.UR http://cciss.sf.net
+.UE
for some examples.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cciss (4),
.BR sd (4),
.BR st (4),
.BR cciss_vol_status (8),
.BR hpacucli (8),
.BR hpacuxe (8),
-.IR http://cciss.sf.net ,
-and the Linux kernel source files
+
+.UR http://cciss.sf.net
+.UE ,
+and
.I Documentation/scsi/hpsa.txt
and
.I Documentation/ABI/testing/sysfs-bus-pci-devices-cciss
+in the Linux kernel source tree
.\" .SH AUTHORS
.\" Don Brace, Steve Cameron, Tom Lawler, Mike Miller, Scott Teel
.\" and probably some other people.
-.\" -*- nroff -*-
.\" This man-page is Copyright (C) 1997 John S. Kallal
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and author(s) of this work.
+.\" %%%LICENSE_END
.\"
.\" If the you wish to distribute versions of this work under other
.\" conditions than the above, please contact the author(s) at the following
.\"
.\"
.\"
-.SS "Boot-up Operation"
+.SS Boot-up operation
When booting up with
.BR initrd ,
the system boots as follows:
.\"
.\"
.\"
-.SS "Changing the Normal Root File System"
+.SS Changing the normal root file system
By default,
the kernel's settings
(e.g., set in the kernel file with
The use of
.I /proc/sys/kernel/real-root-dev
to change the root file system is obsolete.
-See the kernel source file
+See the Linux kernel source file
.I Documentation/initrd.txt
as well as
.BR pivot_root (2)
.\" The code for
.\" .BR initrd
.\" was added to the baseline Linux kernel in development version 1.3.73.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR chown (1),
.BR mknod (1),
.BR ram (4),
.BR freeramdisk (8),
.BR rdev (8)
-The documentation file
-.I initrd.txt
-in the kernel source package, the LILO documentation,
-the LOADLIN documentation, the SYSLINUX documentation.
+.I Documentation/initrd.txt
+in the Linux kernel source tree, the LILO documentation,
+the LOADLIN documentation, the SYSLINUX documentation
.\" Copyright (c) 1993 Michael Haardt (michael@moria.de),
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Sat Jul 24 16:57:14 1993 by Rik Faith (faith@cs.unc.edu)
.TH INTRO 4 2007-10-23 "Linux" "Linux Programmer's Manual"
.SH NAME
-intro \- Introduction to special files
+intro \- introduction to special files
.SH DESCRIPTION
Section 4 of the manual describes special files (devices).
.SH FILES
/dev/* \(em device files
.SH NOTES
-.SS Authors and Copyright Conditions
+.SS Authors and copyright conditions
Look at the header of the manual page source for the author(s) and copyright
conditions.
Note that these can be different from page to page!
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR standards (7)
.\" Copyright (c) Michael Haardt (michael@cantor.informatik.rwth-aachen.de),
.\" Sun Jan 15 19:16:33 1995
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified, Sun Feb 26 15:02:58 1995, faith@cs.unc.edu
.TH LP 4 1995-01-15 "Linux" "Linux Programmer's Manual"
.\" The interrupt code was written by Nigel Gamble.
.\" Alan Cox modularized it.
.\" LPCAREFUL, LPABORT, LPGETSTATUS were added by Chris Metcalf.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR chmod (1),
.BR chown (1),
.BR mknod (1),
.\" Copyright (c) 1993 Michael Haardt (michael@moria.de),
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Sat Jul 24 16:59:10 1993 by Rik Faith (faith@cs.unc.edu)
.TH MEM 4 1992-11-21 "Linux" "Linux Programmer's Manual"
.I /dev/kmem
.br
.I /dev/port
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR chown (1),
.BR mknod (1),
.BR ioperm (2)
'\" t
-.\"roff.\" Copyright
.\" This manpage is Copyright (C) 1996 Michael Haardt.
.\" Updates Nov 1998, Andries Brouwer
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.TH MOUSE 4 1996-02-10 "Linux" "Linux Programmer's Manual"
.SH NAME
mouse \- serial mouse interface
.TE
The first byte of a data packet can be used to synchronization purposes.
-.SS "Microsoft protocol"
+.SS Microsoft protocol
The \fBMicrosoft\fP protocol uses 1 start bit, 7 data bits, no parity
and one stop bit at the speed of 1200 bits/sec.
Data is sent to RxD in 3-byte packets.
2 0 dx5 dx4 dx3 dx2 dx1 dx0
3 0 dy5 dy4 dy3 dy2 dy1 dy0
.TE
-.SS "3-button Microsoft protocol"
+.SS 3-button Microsoft protocol
Original Microsoft mice only have two buttons.
However, there are some
three button mice which also use the Microsoft protocol.
movement and no buttons pressed.
(Thus, unlike for the other two buttons, the status of the middle
button is not reported in each packet.)
-.SS "Logitech protocol"
+.SS Logitech protocol
Logitech serial 3-button mice use a different extension of the
Microsoft protocol: when the middle button is up, the above 3-byte
packet is sent.
bit set).
In particular, a press of the middle button is reported
as 0,0,0,0x20 when no other buttons are down.
-.SS "Mousesystems protocol"
+.SS Mousesystems protocol
The \fBMousesystems\fP protocol uses 1 start bit, 8 data bits, no parity
and two stop bits at the speed of 1200 bits/sec.
Data is sent to RxD in
Bytes 4 and 5 describe the change that occurred since bytes 2 and 3
were transmitted.
-.SS "Sun protocol"
+.SS Sun protocol
The \fBSun\fP protocol is the 3-byte version of the above 5-byte
Mousesystems protocol: the last two bytes are not sent.
-.SS "MM protocol"
+.SS MM protocol
The \fBMM\fP protocol uses 1 start bit, 8 data bits, odd parity and one
stop bit at the speed of 1200 bits/sec.
Data is sent to RxD in 3-byte
.TP
.I /dev/mouse
A commonly used symlink pointing to a mouse device.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ttyS (4),
.BR gpm (8)
.\" Copyright (c) 2009 Intel Corporation, Author Andi Kleen
.\" Some sentences copied from comments in arch/x86/kernel/msr.c
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH MSR 4 2009-03-31 "Linux" "Linux Programmer's Manual"
.SH NAME
$ \fImodprobe msr\fP
.SH SEE ALSO
Intel Corporation Intel 64 and IA-32 Architectures
-Software Developer's Manual Volume 3B Appendix B
+Software Developer's Manual Volume 3B Appendix B,
for an overview of the Intel CPU MSRs.
.\" Copyright (c) 1993 Michael Haardt (michael@moria.de),
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Sat Jul 24 17:00:12 1993 by Rik Faith (faith@cs.unc.edu)
.TH NULL 4 2009-02-23 "Linux" "Linux Programmer's Manual"
.SH NOTES
If these devices are not writable and readable for all users, many
programs will act strangely.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR chown (1),
.BR mknod (1),
.BR full (4)
-.\" Hey Emacs! This file is -*- nroff -*- source.
.\" This man page was written by Jeremy Phelps <jphelps@notreached.net>.
.\" Notes added - aeb
+.\"
+.\" %%%LICENSE_START(FREELY_REDISTRIBUTABLE)
.\" Redistribute and revise at will.
+.\" %%%LICENSE_END
.\"
.TH PTS 4 2002-10-09 "Linux" "Linux Programmer's Manual"
.SH NAME
in which data read from the pseudoterminal master is sent across the network
to a client program that is connected to a terminal or terminal emulator.
.PP
-Psuedoterminals can also be used to send input to programs that normally
+Pseudoterminals can also be used to send input to programs that normally
refuse to read input from pipes (such as
.BR su (1),
and
and slave pseudoterminals
.IR /dev/ttyp0 ", ..."
and one needed lots of preallocated device nodes.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getpt (3),
.BR grantpt (3),
.BR ptsname (3),
.\" Copyright (c) 1993 Michael Haardt (michael@moria.de),
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Sat Jul 24 17:01:11 1993 by Rik Faith (faith@cs.unc.edu)
.TH RAM 4 1992-11-21 "Linux" "Linux Programmer's Manual"
.RE
.SH FILES
/dev/ram
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR chown (1),
.BR mknod (1),
.BR mount (8)
.\" Copyright (c) 1997 John S. Kallal (kallal@voicenet.com)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" Some changes by tytso and aeb.
.\"
.\" Add a Usage subsection that recommends most users to use
.\" /dev/urandom, and emphasizes parsimonious usage of /dev/random.
.\"
-.TH RANDOM 4 2010-08-29 "Linux" "Linux Programmer's Manual"
+.TH RANDOM 4 2013-03-15 "Linux" "Linux Programmer's Manual"
.SH NAME
random, urandom \- kernel random number source devices
+.SH SYNOPSIS
+#include <linux/random.h>
+.sp
+.BI "int ioctl(" fd ", RND" request ", " param ");"
.SH DESCRIPTION
The character special files \fI/dev/random\fP and
\fI/dev/urandom\fP (present since Linux 1.3.30)
exist.
If this is a concern in your application, use \fI/dev/random\fP
instead.
+.LP
+Writing to \fI/dev/random\fP or \fI/dev/urandom\fP will update the
+entropy pool with the data written, but this will not result in a
+higher entropy count.
+This means that it will impact the contents
+read from both files, but it will not make reads from
+\fI/dev/random\fP faster.
.SS Usage
If you are unsure about whether you should use
.IR /dev/random
random pool per invocation, or per reasonable reseed interval (not less
than one minute), that should be taken as a sign that its cryptography is
.I not
-skilfully implemented.
+skillfully implemented.
.SS Configuration
If your system does not have
\fI/dev/random\fP and \fI/dev/urandom\fP created already, they
[ \-r $poolfile ] && bytes=\`cat $poolfile\` || bytes=512
dd if=/dev/urandom of=$random_seed count=1 bs=$bytes
.fi
-.SS "/proc Interface"
+.SS /proc Interface
The files in the directory
.I /proc/sys/kernel/random
(present since 2.3.16) provide an additional interface to the
contain random strings like 6fd5a44b-35f4-4ad4-a9b9-6b9be13e1fe9.
The former is generated afresh for each read, the latter was
generated once.
+.SS ioctl(2) interface
+The following
+.BR ioctl (2)
+requests are defined on file descriptors connected to either \fI/dev/random\fP
+or \fI/dev/urandom\fP.
+All requests performed will interact with the input
+entropy pool impacting both \fI/dev/random\fP and \fI/dev/urandom\fP.
+The
+.B CAP_SYS_ADMIN
+capability is required for all requests except
+.BR RNDGETENTCNT .
+.TP
+.BR RNDGETENTCNT
+Retrieve the entropy count of the input pool, the contents will be the same
+as the
+.I entropy_avail
+file under proc.
+The result will be stored in the int pointed to by the argument.
+.TP
+.BR RNDADDTOENTCNT
+Increment or decrement the entropy count of the input pool
+by the value pointed to by the argument.
+.TP
+.BR RNDGETPOOL
+Removed in Linux 2.6.9.
+.TP
+.BR RNDADDENTROPY
+Add some additional entropy to the input pool,
+incrementing the entropy count.
+This differs from writing to \fI/dev/random\fP or \fI/dev/urandom\fP,
+which only adds some
+data but does not increment the entropy count.
+The following structure is used:
+.IP
+.IN +4n
+.NF
+struct rand_pool_info {
+ int entropy_count;
+ int buf_size;
+ __u32 buf[0];
+};
+.FI
+.IN
+.IP
+Here
+.I entropy_count
+is the value added to (or subtracted from) from the entropy count, and
+.I buf
+is the buffer of size
+.I buf_size
+which gets added to the entropy pool.
+.TP
+.BR RNDZAPENTCNT ", " RNDCLEARPOOL
+Zero the entropy count of all pools and add some system data (such as
+wall clock) to the pools.
.SH FILES
/dev/random
.br
.\" .SH AUTHOR
.\" The kernel's random number generator was written by
.\" Theodore Ts'o (tytso@athena.mit.edu).
-.SH "SEE ALSO"
-mknod (1)
+.SH SEE ALSO
+.BR mknod (1)
.br
RFC\ 1750, "Randomness Recommendations for Security"
.\" rtc.4
.\" Copyright 2002 Urs Thuermann (urs@isnogud.escape.de)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" $Id: rtc.4,v 1.4 2005/12/05 17:19:49 urs Exp $
.\"
Non-PC systems, such as embedded systems built around system-on-chip
processors, use other implementations.
They usually won't offer the same functionality as the RTC from a PC/AT.
-.SS RTC vs System Clock
+.SS RTC vs system clock
RTCs should not be confused with the system clock, which is
a software clock maintained by the kernel and used to implement
.BR gettimeofday (2)
scenarios like periodic alarms at fifteen minutes after every hour,
or on the first day of each month.
Such usage is nonportable;
-portable user space code only expects a single alarm interrupt, and
+portable user-space code only expects a single alarm interrupt, and
will either disable or reinitialize the alarm after receiving it.
Some RTCs support periodic interrupts with periods that are multiples
nonvolatile memory;
and other hardware
capabilities that are not currently exposed by this API.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR date (1),
.BR adjtimex (2),
.BR gettimeofday (2),
.BR time (2),
.BR gmtime (3),
.BR time (7),
-.BR hwclock (8),
-/usr/src/linux/Documentation/rtc.txt
+.BR hwclock (8)
+
+.I Documentation/rtc.txt
+in the Linux kernel source tree
.\" sd.4
.\" Copyright 1992 Rickard E. Faith (faith@cs.unc.edu)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH SD 4 2012-05-03 "Linux" "Linux Programmer's Manual"
.SH NAME
-sd \- Driver for SCSI Disk Drives
+sd \- driver for SCSI disk drives
.SH SYNOPSIS
.nf
.BR "#include <linux/hdreg.h> " "/* for HDIO_GETGEO */"
.\" (C)Copyright 1999-2003 Marvell(R) -- linux@syskonnect.de
.\" sk98lin.4 1.1 2003/12/17 10:03:18
-.\" This manpage can be viewed using `groff -Tascii -man sk98lin.4 | less`
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
+.\"
+.\" This manpage can be viewed using `groff -Tascii -man sk98lin.4 | less`
.\"
-.TH SK98LIN 4 2012-05-10 "Linux" "Linux Programmer's Manual"
+.TH SK98LIN 4 2012-08-05 "Linux" "Linux Programmer's Manual"
.SH NAME
sk98lin \- Marvell/SysKonnect Gigabit Ethernet driver v6.21
.SH SYNOPSIS
which can be found on the Internet:
.IR VLAN \c
-: http://www.candelatech.com/~greear/vlan.html
+:
+.UR http://www.candelatech.com\:/~greear\:/vlan.html
+.UE
.br
.I Link
.IR Aggregation \c
-: http://www.st.rim.or.jp/~yumo
+:
+.UR http://www.st.rim.or.jp\:/~yumo
+.UE
.br
Note that Marvell/SysKonnect does not offer any support for these
.\" Ralph Roesler \(em rroesler@syskonnect.de
.\" .br
.\" Mirko Lindner \(em mlindner@syskonnect.de
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ifconfig (8),
.BR insmod (8),
.BR modprobe (8)
.\" Copyright 1995 Robert K. Nichols (Robert.K.Nichols@att.com)
.\" Copyright 1999-2005 Kai Mäkisara (Kai.Makisara@kolumbus.fi)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.TH ST 4 2010-09-04 "Linux" "Linux Programmer's Manual"
.SH NAME
st \- SCSI tape device
Starting from kernel 2.6.2, the driver exports in the sysfs directory
.I /sys/class/scsi_tape
the attached devices and some parameters assigned to the devices.
-.SS "Data Transfer"
+.SS Data transfer
The driver supports operation in both fixed-block mode and
variable-block mode (if supported by the drive).
In fixed-block mode the drive
driver.
The definitions below are from
.IR /usr/include/linux/mtio.h :
-.SS "MTIOCTOP \(em Perform a tape operation"
+.SS MTIOCTOP \(em perform a tape operation
.PP
This request takes an argument of type
.IR "(struct mtop *)" .
all write operations must be for a multiple of the block size.
This option must be set false to write reliable multivolume archives.
.TP
-.TP
.BR MT_ST_ASYNC_WRITES " (Default: true)"
When this option is true, write operations return immediately without
waiting for the data to be transferred to the drive if the data fits
the cleaning request.
If the pattern is nonzero, the pattern must match
the masked sense data byte.
-.SS "MTIOCGET \(em Get status"
+.SS MTIOCGET \(em get status
.PP
This request takes an argument of type
.IR "(struct mtget *)" .
.BR MTBSS ,
or
.BR MTSEEK ).
-.SS "MTIOCPOS \(em Get tape position"
+.SS MTIOCPOS \(em get tape position
.PP
This request takes an argument of type
.I "(struct mtpos *)"
};
.fi
.in
-.SH "RETURN VALUE"
+.SH RETURN VALUE
.TP 14
.TP
.B EACCES
.\" .br
.\" Copyright \(co 1999-2005 Kai M\(:akisara.
.\" .PP
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\" Additional permissions are contained in the header of the source file.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mt (1)
.PP
The file
.I drivers/scsi/README.st
or
.I Documentation/scsi/st.txt
-(kernel >= 2.6) in the kernel sources contains
+(kernel >= 2.6) in the Linux kernel source tree contains
the most recent information about the driver and its configuration
-possibilities.
+possibilities
.\" Copyright (c) 1993 Michael Haardt (michael@moria.de),
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified 1993-07-24 by Rik Faith (faith@cs.unc.edu)
.\" Modified 2003-04-07 by Michael Kerrisk
to detach itself.
.SH FILES
/dev/tty
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR chown (1),
.BR mknod (1),
.BR ioctl (2),
.\" Copyright (c) 1993 Michael Haardt (michael@moria.de),
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Sat Jul 24 17:03:24 1993 by Rik Faith (faith@cs.unc.edu)
.TH TTYS 4 1992-12-19 "Linux" "Linux Programmer's Manual"
.RE
.SH FILES
/dev/ttyS[0\-3]
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR chown (1),
.BR mknod (1),
.BR tty (4),
.\" Copyright 2002 Walter Harms <walter.harms@informatik.uni-oldenburg.de>
.\" and Andries Brouwer <aeb@cwi.nl>.
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL.
+.\" %%%LICENSE_END
.\"
.TH TTY_IOCTL 4 2008-10-29 "Linux" "Linux Programmer's Manual"
.SH NAME
Use the POSIX interface described in
.BR termios (3)
whenever possible.
-.SS "Get and Set Terminal Attributes"
+.SS Get and set terminal attributes
.TP
.BI "TCGETS struct termios *" argp
Equivalent to
.BI "TCSETAW const struct termio *" argp
.TP
.BI "TCSETAF const struct termio *" argp
-.SS "Locking the termios structure"
+.SS Locking the termios structure
The
.I termios
structure of a terminal can be locked.
Only root (more precisely: a process with the
.BR CAP_SYS_ADMIN
capability) can do this.
-.SS "Get and Set Window Size"
+.SS Get and set window size
Window sizes are kept in the kernel, but not used by the kernel
(except in the case of virtual consoles, where the kernel will
update the window size when the size of the virtual console changes,
.B SIGWINCH
signal is sent to the
foreground process group.
-.SS "Sending a Break"
+.SS Sending a break
.TP
.BI "TCSBRK int " arg
Equivalent to
.TP
.B "TIOCCBRK void"
Turn break off, that is, stop sending zero bits.
-.SS "Software flow control"
+.SS Software flow control
.TP
.BI "TCXONC int " arg
Equivalent to
.BR TCOON ,
.BR TCIOFF ,
.BR TCION .
-.SS "Buffer count and flushing"
+.SS Buffer count and flushing
.TP
.BI "FIONREAD int *" argp
Get the number of bytes in the input buffer.
.BR TCIFLUSH ,
.BR TCOFLUSH ,
.BR TCIOFLUSH .
-.SS "Faking input"
+.SS Faking input
.TP
.BI "TIOCSTI const char *" argp
Insert the given byte in the input queue.
-.SS "Redirecting console output"
+.SS Redirecting console output
.TP
.B "TIOCCONS void"
Redirect output that would have gone to
.I /dev/console
or
.IR /dev/tty0 .
-.SS "Controlling terminal"
+.SS Controlling terminal
.TP
.BI "TIOCSCTTY int " arg
Make the given terminal the controlling terminal of the calling process.
.B SIGCONT
to the foreground process group
and all processes in the current session lose their controlling terminal.
-.SS "Process group and session ID"
+.SS Process group and session ID
.TP
.BI "TIOCGPGRP pid_t *" argp
When successful, equivalent to
in case the terminal is not a master pseudoterminal
and not our controlling terminal.
Strange.
-.SS "Exclusive mode"
+.SS Exclusive mode
.TP
.B "TIOCEXCL void"
Put the terminal into exclusive mode.
.TP
.B "TIOCNXCL void"
Disable exclusive mode.
-.SS "Line discipline"
+.SS Line discipline
.TP
.BI "TIOCGETD int *" argp
Get the line discipline of the terminal.
.TP
.BI "TIOCSETD const int *" argp
Set the line discipline of the terminal.
-.SS "Pseudoterminal ioctls"
+.SS Pseudoterminal ioctls
.TP
.BI "TIOCPKT const int *" argp
Enable (when
.BR TIOCUCNTL ,
.B TIOCREMOTE
have not been implemented under Linux.
-.SS "Modem control"
+.SS Modem control
.TP
.BI "TIOCMGET int *" argp
get the status of modem bits.
TIOCM_RI see TIOCM_RNG
TIOCM_DSR DSR (data set ready)
.fi
-.SS "Marking a line as local"
+.SS Marking a line as local
.TP
.BI "TIOCGSOFTCAR int *" argp
("Get software carrier flag")
is set, the line behaves as if DCD is always asserted.
The software carrier flag is usually turned on for local devices,
and is off for lines with modems.
-.SS "Linux-specific"
+.SS Linux-specific
For the
.B TIOCLINUX
ioctl, see
.BR console_ioctl (4).
-.SS "Kernel debugging"
+.SS Kernel debugging
.B "#include <linux/tty.h>"
.TP
.BI "TIOCTTYGSTRUCT struct tty_struct *" argp
.\" .TP
.\" .BI "TIOCSSERIAL const struct serial_struct *" argp
.\" Set serial info.
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The
.BR ioctl (2)
system call returns 0 on success.
close(fd);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ioctl (2),
.BR termios (3),
.BR console_ioctl (4),
.\" Copyright (c) 1995 James R. Van Zandt <jrv@vanzandt.mv.com>
.\" Sat Feb 18 09:11:07 EST 1995
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified, Sun Feb 26 15:08:05 1995, faith@cs.unc.edu
.\" 2007-12-17, Samuel Thibault <samuel.thibault@ens-lyon.org>:
exit(EXIT_SUCCESS);
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR console (4),
.BR tty (4),
.BR ttyS (4),
.\" Jean II - HPLB - '96
.\" wavelan.c.4
.\"
-.\" Provenance of this page is unclear. Licensed under the GPL,
+.\" Provenance of this page is unclear.
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
+.\" Licensed under the GPL,
.\" after inquiries with Jean Tourrilhes and Bruce Janson
.\" (mtk, July 2006)
+.\" %%%LICENSE_END
.\"
.TH WAVELAN 4 1996-10-22 "Linux" "Linux Programmer's Manual"
.SH NAME
Set the list of name to be used for each wavelan cards device (name
used by
.BR ifconfig (8)).
-.SS "Wireless Extensions"
+.SS Wireless extensions
Use
.BR iwconfig (8)
to manipulate wireless extensions.
and
.I misc discarded packet
counters are not implemented.
-.SS "Private Ioctl"
+.SS Private ioctl
You may use
.BR iwpriv (8)
to manipulate private ioctls.
-.SS Quality and Level threshold
+.SS Quality and level threshold
Enable you the define the quality and level threshold used by the
modem (packet below that level are discarded).
.SS Histogram
intervals.
This distribution might be used to calculate the mean value
and standard deviation of the signal level.
-.SS "Specific Notes"
+.SS Specific notes
This driver will fail to detect some
.B non-NCR/ATT&T/Lucent
Wavelan cards.
.\"
.\" SEE ALSO part
.\"
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR wavelan_cs (4),
.BR ifconfig (8),
.BR insmod (8),
.\" Copyright (C) 2008, Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH ACCT 5 2008-06-15 "Linux" "Linux Programmer's Manual"
.SH NAME
fields measure time in "clock ticks"; divide these values by
.I sysconf(_SC_CLK_TCK)
to convert them to seconds.
-.SS Version 3 Accounting File Format
+.SS Version 3 accounting file format
Since kernel 2.6.8,
an optional alternative version of the accounting file can be produced
if the
comp_t ac_swaps; /* Number of swaps (unused) */
char ac_comm[ACCT_COMM]; /* Command name */
};
-
.fi
.in
.SH VERSIONS
.BR proc (5),
defines settings that control the behavior of process accounting
when disk space runs low.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR lastcomm (1),
.BR acct (2),
.BR accton (8),
-.\" Hey emacs, this is -*- nroff -*-
-.\"
.\" This file is part of locale(1) which displays the settings of the
.\" current locale.
.\" Copyright (C) 1994 Jochen Hein (Hein@Student.TU-Clausthal.de)
.\"
+.\" %%%LICENSE_START(GPLv2+_SW_3_PARA)
.\" This program is free software; you can redistribute it and/or modify
.\" it under the terms of the GNU General Public License as published by
.\" the Free Software Foundation; either version 2 of the License, or
.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
.\" GNU General Public License for more details.
.\"
-.\" You should have received a copy of the GNU General Public License
-.\" along with this program; if not, write to the Free Software
-.\" Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111, USA.
+.\" You should have received a copy of the GNU General Public
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.TH CHARMAP 5 1994-11-28 "" "Linux User Manual"
.SH NAME
.PP
The last line in a charmap-definition file must contain
.B END CHARMAP.
-.SS "Symbolic Names"
+.SS Symbolic names
A
.B symbolic name
for a character contains only characters of the
represents the symbolic name
.B "\\\\>"
enclosed in angle brackets.
-.SS "Character Encoding"
+.SS Character encoding
The
encoding may be in each of the following three forms:
.TP
.I /usr/share/i18n/charmaps/*
.\" .SH AUTHOR
.\" Jochen Hein (jochen.hein@delphi.central.de)
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.2.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR locale (1),
.BR localedef (1),
.BR localeconv (3),
+++ /dev/null
-.so man7/complex.7
-.\" FIXME . this link will eventually be removed (created Apr 2006)
.\" Copyright (c) 2006, 2008 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH CORE 5 2012-01-17 "Linux" "Linux Programmer's Manual"
+.TH CORE 5 2013-02-25 "Linux" "Linux Programmer's Manual"
.SH NAME
core \- core dump file
.SH DESCRIPTION
.\" and PR_SET_DUMPABLE to this page?
file in
.BR proc (5).)
+.IP *
+(Since Linux 3.7)
+.\" commit 046d662f481830e652ac34cd112249adde16452a
+The kernel was configured without the
+.BR CONFIG_COREDUMP
+option.
+.PP
+In addition,
+a core dump may exclude part of the address space of the process if the
+.BR madvise (2)
+.B MADV_DONTDUMP
+flag was employed.
.SS Naming of core dump files
By default, a core dump file is named
.IR core ,
If this file contains a nonzero value, then the core dump file includes
the process ID in a name of the form
.IR core.PID .
+
+Since Linux 3.6,
+.\" 9520628e8ceb69fa9a4aee6b57f22675d9e1b709
+if
+.I /proc/sys/fs/suid_dumpable
+is set to 2 ("suidsafe"), the pattern must be either an absolute pathname
+(starting with a leading \(aq/\(aq character) or a pipe, as defined below.
.SS Piping core dumps to a program
Since kernel 2.6.19, Linux supports an alternate syntax for the
.I /proc/sys/kernel/core_pattern
.\" threads in a process share the same PID (as POSIX.1 requires).
.\" Probably the behavior is maintained so that applications using
.\" LinuxThreads continue appending the PID (the kernel has no easy
-.\" way of telling which threading implementation the userspace
+.\" way of telling which threading implementation the user-space
.\" application is using). -- mtk, April 2006
.SH EXAMPLE
The program below can be used to demonstrate the use of the
-.\"
.\" manpage for /etc/dir_colors, config file for dircolors(1)
.\" extracted from color-ls 3.12.0.3 dircolors(1) manpage
.\"
+.\" %%%LICENSE_START(LDPv1)
.\" This file may be copied under the conditions described
.\" in the LDP GENERAL PUBLIC LICENSE, Version 1, September 1998
.\" that should have been distributed together with this file.
+.\" %%%LICENSE_END
.\"
.\" Modified Sat Dec 22 22:25:33 2001 by Martin Schulze <joey@infodrom.org>
.\"
.B emacs
backup files.
This form should be considered obsolete.
-.SS "ISO 6429 (ANSI) Color Sequences"
+.SS ISO 6429 (ANSI) color sequences
Most color-capable ASCII terminals today use ISO 6429 (ANSI) color sequences,
and many common terminals without color capability, including
.B xterm
.B FILE
codes to the numerical codes for your normal foreground and background
colors.
-.SS "Other Terminal Types (Advanced Configuration)"
+.SS Other terminal types (advanced configuration)
If you have a color-capable (or otherwise highlighting) terminal (or
printer!) which uses a different set of codes, you can still generate
a suitable setup.
A different
.B ENDCODE
can, however, be specified, which would have the same effect.
-.SS "Escape Sequences"
+.SS Escape sequences
To specify control- or blank characters in the color sequences or
filename extensions, either C-style \e-escaped notation or
.BR stty \-style
The default
.B ENDCODE
is undefined.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR dircolors (1),
.BR ls (1),
.BR stty (1),
.\"Copyright (c) 1999 Jeroen Ruigrok van der Werven
.\"All rights reserved.
.\"
+.\" %%%LICENSE_START(PERMISSIVE_MISC)
.\"Redistribution and use in source and binary forms, with or without
.\"modification, are permitted provided that the following conditions
.\"are met:
.\"LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\"OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\"SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" $FreeBSD: src/share/man/man5/elf.5,v 1.21 2001/10/01 16:09:23 ru Exp $
.\"
It may be zero.
.TP
.IR p_flags
-This member holds a bitmask of flags relevant to the segment:
+This member holds a bit mask of flags relevant to the segment:
.\" .Bl -tag -width "PF_X" -compact
.RS 12
.TP
When the text refers to a relocation
entry's relocation type or symbol table index, it means the result of
applying
-.BR ELF_[32|64]_R_TYPE
+.BR ELF[32|64]_R_TYPE
or
.BR ELF[32|64]_R_SYM ,
respectively, to the entry's
+++ /dev/null
-.so man7/environ.7
-.\" FIXME . this link will eventually be removed (created Apr 2006)
.\" Copyright 1996 Daniel Quinlan (Daniel.Quinlan@linux.org)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 2007-12-14 mtk Added Reiserfs, XFS, JFS.
.\"
-.TH FILESYSTEMS 5 2010-05-24 "Linux" "Linux Programmer's Manual"
+.TH FILESYSTEMS 5 2012-08-05 "Linux" "Linux Programmer's Manual"
.nh
.SH NAME
filesystems \- Linux file-system types: minix, ext, ext2, ext3, ext4, Reiserfs,
.B smb
fs, you need a special mount program, which can be found in the ksmbfs
package, found at
-.IR ftp://sunsite.unc.edu/pub/Linux/system/Filesystems/smbfs .
+.UR ftp://sunsite.unc.edu\:/pub\:/Linux\:/system\:/Filesystems\:/smbfs
+.UE .
.TP
.B ncpfs
is a network file system that supports the NCP protocol, used by
To use
.BR ncpfs ,
you need special programs, which can be found at
-.IR ftp://linux01.gwdg.de/pub/ncpfs .
-.SH "SEE ALSO"
+.UR ftp://linux01.gwdg.de\:/pub\:/ncpfs
+.UE .
+.SH SEE ALSO
.BR proc (5),
.BR fsck (8),
.BR mkfs (8),
.\" Copyright (c) 2000 Christoph J. Thompson <obituary@linuxbe.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_MISC)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
+.\"
.TH FTPUSERS 5 2000-08-27 "Linux" "Linux Programmer's Manual"
.SH NAME
ftpusers \- list of users that may not log in via the FTP daemon
Lines starting with a # are ignored.
.SH FILES
.I /etc/ftpusers
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR passwd (5),
.BR proftpd (8),
.BR wuftpd (8)
--- /dev/null
+.\" Copyright (C) 2006 Red Hat, Inc. All rights reserved.
+.\" Author: Ulrich Drepper <drepper@redhat.com>
+.\"
+.\" %%%LICENSE_START(GPLv2_MISC)
+.\" This copyrighted material is made available to anyone wishing to use,
+.\" modify, copy, or redistribute it subject to the terms and conditions of the
+.\" GNU General Public License v.2.
+.\"
+.\" This program is distributed in the hope that it will be useful, but WITHOUT
+.\" ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
+.\" FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
+.\" more details.
+.\"
+.\" You should have received a copy of the GNU General Public
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
+.\"
+.TH GAI.CONF 5 2013-02-13 "Linux" "Linux Programmer's Manual"
+.SH NAME
+gai.conf \- getaddrinfo(3) configuration file
+.SH DESCRIPTION
+A call to
+.BR getaddrinfo (3)
+might return multiple answers.
+According to RFC\ 3484 these answers must be sorted so that
+the answer with the highest success rate is first in the list.
+The RFC provides an algorithm for the sorting.
+The static rules are not always adequate, though.
+For this reason,
+the RFC also requires that system administrators should have the possibility
+to dynamically change the sorting.
+For the glibc implementation, this can be achieved with the
+.IR /etc/gai.conf
+file.
+.PP
+Each line in the configuration file consists of a keyword and its parameters.
+White spaces in any place are ignored.
+Lines starting with \(aq#\(aq are comments and are ignored.
+.PP
+The keywords currently recognized are:
+.TP
+\fBlabel\fR \fInetmask\fR \fIprecedence\fR
+The value is added to the label table used in the RFC\ 3484 sorting.
+If any \fBlabel\fR definition is present in the configuration file
+is present, the default table is not used.
+All the label definitions
+of the default table which are to be maintained have to be duplicated.
+Following the keyword,
+the line has to contain a network mask and a label value.
+.TP
+\fBprecedence\fR \fInetmask\fR \fIprecedence\fR
+This keyword is similar to \fBlabel\fR, but instead the value is added
+to the precedence table as specified in RFC\ 3484.
+Once again, the
+presence of a single \fBprecedence\fR line in the configuration file
+causes the default table to not be used.
+.TP
+\fBreload\fR <\fByes\fR|\fBno\fR>
+This keyword controls whether a process checks whether the configuration
+file has been changed since the last time it was read.
+If the value is
+"\fByes\fR" the file is re-read.
+This might cause problems in multithreaded
+applications and is generally a bad idea.
+The default is "\fBno\fR".
+.TP
+\fBscopev4\fR \fImask\fR \fIvalue\fR
+Add another rule to the RFC\ 3484 scope table for IPv4 address.
+By default, the scope IDs described in section 3.2 in RFC\ 3438 are used.
+Changing these defaults should hardly ever be necessary.
+.SH FILES
+\fI/etc/gai.conf\fR
+.SH EXAMPLE
+The default table according to RFC\ 3484 would be specified with the
+following configuration file:
+
+.nf
+label ::1/128 0
+label ::/0 1
+label 2002::/16 2
+label ::/96 3
+label ::ffff:0:0/96 4
+precedence ::1/128 50
+precedence ::/0 40
+precedence 2002::/16 30
+precedence ::/96 20
+precedence ::ffff:0:0/96 10
+.fi
+.\" .SH AUTHOR
+.\" Ulrich Drepper <drepper@redhat.com>
+.\"
+.SH SEE ALSO
+.BR getaddrinfo(3),
+RFC\ 3484
.\" Copyright (c) 1993 Michael Haardt (michael@moria.de),
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Sat Jul 24 17:06:03 1993 by Rik Faith (faith@cs.unc.edu)
.TH GROUP 5 2010-10-21 "Linux" "Linux Programmer's Manual"
man page says: No-one seems to keep
.I /etc/group
up-to-date.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR login (1),
.BR newgrp (1),
.BR getgrent (3),
.\" Copyright (c) 1997 Martin Schulze (joey@infodrom.north.de)
+.\" Much of the text is copied from the manpage of resolv+(8).
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139,
-.\" USA.
-.\"
-.\" Much of the text is copied from the manpage of resolv+(8).
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 2003-08-23 Martin Schulze <joey@infodrom.org> Updated according to glibc 2.3.2
.TH HOST.CONF 5 2003-08-23 "Linux" "Linux System Administration"
can take arguments like
.IR off ", " nowarn " and " warn .
Line comments can appear anywhere and not only at the beginning of a line.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR gethostbyname (3),
.BR hostname (7),
.BR named (8),
-.\" Hey, Emacs! This is an -*- nroff -*- source file.
.\" Copyright (c) 2000 Manoj Srivastava <srivasta@debian.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Minor polishing, aeb
.\" Modified, 2002-06-16, Mike Coleman
.SH NOTES
Modifications to this file normally take effect immediately,
except in cases where the file is cached by applications.
-.SS "Historical Notes"
+.SS Historical notes
RFC\ 952 gave the original format for the host table, though it has
since changed.
146.82.138.7 master.debian.org master
209.237.226.90 www.opensource.org
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR hostname (1),
.BR resolver (3),
.BR resolver (5),
.BR hostname (7),
-.BR named (8),
+.BR named (8)
+
Internet RFC\ 952
.\" .SH AUTHOR
.\" This manual page was written by Manoj Srivastava <srivasta@debian.org>,
.\" Copyright (c) 1995 Peter Tobias <tobias@et-inf.fho-emden.de>
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" This file may be distributed under the GNU General Public License.
+.\" %%%LICENSE_END
.TH HOSTS.EQUIV 5 2003-08-24 "Linux" "Linux Programmer's Manual"
.SH NAME
/etc/hosts.equiv \- list of hosts and users that are granted "trusted"
is added to the auth component line in your PAM file for
the particular service
.RB "(e.g., " rlogin ).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR rhosts (5),
.BR rlogind (8),
.BR rshd (8)
.\" Copyright (c) 1993 Michael Haardt (michael@moria.de),
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Sat Jul 24 17:06:52 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified Sun Jan 14 00:34:09 1996 by Andries Brouwer (aeb@cwi.nl)
.TH INTRO 5 2007-10-23 "Linux" "Linux Programmer's Manual"
.SH NAME
-intro \- Introduction to file formats
+intro \- introduction to file formats
.SH DESCRIPTION
Section 5 of the manual describes various file formats and protocols,
and the corresponding C structures, if any.
.SH NOTES
-.SS Authors and Copyright Conditions
+.SS Authors and copyright conditions
Look at the header of the manual page source for the author(s) and copyright
conditions.
Note that these can be different from page to page!
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR standards (7)
.\" Copyright (c) 1993 Michael Haardt (michael@moria.de),
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Sun Jul 25 11:06:22 1993 by Rik Faith <faith@cs.unc.edu>
.\" Modified Mon Oct 21 17:47:19 EDT 1996 by Eric S. Raymond <esr@thyrsus.com>
program employed on the system.
.SH FILES
/etc/issue
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR motd (5),
.BR agetty (8),
.BR mingetty (8)
-.\" Hey Emacs, this is -*- nroff -*-
-.\"
-.\" This file is part of locale(1) which displays the settings of the
-.\" current locale.
.\" Copyright (C) 1994 Jochen Hein (Hein@Student.TU-Clausthal.de)
.\" Copyright (C) 2008 Petr Baudis (pasky@suse.cz)
.\"
+.\" %%%LICENSE_START(GPLv2+_SW_3_PARA)
.\" This program is free software; you can redistribute it and/or modify
.\" it under the terms of the GNU General Public License as published by
.\" the Free Software Foundation; either version 2 of the License, or
.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
.\" GNU General Public License for more details.
.\"
-.\" You should have received a copy of the GNU General Public License
-.\" along with this program; if not, write to the Free Software
-.\" Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111, USA.
+.\" You should have received a copy of the GNU General Public
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 2008-06-17 Petr Baudis <pasky@suse.cz>
.\" LC_TIME: Describe first_weekday and first_workday
.\"
.TH LOCALE 5 2008-06-17 "Linux" "Linux User Manual"
.SH NAME
-locale \- Describes a locale definition file
+locale \- describes a locale definition file
.SH DESCRIPTION
The
.B locale
\(em database for the current locale setting of that category
.br
/usr/lib/nls/charmap/* \(em charmap-files
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.2, ISO/IEC 14652.
.SH BUGS
This manual page isn't complete.
.\" .SH AUTHOR
.\" Jochen Hein (Hein@Student.TU-Clausthal.de)
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR locale (1),
.BR localedef (1),
.BR localeconv (3),
.\" Copyright (c) 1993 Michael Haardt (michael@moria.de),
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Sat Jul 24 17:08:16 1993 by Rik Faith <faith@cs.unc.edu>
.\" Modified Mon Oct 21 17:47:19 EDT 1996 by Eric S. Raymond <esr@thyrsus.com>
space than mail to all users).
.SH FILES
/etc/motd
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR login (1),
.BR issue (5)
.\" Copyright (c) 2001 Martin Schulze <joey@infodrom.org>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
+.\"
.\" 2008-09-04, mtk, taken from Debian downstream, with a few light edits
.\"
.TH NETWORKS 5 2008-09-04 "GNU/Linux" "Linux System Administration"
are ignored by library functions that process the file.
The field descriptions are:
-
.TP
.I name
The symbolic name for the network.
.TP
.I /etc/networks
The networks definition file.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getnetbyaddr (3),
.BR getnetbyname (3),
.BR getnetent (3),
.\" Copyright (c) 1993 Michael Haardt (michael@moria.de),
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Sun Jul 25 11:06:34 1993 by Rik Faith (faith@cs.unc.edu)
.\" Corrected Mon Oct 21 17:47:19 EDT 1996 by Eric S. Raymond (esr@thyrsus.com)
be shown the contents of this file and their logins will be refused.
.SH FILES
/etc/nologin
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR login (1),
.BR shutdown (8)
-.\" -*- nroff -*-
.\" Copyright (c) 1999, 2000 SuSE GmbH Nuernberg, Germany
.\" Author: Thorsten Kukuk <kukuk@suse.de>
.\"
+.\" %%%LICENSE_START(GPLv2+_SW_3_PARA)
.\" This program is free software; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of the
.\" General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this program; see the file COPYING. If not,
-.\" write to the Free Software Foundation, Inc., 59 Temple Place - Suite 330,
-.\" Boston, MA 02111-1307, USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
-.TH NSCD.CONF 5 1999-10-01 "GNU" "Linux Programmer's Manual"
+.TH NSCD.CONF 5 2013-02-12 "GNU" "Linux Programmer's Manual"
.SH NAME
/etc/nscd.conf \- name service cache daemon configuration file
.SH DESCRIPTION
comment; following characters, up to the end of the line,
are not interpreted by nscd.
-Valid services are \fIpasswd\fP, \fIgroup\fP, or \fIhosts\fP.
+Valid services are \fIpasswd\fP, \fIgroup\fP, \fIhosts\fP, \fIservices\fP
+or \fInetgroup\fP.
.B logfile
.I debug-file-name
.I value
.RS
Sets the desired debug level.
+The default is 0.
.RE
.B threads
At least five threads will always be created.
.RE
+.B max-threads
+.I number
+.RS
+Specifies the maximum number of threads.
+The default is 32.
+.RE
+
.B server-user
.I user
.RS
option is ignored.
.RE
+.B stat-user
+.I user
+.RS
+Specifies the user who is allowed to request statistics.
+.RE
+
+.B reload-count
+unlimited |
+.I number
+.RS
+Limit on the number of times a cached entry gets reloaded without being used
+before it gets removed.
+The default is 5.
+.RE
+
+.B paranoia
+.I <yes|no>
+.RS
+Enabling paranoia mode causes nscd to restart itself periodically.
+The default is no.
+.RE
+
+.B restart-interval
+.I time
+.RS
+Sets the restart interval to
+.I time
+seconds
+if periodic restart is enabled by enabling
+.B paranoia
+mode.
+The default is 3600.
+.RE
+
.B enable-cache
.I service
.I <yes|no>
Enables or disables the specified
.I service
cache.
+The default is no.
.RE
.B positive-time-to-live
is in seconds.
Can result in significant performance improvements if there
are several files owned by UIDs (user IDs) not in system databases (for
-example untarring the linux kernel sources as root); should be kept small
+example untarring the Linux kernel sources as root); should be kept small
to reduce cache coherency problems.
.RE
This is the internal hash table size,
.I value
should remain a prime number for optimum efficiency.
+The default is 211.
.RE
.B check-files
The files are
.IR /etc/passwd ,
.IR /etc/group ,
+.IR /etc/hosts ,
+.I /etc/services
and
-.IR /etc/hosts .
-.RE
-
-.B max-threads
-.I threads
-.RS
-Specifies the maximum number of threads to be started.
-.RE
-
-.B stat-user
-.I username
-.RS
-Specifies the user who is allowed to request statistics.
-.RE
-
-.B reload-count
-unlimited |
-.I number
-.RS
-Limit on the number of times a cached entry gets reloaded without being used
-before it gets removed.
-The default is 5.
-.RE
-
-.B paranoia
-.I <yes|no>
-.RS
-Enabling paranoia mode causes nscd to restart itself periodically.
-.RE
-
-.B restart-interval
-.I time
-.RS
-Sets the restart interval to
-.I time
-seconds
-if periodic restart is enabled by enabling
-.B paranoia
-mode.
+.IR /etc/netgroup .
+The default is yes.
.RE
.B persistent
over server restarts; useful when
.B paranoia
mode is set.
+The default is no.
.RE
.B shared
is shared with the clients so
that they can directly search in them instead of having to ask the
daemon over the socket each time a lookup is performed.
+The default is no.
+.RE
+
+.B max-db-size
+.I service
+.I bytes
+.RS
+The maximum allowable size, in bytes, of the database files for the
+.IR service .
+The default is 33554432.
+.RE
+
+.B auto-propagate
+.I service
+.I <yes|no>
+.RS
+When set to
+.IR no
+for
+.I passwd
+or
+.I group
+service, then the
+.I .byname
+requests are not added to
+.IR passwd.byuid
+or
+.I group.bygid
+cache.
+This can help with tables containing multiple records for the same ID.
+The default is yes.
+This option is valid only for services
+.IR passwd
+and
+.IR group .
.RE
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR nscd (8)
.\" .SH AUTHOR
.\" .B nscd
--- /dev/null
+.\" Copyright (C) 2006 Red Hat, Inc. All rights reserved.
+.\" Author: Ulrich Drepper <drepper@redhat.com>
+.\"
+.\" %%%LICENSE_START(GPLv2_MISC)
+.\" This copyrighted material is made available to anyone wishing to use,
+.\" modify, copy, or redistribute it subject to the terms and conditions of the
+.\" GNU General Public License v.2.
+.\"
+.\" This program is distributed in the hope that it will be useful, but WITHOUT
+.\" ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
+.\" FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
+.\" more details.
+.\"
+.\" You should have received a copy of the GNU General Public
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
+.\"
+.TH NSS 5 2013-02-13 "Linux" "Linux Programmer's Manual"
+.SH NAME
+nss \- Name Service Switch configuration file
+.SH DESCRIPTION
+Each call to a function which retrieves data from a system database
+like the password or group database is handled by the Name Service
+Switch implementation in the GNU C library.
+The various services
+provided are implemented by independent modules, each of which
+naturally varies widely from the other.
+.PP
+The default implementations coming with the GNU C library are by
+default conservative and do not use unsafe data.
+This might be very costly in some situations, especially when the databases
+are large.
+Some modules allow the system administrator to request
+taking shortcuts if these are known to be safe.
+It is then the system administrator's responsibility to ensure the assumption
+is correct.
+.PP
+There are other modules where the implementation changed over time.
+If an implementation used to sacrifice speed for memory consumption
+it might create problems if the preference is switched.
+.PP
+The
+.I /etc/default/nss
+file contains a number of variable assignments.
+Each variable controls the behavior of one or more
+NSS modules.
+White spaces are ignored.
+Lines beginning with \(aq#\(aq
+are treated as comments.
+.PP
+The variables currently recognized are:
+.TP
+\fBNETID_AUTHORITATIVE =\fR \fITRUE\fR|\fIFALSE\fR
+If set to TRUE, the NIS backend for the
+.BR initgroups (3)
+function will accept the information
+from the
+.I netid.byname
+NIS map as authoritative.
+This can speed up the function significantly if the
+.I group.byname
+map is large.
+The content of the
+.I netid.byname
+map is used \fBas is\fR.
+The system administrator has to make sure it is correctly generated.
+.TP
+\fBSERVICES_AUTHORITATIVE =\fR \fITRUE\fR|\fIFALSE\fR
+If set to TRUE, the NIS backend for the
+.BR getservbyname (3)
+and
+.BR getservbyname_r (3)
+functions will assume that the
+.I services.byservicename
+NIS map exists and is authoritative, particularly
+that it contains both keys with /proto and without /proto for both
+primary service names and service aliases.
+The system administrator has to make sure it is correctly generated.
+.TP
+\fBSETENT_BATCH_READ =\fR \fITRUE\fR|\fIFALSE\fR
+If set to TRUE, the NIS backend for the
+.BR setpwent (3)
+and
+.BR setgrent (3)
+functions will read the entire database at once and then
+hand out the requests one by one from memory with every corresponding
+.BR getpwent (3)
+or
+.BR getgrent (3)
+call respectively.
+Otherwise each
+.BR getpwent (3)
+or
+.BR getgrent (3)
+call might result in a network communication with the server to get
+the next entry.
+.SH FILES
+\fI/etc/default/nss\fR
+.SH EXAMPLE
+The default configuration corresponds to the following configuration file:
+
+.nf
+NETID_AUTHORITATIVE=FALSE
+SERVICES_AUTHORITATIVE=FALSE
+SETENT_BATCH_READ=FALSE
+.\" .SH AUTHOR
+.\" Ulrich Drepper <drepper@redhat.com>
+.\"
+.SH SEE ALSO
+\fInsswitch.conf\fR
.\" Copyright (c) 1998, 1999 Thorsten Kukuk (kukuk@vt.uni-paderborn.de)
.\" Copyright (c) 2011, Mark R. Bannister <cambridge@users.sourceforge.net>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston,
-.\" MA 02111, USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
-.TH NSSWITCH.CONF 5 2012-04-14 "Linux" "Linux Programmer's Manual"
+.TH NSSWITCH.CONF 5 2013-02-12 "Linux" "Linux Programmer's Manual"
.SH NAME
nsswitch.conf \- Name Service Switch configuration file
.SH DESCRIPTION
.BR gethostbyname (3)
and related functions.
.TP
+.B initgroups
+Supplementary group access list, used by
+.BR getgrouplist (3)
+function.
+.TP
.B netgroup
Network-wide list of hosts and users, used for access rules.
C libraries before glibc 2.1 supported netgroups only over NIS.
.IP *
Optional actions to perform if a particular result is obtained
from the preceding service, e.g., "[NOTFOUND=return]".
-.RE
.LP
The service specifications supported on your system depend on the
presence of shared libraries, and are therefore extensible.
.B return
Return a result now.
Do not call any further lookup functions.
+However, for compatibility reasons, if this is the selected action for the
+.B group
+database and the
+.B notfound
+status, and the configuration file does not contain the
+.B initgroups
+line, the next lookup function is always called,
+without affecting the search result.
.TP
.B continue
Call the next lookup function.
.\" Copyright (c) 1993 Michael Haardt (michael@moria.de),
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Sun Jul 25 10:46:28 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified Sun Aug 21 18:12:27 1994 by Rik Faith (faith@cs.unc.edu)
Trying to lock an account by simply changing the
shell field yields the same result and additionally allows the use of
.BR su (1).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR login (1),
.BR passwd (1),
.BR su (1),
.\" and System V IPC (as well as various other) additions from
.\" Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified 1995-05-17 by faith@cs.unc.edu
.\" Minor changes by aeb and Marty Leisner (leisner@sdsp.mc.xerox.com).
.\" to see what information could be imported from that file
.\" into this file.
.\"
-.TH PROC 5 2012-05-03 "Linux" "Linux Programmer's Manual"
+.TH PROC 5 2013-02-11 "Linux" "Linux Programmer's Manual"
.SH NAME
proc \- process information pseudo-file system
.SH DESCRIPTION
This file displays the soft limit, hard limit, and units of measurement
for each of the process's resource limits (see
.BR getrlimit (2)).
-The file is protected to only allow reading by the real UID of the process.
+Up to and including Linux 2.6.35,
+this file is protected to only allow reading by the real UID of the process.
+Since Linux 2.6.36,
+.\" commit 3036e7b490bf7878c6dae952eec5fb87b1106589
+this file is readable by all users on the system.
.TP
.I /proc/[pid]/maps
A file containing the currently mapped memory regions and their access
For more information on mount propagation see:
.I Documentation/filesystems/sharedsubtree.txt
-in the kernel source tree.
+in the Linux kernel source tree.
.TP
.IR /proc/[pid]/mounts " (since Linux 2.4.19)"
This is a list of all the file systems currently mounted in the
A positive score increases the likelihood of this
process being killed by the OOM-killer;
a negative score decreases the likelihood.
+.IP
The default value for this file is 0;
a new process inherits its parent's
.I oom_adj
A process must be privileged
.RB ( CAP_SYS_RESOURCE )
to update this file.
+.IP
+Since Linux 2.6.36, use of this file is deprecated in favor of
+.IR /proc/[pid]/oom_score_adj .
.TP
.IR /proc/[pid]/oom_score " (since Linux 2.6.11)"
.\" See mm/oom_kill.c::badness() in the 2.6.25 sources
.IP
The
.I oom_score
-also reflects the bit-shift adjustment specified by the
+also reflects the adjustment specified by the
+.I oom_score_adj
+or
.I oom_adj
setting for the process.
+.TP
+.IR /proc/[pid]/oom_score_adj " (since Linux 2.6.36)"
+.\" Text taken from 3.7 Documentation/filesystems/proc.txt
+This file can be used to adjust the badness heuristic used to select which
+process gets killed in out-of-memory conditions.
+
+The badness heuristic assigns a value to each candidate task ranging from 0
+(never kill) to 1000 (always kill) to determine which process is targeted.
+The units are roughly a proportion along that range of
+allowed memory the process may allocate from,
+based on an estimation of its current memory and swap use.
+For example, if a task is using all allowed memory,
+its badness score will be 1000.
+If it is using half of its allowed memory, its score will be 500.
+
+There is an additional factor included in the badness score: root
+processes are given 3% extra memory over other tasks.
+
+The amount of "allowed" memory depends on the context
+in which the OOM-killer was called.
+If it is due to the memory assigned to the allocating task's cpuset
+being exhausted,
+the allowed memory represents the set of mems assigned to that
+cpuset (see
+.BR cpuset (7)).
+If it is due to a mempolicy's node(s) being exhausted,
+the allowed memory represents the set of mempolicy nodes.
+If it is due to a memory limit (or swap limit) being reached,
+the allowed memory is that configured limit.
+Finally, if it is due to the entire system being out of memory, the
+allowed memory represents all allocatable resources.
+
+The value of
+.I oom_score_adj
+is added to the badness score before it
+is used to determine which task to kill.
+Acceptable values range from \-1000
+(OOM_SCORE_ADJ_MIN) to +1000 (OOM_SCORE_ADJ_MAX).
+This allows user space to control the preference for OOM-killing,
+ranging from always preferring a certain
+task or completely disabling it from OOM-killing.
+The lowest possible value, \-1000, is
+equivalent to disabling OOM-killing entirely for that task,
+since it will always report a badness score of 0.
+
+Consequently, it is very simple for user space to define
+the amount of memory to consider for each task.
+Setting a
+.I oom_score_adj
+value of +500, for example,
+is roughly equivalent to allowing the remainder of tasks sharing the
+same system, cpuset, mempolicy, or memory controller resources
+to use at least 50% more memory.
+A value of \-500, on the other hand, would be roughly
+equivalent to discounting 50% of the task's
+allowed memory from being considered as scoring against the task.
+
+For backward compatibility with previous kernels,
+.I /proc/[pid]/oom_adj
+can still be used to tune the badness score.
+Its value is
+scaled linearly with
+.IR oom_score_adj .
+
+Writing to
+.IR /proc/[pid]/oom_score_adj
+or
+.IR /proc/[pid]/oom_adj
+will change the other with its scaled value.
.\" FIXME Describe /proc/[pid]/pagemap
.\" Added in 2.6.25
.\" CONFIG_PROC_PAGE_MONITOR
.RS
.TP 12
\fIpid\fP %d
-The process ID.
+(1) The process ID.
.TP
\fIcomm\fP %s
-The filename of the executable, in parentheses.
+(2) The filename of the executable, in parentheses.
This is visible whether or not the executable is swapped out.
.TP
\fIstate\fP %c
-One character from the string "RSDZTW" where R is running, S is
+(3) One character from the string "RSDZTW" where R is running, S is
sleeping in an interruptible wait, D is waiting in uninterruptible
disk sleep, Z is zombie, T is traced or stopped (on a signal),
and W is paging.
.TP
\fIppid\fP %d
-The PID of the parent.
+(4) The PID of the parent.
.TP
\fIpgrp\fP %d
-The process group ID of the process.
+(5) The process group ID of the process.
.TP
\fIsession\fP %d
-The session ID of the process.
+(6) The session ID of the process.
.TP
\fItty_nr\fP %d
-The controlling terminal of the process.
+(7) The controlling terminal of the process.
(The minor device number is contained in the combination of bits
31 to 20 and 7 to 0;
the major device number is in bits 15 to 8.)
.TP
\fItpgid\fP %d
.\" This field and following, up to and including wchan added 0.99.1
-The ID of the foreground process group of the controlling
+(8) The ID of the foreground process group of the controlling
terminal of the process.
.TP
\fIflags\fP %u (%lu before Linux 2.6.22)
-The kernel flags word of the process.
+(9) The kernel flags word of the process.
For bit meanings,
-see the PF_* defines in
-.IR <linux/sched.h> .
+see the PF_* defines in the Linux kernel source file
+.IR include/linux/sched.h .
Details depend on the kernel version.
.TP
\fIminflt\fP %lu
-The number of minor faults the process has made which have not
+(10) The number of minor faults the process has made which have not
required loading a memory page from disk.
.TP
.\" field 11
\fIcminflt\fP %lu
-The number of minor faults that the process's
+(11) The number of minor faults that the process's
waited-for children have made.
.TP
\fImajflt\fP %lu
-The number of major faults the process has made which have
+(12) The number of major faults the process has made which have
required loading a memory page from disk.
.TP
\fIcmajflt\fP %lu
-The number of major faults that the process's
+(13) The number of major faults that the process's
waited-for children have made.
.TP
\fIutime\fP %lu
-Amount of time that this process has been scheduled in user mode,
+(14) Amount of time that this process has been scheduled in user mode,
measured in clock ticks (divide by
-.IR sysconf(_SC_CLK_TCK) .
+.IR sysconf(_SC_CLK_TCK) ).
This includes guest time, \fIguest_time\fP
(time spent running a virtual CPU, see below),
so that applications that are not aware of the guest time field
do not lose that time from their calculations.
.TP
\fIstime\fP %lu
-Amount of time that this process has been scheduled in kernel mode,
+(15) Amount of time that this process has been scheduled in kernel mode,
measured in clock ticks (divide by
-.IR sysconf(_SC_CLK_TCK) .
+.IR sysconf(_SC_CLK_TCK) ).
.TP
\fIcutime\fP %ld
-Amount of time that this process's
+(16) Amount of time that this process's
waited-for children have been scheduled in user mode,
measured in clock ticks (divide by
-.IR sysconf(_SC_CLK_TCK) .
+.IR sysconf(_SC_CLK_TCK) ).
(See also
.BR times (2).)
This includes guest time, \fIcguest_time\fP
(time spent running a virtual CPU, see below).
.TP
\fIcstime\fP %ld
-Amount of time that this process's
+(17) Amount of time that this process's
waited-for children have been scheduled in kernel mode,
measured in clock ticks (divide by
-.IR sysconf(_SC_CLK_TCK) .
+.IR sysconf(_SC_CLK_TCK) ).
.TP
\fIpriority\fP %ld
-(Explanation for Linux 2.6)
+(18) (Explanation for Linux 2.6)
For processes running a real-time scheduling policy
.RI ( policy
below; see
.\" And back in kernel 1.2 days things were different again.
.TP
\fInice\fP %ld
-The nice value (see
+(19) The nice value (see
.BR setpriority (2)),
a value in the range 19 (low priority) to \-20 (high priority).
.\" Back in kernel 1.2 days things were different.
-.TP
.\" .TP
.\" \fIcounter\fP %ld
.\" The current maximum size in jiffies of the process's next timeslice,
.\" \fItimeout\fP %u
.\" The time in jiffies of the process's next timeout.
.\" timeout was removed sometime around 2.1/2.2
+.TP
\fInum_threads\fP %ld
-Number of threads in this process (since Linux 2.6).
+(20) Number of threads in this process (since Linux 2.6).
Before kernel 2.6, this field was hard coded to 0 as a placeholder
for an earlier removed field.
.TP
.\" field 21
\fIitrealvalue\fP %ld
-The time in jiffies before the next
+(21) The time in jiffies before the next
.B SIGALRM
is sent to the process due to an interval timer.
Since kernel 2.6.17, this field is no longer maintained,
and is hard coded as 0.
.TP
\fIstarttime\fP %llu (was %lu before Linux 2.6)
-The time in jiffies the process started after system boot.
+(22) The time the process started after system boot.
+In kernels before Linux 2.6, this value was expressed in jiffies.
+Since Linux 2.6, the value is expressed in clock ticks (divide by
+.IR sysconf(_SC_CLK_TCK) ).
.TP
\fIvsize\fP %lu
-Virtual memory size in bytes.
+(23) Virtual memory size in bytes.
.TP
\fIrss\fP %ld
-Resident Set Size: number of pages the process has in real memory.
+(24) Resident Set Size: number of pages the process has in real memory.
This is just the pages which
count toward text, data, or stack space.
This does not include pages
which have not been demand-loaded in, or which are swapped out.
.TP
\fIrsslim\fP %lu
-Current soft limit in bytes on the rss of the process;
+(25) Current soft limit in bytes on the rss of the process;
see the description of
.B RLIMIT_RSS
in
-.BR getpriority (2).
+.BR getrlimit (2).
.TP
\fIstartcode\fP %lu
-The address above which program text can run.
+(26) The address above which program text can run.
.TP
\fIendcode\fP %lu
-The address below which program text can run.
+(27) The address below which program text can run.
.TP
\fIstartstack\fP %lu
-The address of the start (i.e., bottom) of the stack.
+(28) The address of the start (i.e., bottom) of the stack.
.TP
\fIkstkesp\fP %lu
-The current value of ESP (stack pointer), as found in the
+(29) The current value of ESP (stack pointer), as found in the
kernel stack page for the process.
.TP
\fIkstkeip\fP %lu
-The current EIP (instruction pointer).
+(30) The current EIP (instruction pointer).
.TP
.\" field 31
\fIsignal\fP %lu
-The bitmap of pending signals, displayed as a decimal number.
+(31) The bitmap of pending signals, displayed as a decimal number.
Obsolete, because it does not provide information on real-time signals; use
.I /proc/[pid]/status
instead.
.TP
\fIblocked\fP %lu
-The bitmap of blocked signals, displayed as a decimal number.
+(32) The bitmap of blocked signals, displayed as a decimal number.
Obsolete, because it does not provide information on real-time signals; use
.I /proc/[pid]/status
instead.
.TP
\fIsigignore\fP %lu
-The bitmap of ignored signals, displayed as a decimal number.
+(33) The bitmap of ignored signals, displayed as a decimal number.
Obsolete, because it does not provide information on real-time signals; use
.I /proc/[pid]/status
instead.
.TP
\fIsigcatch\fP %lu
-The bitmap of caught signals, displayed as a decimal number.
+(34) The bitmap of caught signals, displayed as a decimal number.
Obsolete, because it does not provide information on real-time signals; use
.I /proc/[pid]/status
instead.
.TP
\fIwchan\fP %lu
-This is the "channel" in which the process is waiting.
+(35) This is the "channel" in which the process is waiting.
It is the
address of a system call, and can be looked up in a namelist if you
need a textual name.
try \fIps \-l\fP to see the WCHAN field in action.)
.TP
\fInswap\fP %lu
+(36)
.\" nswap was added in 2.0
Number of pages swapped (not maintained).
.TP
\fIcnswap\fP %lu
+(37)
.\" cnswap was added in 2.0
Cumulative \fInswap\fP for child processes (not maintained).
.TP
\fIexit_signal\fP %d (since Linux 2.1.22)
-Signal to be sent to parent when we die.
+(38) Signal to be sent to parent when we die.
.TP
\fIprocessor\fP %d (since Linux 2.2.8)
-CPU number last executed on.
+(39) CPU number last executed on.
.TP
\fIrt_priority\fP %u (since Linux 2.5.19; was %lu before Linux 2.6.22)
-Real-time scheduling priority, a number in the range 1 to 99 for
+(40) Real-time scheduling priority, a number in the range 1 to 99 for
processes scheduled under a real-time policy,
or 0, for non-real-time processes (see
.BR sched_setscheduler (2)).
.TP
.\" field 41
\fIpolicy\fP %u (since Linux 2.5.19; was %lu before Linux 2.6.22)
-Scheduling policy (see
+(41) Scheduling policy (see
.BR sched_setscheduler (2)).
Decode using the SCHED_* constants in
.IR linux/sched.h .
.TP
\fIdelayacct_blkio_ticks\fP %llu (since Linux 2.6.18)
-Aggregated block I/O delays, measured in clock ticks (centiseconds).
+(42) Aggregated block I/O delays, measured in clock ticks (centiseconds).
.TP
\fIguest_time\fP %lu (since Linux 2.6.24)
-Guest time of the process (time spent running a virtual CPU
+(43) Guest time of the process (time spent running a virtual CPU
for a guest operating system), measured in clock ticks (divide by
-.IR sysconf(_SC_CLK_TCK) .
+.IR sysconf(_SC_CLK_TCK) ).
.TP
\fIcguest_time\fP %ld (since Linux 2.6.24)
-Guest time of the process's children, measured in clock ticks (divide by
-.IR sysconf(_SC_CLK_TCK) .
+(44) Guest time of the process's children, measured in clock ticks (divide by
+.IR sysconf(_SC_CLK_TCK) ).
.RE
.TP
.I /proc/[pid]/statm
.in +4n
.nf
-size total program size
+size (1) total program size
(same as VmSize in \fI/proc/[pid]/status\fP)
-resident resident set size
+resident (2) resident set size
(same as VmRSS in \fI/proc/[pid]/status\fP)
-share shared pages (from shared mappings)
-text text (code)
+share (3) shared pages (i.e., backed by a file)
+text (4) text (code)
.\" (not including libs; broken, includes data segment)
-lib library (unused in Linux 2.6)
-data data + stack
+lib (5) library (unused in Linux 2.6)
+data (6) data + stack
.\" (including libs; broken, includes library text)
-dt dirty pages (unused in Linux 2.6)
+dt (7) dirty pages (unused in Linux 2.6)
.fi
.in
.TP
during kernel initialization.
SMP machines have information for
each CPU.
+The
+.BR lscpu (1)
+command gathers its information from this file.
.TP
.I /proc/devices
Text listing of major numbers and device groups.
.TP
.IR /proc/diskstats " (since Linux 2.5.69)"
This file contains disk I/O statistics for each disk device.
-See the kernel source file
+See the Linux kernel source file
.I Documentation/iostats.txt
for further information.
.TP
to report the amount of free and used memory (both physical and swap)
on the system as well as the shared memory and buffers used by the
kernel.
+Each line of the file consists of a parameter name, followed by a colon,
+the value of the parameter, and an option unit of measurement (e.g., "kB").
+The list below describes the parameter names and
+the format specifier required to read the field value.
+Except as noted below,
+all of the fields have been present since at least Linux 2.6.0.
+Some fileds are only displayed if the kernel was configured
+with various options; those dependencies are noted in the list.
+.RS
+.TP
+.IR MemTotal " %lu"
+Total usable RAM (i.e. physical RAM minus a few reserved
+bits and the kernel binary code).
+.TP
+.IR MemFree " %lu"
+The sum of
+.IR LowFree + HighFree .
+.TP
+.IR Buffers " %lu"
+Relatively temporary storage for raw disk blocks that
+shouldn't get tremendously large (20MB or so).
+.TP
+.IR Cached " %lu"
+In-memory cache for files read from the disk (the page cache).
+Doesn't include
+.IR SwapCached .
+.TP
+.IR SwapCached " %lu"
+Memory that once was swapped out, is swapped back in but
+still also is in the swap file.
+(If memory pressure is high, these pages
+don't need to be swapped out again because they are already
+in the swap file.
+This saves I/O.)
+.TP
+.IR Active " %lu"
+Memory that has been used more recently and usually not
+reclaimed unless absolutely necessary.
+.TP
+.IR Inactive " %lu"
+Memory which has been less recently used.
+It is more eligible to be reclaimed for other purposes.
+.TP
+.IR Active(anon) " %lu (since Linux 2.6.28)"
+[To be documented.]
+.TP
+.IR Inactive(anon) " %lu (since Linux 2.6.28)"
+[To be documented.]
+.TP
+.IR Active(file) " %lu (since Linux 2.6.28)"
+[To be documented.]
+.TP
+.IR Inactive(file) " %lu (since Linux 2.6.28)"
+[To be documented.]
+.TP
+.IR Unevictable " %lu (since Linux 2.6.28)"
+(From Linux 2.6.28 to 2.6.30,
+\fBCONFIG_UNEVICTABLE_LRU\fP was required.)
+[To be documented.]
+.TP
+.IR Mlocked " %lu (since Linux 2.6.28)"
+(From Linux 2.6.28 to 2.6.30,
+\fBCONFIG_UNEVICTABLE_LRU\fP was required.)
+[To be documented.]
+.TP
+.IR HighTotal " %lu"
+(Starting with Linux 2.6.19, \fBCONFIG_HIGHMEM\fP is required.)
+Total amount of highmem.
+Highmem is all memory above ~860MB of physical memory.
+Highmem areas are for use by user-space programs,
+or for the page cache.
+The kernel must use tricks to access
+this memory, making it slower to access than lowmem.
+.TP
+.IR HighFree " %lu
+(Starting with Linux 2.6.19, \fBCONFIG_HIGHMEM\fP is required.)
+Amount of free highmem.
+.TP
+.IR LowTotal " %lu
+(Starting with Linux 2.6.19, \fBCONFIG_HIGHMEM\fP is required.)
+Total amount of lowmem.
+Lowmem is memory which can be used for everything that
+highmem can be used for, but it is also available for the
+kernel's use for its own data structures.
+Among many other things,
+it is where everything from
+.I Slab
+is allocated.
+Bad things happen when you're out of lowmem.
+.TP
+.IR LowFree " %lu
+(Starting with Linux 2.6.19, \fBCONFIG_HIGHMEM\fP is required.)
+Amount of free lowmem.
+.TP
+.IR MmapCopy " %lu (since Linux 2.6.29)"
+.RB ( CONFIG_MMU
+is required.)
+[To be documented.]
+.TP
+.IR SwapTotal " %lu"
+Total amount of swap space available.
+.TP
+.IR SwapFree " %lu"
+Amount of swap space that is currently unused.
+.TP
+.IR Dirty " %lu"
+Memory which is waiting to get written back to the disk.
+.TP
+.IR Writeback " %lu"
+Memory which is actively being written back to the disk.
+.TP
+.IR AnonPages " %lu (since Linux 2.6.18)"
+Non-file backed pages mapped into user-space page tables.
+.TP
+.IR Mapped " %lu"
+Files which have been mmaped, such as libraries.
+.TP
+.IR Shmem " %lu (since Linux 2.6.32)"
+[To be documented.]
+.TP
+.IR Slab " %lu"
+In-kernel data structures cache.
+.TP
+.IR SReclaimable " %lu (since Linux 2.6.19)"
+Part of
+.IR Slab ,
+that might be reclaimed, such as caches.
+.TP
+.IR SUnreclaim " %lu (since Linux 2.6.19)"
+Part of
+.IR Slab ,
+that cannot be reclaimed on memory pressure.
+.TP
+.IR KernelStack " %lu (since Linux 2.6.32)"
+Amount of memory allocated to kernel stacks.
+.TP
+.IR PageTables " %lu (since Linux 2.6.18)"
+Amount of memory dedicated to the lowest level of page tables.
+.TP
+.IR Quicklists " %lu (since Linux 2.6.27)"
+(\fBCONFIG_QUICKLIST\fP is required.)
+[To be documented.]
+.TP
+.IR NFS_Unstable " %lu (since Linux 2.6.18)"
+NFS pages sent to the server, but not yet committed to stable storage.
+.TP
+.IR Bounce " %lu (since Linux 2.6.18)"
+Memory used for block device "bounce buffers".
+.TP
+.IR WritebackTmp " %lu (since Linux 2.6.26)"
+Memory used by FUSE for temporary writeback buffers.
+.TP
+.IR CommitLimit " %lu (since Linux 2.6.10)"
+Based on the overcommit ratio ('vm.overcommit_ratio'),
+this is the total amount of memory currently available to
+be allocated on the system. This limit is only adhered to
+if strict overcommit accounting is enabled (mode 2 in
+.IR /proc/sys/vm/overcommit_ratio ).
+The
+.I CommitLimit
+is calculated using the following formula:
+
+ CommitLimit = (overcommit_ratio * Physical RAM) + Swap
+
+For example, on a system with 1GB of physical RAM and 7GB
+of swap with a
+.I overcommit_ratio
+of 30, this formula yields a
+.I CommitLimit
+of 7.3GB.
+For more details, see the memory overcommit documentation
+in the kernel source file
+.IR Documentation/vm/overcommit-accounting .
+.TP
+.IR Committed_AS " %lu"
+The amount of memory presently allocated on the system.
+The committed memory is a sum of all of the memory which
+has been allocated by processes, even if it has not been
+"used" by them as of yet.
+A process which allocates 1GB of memory (using
+.BR malloc (3)
+or similar), but only touches 300MB of that memory will only show up
+as using 300MB of memory even if it has the address space
+allocated for the entire 1GB.
+This 1GB is memory which has been "committed" to by the VM
+and can be used at any time by the allocating application.
+With strict overcommit enabled on the system (mode 2
+.IR /proc/sys/vm/overcommit_memory ),
+allocations which would exceed the
+.I CommitLimit
+(detailed above) will not be permitted.
+This is useful if one needs to guarantee that processes will not
+fail due to lack of memory once that memory has been successfully allocated.
+.TP
+.IR VmallocTotal " %lu"
+Total size of vmalloc memory area.
+.TP
+.IR VmallocUsed " %lu"
+Amount of vmalloc area which is used.
+.TP
+.IR VmallocChunk " %lu"
+Largest contiguous block of vmalloc area which is free.
+.TP
+.IR HardwareCorrupted " %lu (since Linux 2.6.32)"
+(\fBCONFIG_MEMORY_FAILURE\fP is required.)
+[To be documented.]
+.TP
+.IR AnonHugePages " %lu (since Linux 2.6.38)"
+(\fBCONFIG_TRANSPARENT_HUGEPAGE\fP is required.)
+Non-file backed huge pages mapped into user-space page tables.
+.TP
+.IR HugePages_Total " %lu"
+(\fBCONFIG_HUGETLB_PAGE\fP is required.)
+The size of the pool of huge pages.
+.TP
+.IR HugePages_Free " %lu"
+(\fBCONFIG_HUGETLB_PAGE\fP is required.)
+The number of huge pages in the pool that are not yet allocated.
+.TP
+.IR HugePages_Rsvd " %lu (since Linux 2.6.17)"
+(\fBCONFIG_HUGETLB_PAGE\fP is required.)
+This is the number of huge pages for
+which a commitment to allocate from the pool has been made,
+but no allocation has yet been made.
+These reserved huge pages
+guarantee that an application will be able to allocate a
+huge page from the pool of huge pages at fault time.
+.TP
+.IR HugePages_Surp " %lu (since Linux 2.6.24)"
+(\fBCONFIG_HUGETLB_PAGE\fP is required.)
+This is the number of huge pages in
+the pool above the value in
+.IR /proc/sys/vm/nr_hugepages .
+The maximum number of surplus huge pages is controlled by
+.IR /proc/sys/vm/nr_overcommit_hugepages .
+.TP
+.IR Hugepagesize " %lu"
+(\fBCONFIG_HUGETLB_PAGE\fP is required.)
+The size of huge pages.
+.RE
.TP
.I /proc/modules
A text list of the modules that have been loaded by the system.
.TP
.I /proc/mtrr
Memory Type Range Registers.
-See the kernel source file
+See the Linux kernel source file
.I Documentation/mtrr.txt
for details.
.TP
.\" .IR /proc/sched_debug " (since Linux 2.6.23)"
.\" See also /proc/[pid]/sched
.TP
+.IR /proc/profile " (since Linux 2.4)"
+This file is present only if the kernel was booted with the
+.I profile=1
+command-line option.
+It exposes kernel profiling information in a binary format for use by
+.BR readprofile (1).
+Writing (e.g., an empty string) to this file resets the profiling counters;
+on some architectures,
+writing a binary integer "profiling multiplier" of size
+.IR sizeof(int)
+sets the profiling interrupt frequency.
+.TP
.I /proc/scsi
A directory with the
.I scsi
.IR sysconf(_SC_CLK_TCK)
to obtain the right value),
.\" 1024 on Alpha and ia64
-that the system spent in user mode,
-user mode with low priority (nice), system mode, and the
-idle task, respectively.
+that the system spent in various states:
+.RS
+.TP
+.I user
+(1) Time spent in user mode.
+.TP
+.I nice
+(2) Time spent in user mode with low priority (nice).
+.TP
+.I system
+(3) Time spent in system mode.
+.TP
+.I idle
+(4) Time spent in the idle task.
.\" FIXME Actually, the following info about the /proc/stat 'cpu' field
-.\" does not seem to be quite right (at least in 2.6.12)
-The last value should be USER_HZ times the
-second entry in the uptime pseudo-file.
-
-In Linux 2.6 this line includes three additional columns:
-.I iowait
-\- time waiting for I/O to complete (since 2.5.41);
-.I irq
-\- time servicing interrupts (since 2.6.0-test4);
-.I softirq
-\- time servicing softirqs (since 2.6.0-test4).
-
-Since Linux 2.6.11, there is an eighth column,
-.I steal
-\- stolen time, which is the time spent in other operating systems when
+.\" does not seem to be quite right (at least in 2.6.12 or 3.6):
+.\" the idle time in /proc/uptime does not quite match this value
+This value should be USER_HZ times the
+second entry in the
+.I /proc/uptime
+pseudo-file.
+.TP
+.IR iowait " (since Linux 2.5.41)"
+(5) Time waiting for I/O to complete.
+.TP
+.IR irq " (since Linux 2.6.0-test4)"
+(6) Time servicing interrupts.
+.TP
+.IR softirq " (since Linux 2.6.0-test4)"
+(7) Time servicing softirqs.
+.TP
+.IR steal " (since Linux 2.6.11)"
+(8) Stolen time, which is the time spent in other operating systems when
running in a virtualized environment
-
-Since Linux 2.6.24, there is a ninth column,
-.IR guest ,
-which is the time spent running a virtual CPU for guest
+.TP
+.IR guest " (since Linux 2.6.24)"
+(9) Time spent running a virtual CPU for guest
operating systems under the control of the Linux kernel.
.\" See Changelog entry for 5e84cfde51cf303d368fcb48f22059f37b3872de
.TP
+.IR guest_nice " (since Linux 2.6.33)"
+.\" commit ce0e7b28fb75cb003cfc8d0238613aaf1c55e797
+(10) Time spent running a niced guest (virtual CPU for guest
+operating systems under the control of the Linux kernel).
+.RE
+.TP
\fIpage 5741 1808\fP
The number of pages the system paged in and the number that were paged
out (from disk).
.IR /proc/sys/abi " (since Linux 2.4.10)"
This directory may contain files with application binary information.
.\" On some systems, it is not present.
-See the kernel source file
+See the Linux kernel source file
.I Documentation/sysctl/abi.txt
for more information.
.TP
.TP
.I /proc/sys/fs/binfmt_misc
Documentation for files in this directory can be found
-in the kernel sources in
+in the Linux kernel sources in
.IR Documentation/binfmt_misc.txt .
.TP
.IR /proc/sys/fs/dentry-state " (since Linux 2.2)"
.BR RLIMIT_NOFILE ,
on the number of files it may open.)
If you get lots
-of error messages about running out of file handles,
+of error messages in the kernel log about running out of file handles
+(look for "VFS: file-max limit <number> reached"),
try increasing this value:
.br
limit.
.TP
.I /proc/sys/fs/file-nr
-This (read-only) file gives the number of files presently opened.
-It contains three numbers: the number of allocated file handles;
-the number of free file handles; and the maximum number of file handles.
-The kernel allocates file handles dynamically, but it
-doesn't free them again.
-If the number of allocated files is close to the
+This (read-only) file contains three numbers:
+the number of allocated file handles
+(i.e., the number of files presently opened);
+the number of free file handles;
+and the maximum number of file handles (i.e., the same value as
+.IR /proc/sys/fs/file-max ).
+If the number of allocated file handles is close to the
maximum, you should consider increasing the maximum.
-When the number of free file handles is
-large, you've encountered a peak in your usage of file
-handles and you probably don't need to increase the maximum.
+Before Linux 2.6,
+the kernel allocated file handles dynamically,
+but it didn't free them again.
+Instead the free file handles were kept in a list for reallocation;
+the "free file handles" value indicates the size of that list.
+A large number of free file handles indicates that there was
+a past peak in the usage of open file handles.
+Since Linux 2.6, the kernel does deallocate freed file handles,
+and the "free file handles" value is always zero.
.TP
.I /proc/sys/fs/inode-max
This file contains the maximum number of in-memory inodes.
display the contents of this file after assigning a value to it.
The minimum value that can be assigned to this file is the system page size.
.TP
+.IR /proc/sys/fs/protected_hardlinks " (since Linux 3.6)"
+.\" commit 800179c9b8a1e796e441674776d11cd4c05d61d7
+When the value in this file is 0,
+no restrictions are placed on the creation of hard links
+(i.e., this is the historical behaviour before Linux 3.6).
+When the value in this file is 1,
+a hard link can be created to a target file
+only if one of the following conditions is true:
+.RS
+.IP * 3
+The caller has the
+.BR CAP_FOWNER
+capability.
+.IP *
+The file system UID of the process creating the link matches
+the owner (UID) of the target file
+(as described in
+.BR credentials (7),
+a process's file system UID is normally the same as its effective UID).
+.IP *
+All of the following conditions are true:
+.RS 4
+.IP \(bu 3
+the target is a regular file;
+.IP \(bu
+the target file does not have its set-user-ID permission bit enabled;
+.IP \(bu
+the target file does not have both its set-group-ID and
+group-executable permission bits enabled; and
+.IP \(bu
+the caller has permission to read and write the target file
+(either via the file's permissions mask or because it has
+suitable capabilities).
+.RE
+.RE
+.IP
+The default value in this file is 0.
+Setting the value to 1
+prevents a longstanding class of security issues caused by
+hard-link-based time-of-check, time-of-use races,
+most commonly seen in world-writable directories such as
+.IR /tmp .
+The common method of exploiting this flaw
+is to cross privilege boundaries when following a given hard link
+(i.e., a root process follows a hard link created by another user).
+Additionally, on systems without separated partitions,
+this stops unauthorized users from "pinning" vulnerable set-user-ID and
+set-group-ID files against being upgraded by
+the administrator, or linking to special files.
+.TP
+.IR /proc/sys/fs/protected_symlinks " (since Linux 3.6)"
+.\" commit 800179c9b8a1e796e441674776d11cd4c05d61d7
+When the value in this file is 0,
+no restrictions are placed on following symbolic links
+(i.e., this is the historical behaviour before Linux 3.6).
+When the value in this file is 1, symbolic links are followed only
+in the following circumstances:
+.RS
+.IP * 3
+the file system UID of the process following the link matches
+the owner (UID) of the symbolic link
+(as described in
+.BR credentials (7),
+a process's file system UID is normally the same as its effective UID);
+.IP *
+the link is not in a sticky world-writable directory; or
+.IP *
+the symbolic link and and its parent directory have the same owner (UID)
+.RE
+.IP
+A system call that fails to follow a symbolic link
+because of the above restrictions returns the error
+.BR EACCES
+in
+.IR errno .
+.IP
+The default value in this file is 0.
+Setting the value to 1 avoids a longstanding class of security issues
+based on time-of-check, time-of-use races when accessing symbolic links.
+.TP
.IR /proc/sys/fs/suid_dumpable " (since Linux 2.6.13)"
.\" The following is based on text from Documentation/sysctl/kernel.txt
The value in this file determines whether core dump files are
produced for set-user-ID or otherwise protected/tainted binaries.
Three different integer values can be specified:
-.sp
+.RS
+.TP
\fI0\ (default)\fP
This provides the traditional (pre-Linux 2.6.13) behavior.
A core dump will not be produced for a process which has
.BR setgid (2),
or similar, or by executing a set-user-ID or set-group-ID program)
or whose binary does not have read permission enabled.
-.sp
+.TP
\fI1\ ("debug")\fP
All processes dump core when possible.
The core dump is owned by the file system user ID of the dumping process
and no security is applied.
This is intended for system debugging situations only.
Ptrace is unchecked.
-.sp
+.TP
\fI2\ ("suidsafe")\fP
Any binary which normally would not be dumped (see "0" above)
is dumped readable by root only.
another or other files.
This mode is appropriate when administrators are
attempting to debug problems in a normal environment.
+.IP
+Additionally, since Linux 3.6,
+.\" 9520628e8ceb69fa9a4aee6b57f22675d9e1b709
+.I /proc/sys/kernel/core_pattern
+must either be an absolute pathname
+or a pipe command, as detailed in
+.BR core (5).
+Warnings will be written to the kernel log if
+.I core_pattern
+does not follow these rules, and no core dump will be produced.
+.\" 54b501992dd2a839e94e76aa392c392b55080ce8
+.RE
.TP
.I /proc/sys/fs/super-max
This file
ever reaches the kernel tty layer, and it's up to the program
to decide what to do with it.
.TP
-.I /proc/sys/kernel/hotplug
-This file
-contains the path for the hotplug policy agent.
-The default value in this file is
-.IR /sbin/hotplug .
+.IR /proc/sys/kernel/dmesg_restrict " (since Linux 2.6.37)"
+The value in this file determines who can see kernel syslog contents.
+A value of 0 in this file imposes no restrictions.
+If the value is 1, only privileged users can read the kernel syslog.
+(See
+.BR syslog (2)
+for more details.)
+Since Linux 3.4,
+.\" commit 620f6e8e855d6d447688a5f67a4e176944a084e8
+only users with the
+.BR CAP_SYS_ADMIN
+capability may change the value in this file.
.TP
.IR /proc/sys/kernel/domainname " and " /proc/sys/kernel/hostname
can be used to set the NIS/YP domainname and the
.BR hostname (1)
man page.
.TP
+.I /proc/sys/kernel/hotplug
+This file
+contains the path for the hotplug policy agent.
+The default value in this file is
+.IR /sbin/hotplug .
+.TP
.I /proc/sys/kernel/htab-reclaim
(PowerPC only) If this file is set to a nonzero value,
the PowerPC htab
is pruned
each time the system hits the idle loop.
.TP
+.IR /proc/sys/kernel/kptr_restrict " (since Linux 2.6.38)"
+.\" 455cd5ab305c90ffc422dd2e0fb634730942b257
+The value in this file determines whether kernel addresses are exposed via
+.I /proc
+files and other interfaces.
+A value of 0 in this file imposes no restrictions.
+If the value is 1, kernel pointers printed using the
+.I %pK
+format specifier will be replaced with zeros unless the user has the
+.BR CAP_SYSLOG
+capability.
+If the value is 2, kernel pointers printed using the
+.I %pK
+format specifier will be replaced with zeros regardless
+of the user's capabilities.
+The initial default value for this file was 1,
+but the default was changed
+.\" commit 411f05f123cbd7f8aa1edcae86970755a6e2a9d9
+to 0 in Linux 2.6.39.
+Since Linux 3.4,
+.\" commit 620f6e8e855d6d447688a5f67a4e176944a084e8
+only users with the
+.BR CAP_SYS_ADMIN
+capability can change the value in this file.
+.TP
.I /proc/sys/kernel/l2cr
(PowerPC only) This file
contains a flag that controls the L2 cache of G3 processor
The default value is
.IR /sbin/modprobe .
The file is only present if the kernel is built with the
-.B CONFIG_KMOD
+.B CONFIG_MODULES
+.RB ( CONFIG_KMOD
+in Linux 2.6.26 and earlier)
option enabled.
-It is described by the kernel source file
+It is described by the Linux kernel source file
.I Documentation/kmod.txt
(only present in kernel 2.4 and earlier).
.TP
+.IR /proc/sys/kernel/modules_disabled " (since Linux 2.6.31)"
+.\" 3d43321b7015387cfebbe26436d0e9d299162ea1
+.\" From Documentation/sysctl/kernel.txt
+A toggle value indicating if modules are allowed to be loaded
+in an otherwise modular kernel.
+This toggle defaults to off (0), but can be set true (1).
+Once true, modules can be neither loaded nor unloaded,
+and the toggle cannot be set back to false.
+The file is only present if the kernel is built with the
+.B CONFIG_MODULES
+option enabled.
+.TP
.I /proc/sys/kernel/msgmax
This file defines
a system-wide limit specifying the maximum number of bytes in
for further information.
.TP
.I /proc/sys/kernel/real-root-dev
-This file is documented in the kernel source file
+This file is documented in the Linux kernel source file
.IR Documentation/initrd.txt .
.TP
.IR /proc/sys/kernel/reboot-cmd " (Sparc only) "
0 - disable sysrq completely
1 - enable all functions of sysrq
- >1 - bitmask of allowed sysrq functions, as follows:
+ >1 - bit mask of allowed sysrq functions, as follows:
2 - enable control of console logging level
4 - enable control of keyboard (SAK, unraw)
8 - enable debugging dumps of processes etc.
This file is only present if the
.B CONFIG_MAGIC_SYSRQ
kernel configuration option is enabled.
-For further details see the kernel source file
+For further details see the Linux kernel source file
.IR Documentation/sysrq.txt .
.TP
.I /proc/sys/kernel/version
.IR /proc/sys/kernel/sysrq ).
This file is normally only writable by
.IR root .
-For further details see the kernel source file
+For further details see the Linux kernel source file
.IR Documentation/sysrq.txt .
.TP
.I /proc/sysvipc
.\" .SH ACKNOWLEDGEMENTS
.\" The material on /proc/sys/fs and /proc/sys/kernel is closely based on
.\" kernel source documentation files written by Rik van Riel.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cat (1),
.BR dmesg (1),
.BR find (1),
.BR netstat (8),
.BR procinfo (8),
.BR route (8)
-.br
-The kernel source files:
-.IR Documentation/filesystems/proc.txt ,
-.IR Documentation/sysctl/vm.txt
+
+The Linux kernel source files:
+.IR Documentation/filesystems/proc.txt
+and
+.IR Documentation/sysctl/vm.txt .
.\" Copyright (c) 1995 Martin Schulze <joey@infodrom.north.de>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 1995-10-18 Martin Schulze <joey@infodrom.north.de>
.\" * first released
.\" 2002-09-22 Seth W. Klein <sk@sethwklein.net>
.\" * protocol numbers are now assigned by the IANA
.\"
-.TH PROTOCOLS 5 2008-09-23 "Linux" "Linux Programmer's Manual"
+.TH PROTOCOLS 5 2012-08-05 "Linux" "Linux Programmer's Manual"
.SH NAME
protocols \- protocols definition file
.SH DESCRIPTION
.TP
.I /etc/protocols
The protocols definition file.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getprotoent (3)
-http://www.iana.org/assignments/protocol-numbers
+.UR http://www.iana.org\:/assignments\:/protocol-numbers
+.UE
.\" Copyright (c) 1986 The Regents of the University of California.
.\" All rights reserved.
.\"
+.\" %%%LICENSE_START(PERMISSIVE_MISC)
.\" Redistribution and use in source and binary forms are permitted
.\" provided that the above copyright notice and this paragraph are
.\" duplicated in all such forms and that any documentation,
.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
.\" IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
.\" WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
+.\" %%%LICENSE_END
.\"
.\" @(#)resolver.5 5.9 (Berkeley) 12/14/89
.\" $Id: resolver.5,v 8.6 1999/05/21 00:01:02 vixie Exp $
.\"
.\" Added ndots remark by Bernhard R. Link - debian bug #182886
.\"
-.TH RESOLV.CONF 5 2012-05-04 "" "Linux Programmer's Manual"
+.TH RESOLV.CONF 5 2013-03-05 "" "Linux Programmer's Manual"
.UC 4
.SH NAME
resolv.conf \- resolver configuration file
The different configuration options are:
.TP
\fBnameserver\fP Name server IP address
-Internet address (in dot notation) of a name server
-that the resolver should query.
+Internet address of a name server that the resolver should query,
+either an IPv4 address (in dot notation),
+or an IPv6 address in colon (and possibly dot) notation as per RFC 2373.
Up to
.B MAXNS
(currently 3, see \fI<resolv.h>\fP) name servers may be listed,
sets
.BR RES_DEBUG
in
-.IR _res.options .
+.IR _res.options
+(only effective if glibc was built with debug support; see
+.BR resolver (3)).
.TP
.BI ndots: n
.\" Since glibc 2.2
.BR RES_ROTATE
in
.IR _res.options ,
-which causes round robin selection of nameservers from among those listed.
+which causes round-robin selection of nameservers from among those listed.
This has the effect of spreading the query load among all listed servers,
rather than having all clients try the first listed server first every time.
.TP
This option disables the behavior and makes glibc perform the IPv6
and IPv4 requests sequentially (at the cost of some slowdown of the
resolving process).
+.TP
+.BR single-request-reopen " (since glibc 2.9)"
+The resolver uses the same socket for the A and AAAA requests.
+Some hardware mistakenly only sends back one reply.
+When that happens the client system will sit and wait for the second reply.
+Turning this option on changes this behavior
+so that if two requests from the same port are not handled correctly it will
+close the socket and open a new one before sending the second request.
.RE
.LP
The \fIdomain\fP and \fIsearch\fP keywords are mutually exclusive.
.SH FILES
.IR /etc/resolv.conf ,
.I <resolv.h>
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR gethostbyname (3),
.BR resolver (3),
.BR hostname (7),
.\" This page was taken from the 4.4BSD-Lite CDROM (BSD license)
.\"
+.\" %%%LICENSE_START(BSD_ONELINE_CDROM)
+.\" This page was taken from the 4.4BSD-Lite CDROM (BSD license)
+.\" %%%LICENSE_END
+.\"
.\" @(#)rpc.5 2.2 88/08/03 4.0 RPCSRC; from 1.4 87/11/27 SMI;
.TH RPC 5 1985-09-26 "" "Linux Programmer's Manual"
.SH NAME
.TP
.I /etc/rpc
RPC program number data base
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getrpcent (3)
.\" Copyright (c) 1993 Michael Haardt (michael@moria.de),
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Sun Jul 25 11:06:27 1993 by Rik Faith (faith@cs.unc.edu)
.TH SECURETTY 5 1992-12-29 "Linux" "Linux Programmer's Manual"
.SH NAME
-securetty \- file which lists ttys from which root can log in
+securetty \- file which lists terminals from which root can log in
.SH DESCRIPTION
The file
.I /etc/securetty
is used by (some versions of)
.BR login (1).
-The file contains the device names of tty lines
+The file contains the device names of terminal lines
(one per line, without leading
.IR /dev/ )
on which root is allowed to login.
if you use the shadow suite.
.SH FILES
.I /etc/securetty
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR login (1),
.BR login.defs (5)
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 1996 Austin Donnelly <and1000@cam.ac.uk>,
.\" with additional material Copyright (c) 1995 Martin Schulze
.\" <joey@infodrom.north.de>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" This manpage was made by merging two independently written manpages,
.\" one written by Martin Schulze (18 Oct 95), the other written by
.\" and
.\" .BR getservbyport (3).
.\" However, this will also cause the next line to be mis-parsed.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR listen (2),
.BR endservent (3),
.BR getservbyname (3),
.BR protocols (5),
.BR inetd (8)
-Assigned Numbers RFC, most recently RFC\ 1700, (AKA STD0002)
+Assigned Numbers RFC, most recently RFC\ 1700, (AKA STD0002).
.\" Copyright (c) 1993 Michael Haardt (michael@moria.de),
.\" Thu May 20 20:45:48 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Sat Jul 24 17:11:07 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified Sun Nov 21 10:49:38 1993 by Michael Haardt
.\" Modified Sun Feb 26 15:09:15 1995 by Rik Faith (faith@cs.unc.edu)
-.TH SHELLS 5 1993-11-21 "" "Linux Programmer's Manual"
+.TH SHELLS 5 2012-12-31 "" "Linux Programmer's Manual"
.SH NAME
shells \- pathnames of valid login shells
.SH DESCRIPTION
and available to be queried by other programs.
.PP
Be aware that there are programs which consult this file to
-find out if a user is a normal user.
-E.g.: ftp daemons traditionally
+find out if a user is a normal user;
+for example,
+FTP daemons traditionally
disallow access to users with shells not included in this file.
.SH FILES
.I /etc/shells
.RS
.I /bin/sh
.br
+.I /bin/bash
+.br
.I /bin/csh
.RE
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR chsh (1),
.BR getusershell (3)
.\" Copyright (c) 2001 Andreas Dilger (adilger@turbolinux.com)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
+.\"
+.\" FIXME Over time, the slabinfo format has gone through
+.\" version changes. These should be documented:
+.\"
+.\" slabinfo 1.0 - Linux 2.2 (precisely: 2.1.23)
+.\" slabinfo 1.1 - Linux 2.4 (precisely: 2.4.0-test3)
+.\" slabinfo 1.2 - Linux 2.5.45
+.\" slabinfo 2.0 - Linux 2.6 (precisely: 2.5.71)
+.\" slabinfo 2.1 - Linux 2.6.10
.\"
.TH SLABINFO 5 2007-09-30 "" "Linux Programmer's Manual"
.SH NAME
-/proc/slabinfo \- Kernel slab allocator statistics
+/proc/slabinfo \- kernel slab allocator statistics
.SH SYNOPSIS
.B cat /proc/slabinfo
.SH DESCRIPTION
.\" Copyright (c) 1993 Michael Haardt (michael@moria.de),
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified formatting Sat Jul 24 17:13:38 1993, Rik Faith (faith@cs.unc.edu)
.\" Modified (extensions and corrections)
Numeric: :co#80:\e
String: :sr=\eE[H:\e
.fi
-.SS "Boolean Capabilities"
+.SS Boolean capabilities
.nf
5i Printer will not echo on screen
am Automatic margins which means automatic line wrap
xs Text typed over standout text will be displayed in standout
xt Teleray glitch, destructive tabs and odd standout mode
.fi
-.SS "Numeric Capabilities"
+.SS Numeric capabilities
.nf
co Number of columns
dB Delay in milliseconds for backspace on hardcopy terminals
vt virtual terminal number
ws Width of status line if different from screen width
.fi
-.SS "String Capabilities"
+.SS String capabilities
.nf
!1 shifted save key
!2 shifted suspend key
.sp
The values in parentheses are suggested defaults which are used by curses,
if the capabilities are missing.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ncurses (3),
.BR termcap (3),
.BR terminfo (5)
.\" Copyright (c) 1993 Michael Haardt (michael@moria.de),
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Sat Jul 24 17:17:50 1993 by Rik Faith <faith@cs.unc.edu>
.\" Modified Thu Oct 19 21:25:21 MET 1995 by Martin Schulze <joey@infodrom.north.de>
.\" Modified Mon Oct 21 17:47:19 EDT 1996 by Eric S. Raymond
.\" <esr@thyrsus.com>xk
-.TH TTYTYPE 5 1993-07-24 "Linux" "Linux Programmer's Manual"
+.TH TTYTYPE 5 2012-12-31 "Linux" "Linux Programmer's Manual"
.SH NAME
ttytype \- terminal device to default terminal type mapping
.SH DESCRIPTION
The
.I /etc/ttytype
-file associates termcap/terminfo terminal type names
+file associates
+.BR termcap (5)/ terminfo (5)
+terminal type names
with tty lines.
Each line consists of a terminal type, followed by
whitespace, followed by a tty name (a device name without the
.br
vt320 ttys0
.RE
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR termcap (5),
.BR terminfo (5),
.BR agetty (8),
-.\" @(#)tzfile.5 7.11
+.\" %%%LICENSE_START(PUBLIC_DOMAIN)
.\" This file is in the public domain, so clarified as of
.\" 1996-06-05 by Arthur David Olson <arthur_david_olson@nih.gov>.
+.\" %%%LICENSE_END
+.\"
+.\" @(#)tzfile.5 7.11
+.\"
.TH TZFILE 5 2012-05-04 "" "Linux Programmer's Manual"
.SH NAME
tzfile \- timezone information
.BR ctime (3),
.BR tzset (3),
.BR tzselect (8),
-and
+
.I timezone/tzfile.h
-in the glibc source code.
+in the glibc source tree
.\" Copyright (c) 1993 Michael Haardt (michael@cantor.informatik.rwth-aachen.de),
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified 1993-07-25 by Rik Faith (faith@cs.unc.edu)
.\" Modified 1995-02-26 by Michael Haardt
.\" Modified 1996-07-20 by Michael Haardt
.\" Modified 1997-07-02 by Nicolás Lichtmaier <nick@debian.org>
.\" Modified 2004-10-31 by aeb, following Gwenole Beauchesne
-.TH UTMP 5 2011-09-28 "Linux" "Linux Programmer's Manual"
+.TH UTMP 5 2013-02-11 "Linux" "Linux Programmer's Manual"
.SH NAME
utmp, wtmp \- login records
.SH SYNOPSIS
/var/run/utmp
.br
/var/log/wtmp
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.PP
POSIX.1 does not specify a
.I utmp
structure to be the same as the
.I utmp
structure.
-.SS Comparison with Historical Systems
+.SS Comparison with historical systems
Linux utmp entries conform neither to v7/BSD nor to System V; they are a
mix of the two.
.IR /var/run/utmp " and/or " /var/log/wtmp .
.SH BUGS
This man page is based on the libc5 one, things may work differently now.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ac (1),
.BR date (1),
.BR last (1),
.BR login (1),
+.BR utmpdump (1),
.BR who (1),
.BR getutent (3),
.BR getutmp (3),
.\" Copyright (c) 1993 Michael Haardt (michael@moria.de),
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Sat Jul 24 17:19:57 1993 by Rik Faith (faith@cs.unc.edu)
.TH INTRO 6 2007-10-23 "Linux" "Linux Programmer's Manual"
.SH NAME
-intro \- Introduction to games
+intro \- introduction to games
.SH DESCRIPTION
Section 6 of the manual describes all the games and funny little programs
available on the system.
.SH NOTES
-.SS Authors and Copyright Conditions
+.SS Authors and copyright conditions
Look at the header of the manual page source for the author(s) and copyright
conditions.
Note that these can be different from page to page!
'\" t
.\" Copyright (c) 2010 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH AIO 7 2010-10-02 "Linux" "Linux Programmer's Manual"
+.TH AIO 7 2012-08-05 "Linux" "Linux Programmer's Manual"
.SH NAME
aio \- POSIX asynchronous I/O overview
.SH DESCRIPTION
.TP 16
.BR aio_init (3)
Set parameters for tuning the behavior of the glibc POSIX AIO implementation.
+.SH ERRORS
+.TP
+.B EINVAL
+The
+.I aio_reqprio
+field of the
+.I aiocb
+structure was less than 0,
+or was greater than the limit returned by the call
+.IR sysconf(_SC_AIO_PRIO_DELTA_MAX) .
+.SH VERSIONS
+The POSIX AIO interfaces are provided by glibc since version 2.1.
+.SH CONFORMING TO
+POSIX.1-2001, POSIX.1-2008.
.SH NOTES
It is a good idea to zero out the control block buffer before use (see
.BR memset (3)).
.I aiocb
structure yield undefined results.
-The current Linux POSIX AIO implementation is provided in userspace by glibc.
+The current Linux POSIX AIO implementation is provided in user space by glibc.
This has a number of limitations, most notably that maintaining multiple
threads to perform I/O operations is expensive and scales poorly.
Work has been in progress for some time on a kernel
.\" http://lse.sourceforge.net/io/aio.html
.\" http://lse.sourceforge.net/io/aionotes.txt
.\" http://lwn.net/Articles/148755/
-.SH ERRORS
-.TP
-.B EINVAL
-The
-.I aio_reqprio
-field of the
-.I aiocb
-structure was less than 0,
-or was greater than the limit returned by the call
-.IR sysconf(_SC_AIO_PRIO_DELTA_MAX) .
-.SH VERSIONS
-The POSIX AIO interfaces are provided by glibc since version 2.1.
-.SH CONFORMING TO
-POSIX.1-2001, POSIX.1-2008.
.SH EXAMPLE
The program below opens each of the files named in its command-line
arguments and queues a request on the resulting file descriptor using
.fi
.SH SEE ALSO
.ad l
+.nh
.BR io_cancel (2),
.BR io_destroy (2),
.BR io_getevents (2),
.BR aio_read (3),
.BR aio_return (3),
.BR aio_write (3),
-.BR lio_listio (3),
-http://www.squid-cache.org/~adrian/Reprint-Pulavarty-OLS2003.pdf
+.BR lio_listio (3)
+
+.UR http://www.squid-cache.org\:/~adrian\:/Reprint-Pulavarty-OLS2003.pdf
+.UE
'\" t -*- coding: ARMSCII-8 -*-
.\" Copyright 2009 Lefteris Dimitroulakis <edimitro at tee.gr>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\"
.TH ARMSCII-8 7 2010-09-20 "Linux" "Linux Programmer's Manual"
.SH DESCRIPTION
The Armenian Standard Code for Information Interchange,
8-bit coded character set.
-.SS "ArmSCII-8 Characters"
+.SS ArmSCII-8 characters
The following table displays the characters in ArmSCII-8, which
are printable and unlisted in the
.BR ascii (7)
375 253 FD ý ARMENIAN SMALL LETTER FEH
376 254 FE þ ARMENIAN APOSTROPHE
.TE
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ascii (7)
'\" t
.\" This man page is Copyright (C) 1999 Matthew Wilcox <willy@bofh.ai>.
+.\" %%%LICENSE_START(VERBATIM_ONE_PARA)
.\" Permission is granted to distribute possibly modified copies
.\" of this page provided the header is included verbatim,
.\" and in case of nontrivial modification author and date
.\" of the modification is added to the header.
+.\" %%%LICENSE_END
+.\"
.\" Modified June 1999 Andi Kleen
.\" $Id: arp.7,v 1.10 2000/04/27 19:31:38 ak Exp $
+.\"
.TH ARP 7 2008-11-25 "Linux" "Linux Programmer's Manual"
.SH NAME
arp \- Linux ARP kernel module.
ATF_DONTPUB:Don't answer
.TE
.RE
-
.PP
If the
.B ATF_NETMASK
This man page mashes IPv4 specific and shared between IPv4 and IPv6
functionality together.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR capabilities (7),
.BR ip (7)
.PP
RFC\ 826 for a description of ARP.
-.br
RFC\ 2461 for a description of IPv6 neighbor discovery and the base
algorithms used.
-.LP
Linux 2.2+ IPv4 ARP uses the IPv6 algorithms when applicable.
.\" Copyright (c) 1993 Michael Haardt (michael@moria.de)
.\" Created Fri Apr 2 11:32:09 MET DST 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified 1993-07-24 by Rik Faith (faith@cs.unc.edu)
.\" Modified 1994-05-15 by Daniel Quinlan (quinlan@yggdrasil.com)
.\" American National Standards Institute (ANSI) in 1969 and is the
.\" U.S. member body of ISO; private and nonprofit.
.\"
-.SH "SEE ALSO"
+.SH SEE ALSO
.ad l
.BR iso_8859-1 (7),
.BR iso_8859-10 (7),
.\" Written by Oron Peled <oron@actcom.co.il>.
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" May be distributed subject to the GPL.
+.\" %%%LICENSE_END
.\"
.\" I tried to be as much generic in the description as possible:
.\" - General boot sequence is applicable to almost any
.\"
.TH BOOT 7 2010-09-19 "Linux" "Linux Programmer's Manual"
.SH NAME
-boot-scripts \- General description of boot sequence
+boot-scripts \- general description of boot sequence
.SH DESCRIPTION
.LP
The boot sequence varies in details among systems
but can be roughly divided to the following steps:
-(i) hardware boot, (ii) OS loader,
+(i) hardware boot, (ii) operating system (OS) loader,
(iii) kernel startup, (iv) init and inittab,
(v) boot scripts.
We will describe each of these in more detail below.
-.SS "Hardware-boot"
+.SS Hardware-boot
After power-on or hard reset, control is given
to a program stored on read-only memory (normally
PROM).
to probe as possible boot devices.
Then the hardware boot stage accesses the boot device,
-loads the OS Loader, which is located on a fixed position
+loads the OS loader, which is located on a fixed position
on the boot device, and transfers control to it.
.TP
Note:
Those who want
to investigate this subject may want to research:
DHCP, TFTP, PXE, Etherboot.
-.SS "OS Loader"
-In PC, the OS Loader is located in the first sector
+.SS OS loader
+In PC, the OS loader is located in the first sector
of the boot device \- this is the \fBMBR\fR
(Master Boot Record).
there are some limitations to the size and complexity
of this loader, but the size limitation of the PC MBR
(512 bytes including the partition table) makes it
-almost impossible to squeeze a full OS Loader into it.
+almost impossible to squeeze a full OS loader into it.
Therefore, most operating systems make the primary loader
call a secondary OS loader which may be located on
containing the bootstrap code to load the second part
of the loader from the root partition.
-The main job of the OS Loader is to locate the kernel
+The main job of the OS loader is to locate the kernel
on the disk, load it and run it.
Most OS loaders allow
interactive use, to enable specification of alternative
kernel (maybe a backup in case the last compiled one
isn't functioning) and to pass optional parameters
to the kernel.
-.SS "Kernel Startup"
+.SS Kernel startup
When the kernel is loaded, it initializes the devices (via
their drivers), starts the swapper (it is a "kernel process",
called kswapd in modern Linux kernels), and mounts the root
program
.IR /sbin/init ,
passing any parameters that weren't handled by the kernel already.
-.SS "init and inittab"
+.SS init and inittab
When init starts it reads
.I /etc/inittab
for further instructions.
However, since it is not convenient to manage individual services
by editing this file, inittab only bootstraps a set of scripts
that actually start/stop the individual services.
-.SS "Boot Scripts"
-
+.SS Boot scripts
.TP
Note:
The following description applies to System V release 4-based systems, which
start, "status" do display the service status).
Running the script
without parameters displays the possible arguments.
-.SS "Sequencing Directories"
+.SS Sequencing directories
To make specific scripts start/stop at specific run-levels and in
specific order, there are \fIsequencing directories\fR.
These
However, on many versions of Linux, there are tools to help with this task
(e.g:
.BR chkconfig (8)).
-.SS "Boot Configuration"
+.SS Boot configuration
Usually the daemons started may optionally receive command-line options
and parameters.
To allow system administrators to change these
.\" Copyright (c) 1995,1997 Paul Gortmaker and Andries Brouwer
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" This man page written 950814 by aeb, based on Paul Gortmaker's HOWTO
.\" (dated v1.0.1, 15/08/95).
.\" FIXME ? The use of quotes on this page is inconsistent with the
.\" rest of man-pages.
.\"
-.TH BOOTPARAM 7 2007-12-16 "Linux" "Linux Programmer's Manual"
+.TH BOOTPARAM 7 2013-03-15 "Linux" "Linux Programmer's Manual"
.SH NAME
-bootparam \- Introduction to boot time parameters of the Linux kernel
+bootparam \- introduction to boot time parameters of the Linux kernel
.SH DESCRIPTION
The Linux kernel accepts certain 'command-line options' or 'boot time
parameters' at the moment it is started.
Booting DOS with the supplied driver, and
then loading Linux from the DOS prompt with loadlin avoids the reset
of the card that happens if one rebooted instead.
-.SS "The Argument List"
+.SS The argument list
The kernel command line is parsed into a list of strings
(boot arguments) separated by spaces.
Most of the boot args take the form of:
daemons.
Check the manual page for the version of init installed on
your system to see what arguments it accepts.
-.SS "General Non-device Specific Boot Arguments"
+.SS General non-device specific boot arguments
.TP
.B "'init=...'"
This sets the initial command to be executed by the kernel.
(E.g., /dev/sda3 is major 8, minor 3, so you could use 'root=0x803' as an
alternative.)
.TP
+.BR "'rootfstype=...'"
+The 'rootfstype' option tells the kernel to mount the root filesystem as
+if it where of the type specified.
+This can be useful (for example) to
+mount an ext3 filesystem as ext2 and then remove the journal in the root
+filesystem, in fact reverting its format from ext3 to ext2 without the
+need to boot the box from alternate media.
+.TP
.BR 'ro' " and " 'rw'
The 'ro' option tells the kernel to mount the root file system
as 'read-only' so that file system consistency check programs (fsck)
A command-line option of 'nosmp' or 'maxcpus=0' will disable SMP
activation entirely; an option 'maxcpus=N' limits the maximum number
of CPUs activated in SMP mode to N.
-.SS "Boot Arguments for Use by Kernel Developers"
+.SS Boot arguments for use by kernel developers
.TP
.B "'debug'"
Kernel messages are handed off to the kernel log daemon klogd so that they
buff_initial_age, bufferout_weight, buffermem_grace that control
kernel buffer memory management.
For kernel tuners only.
-.SS "Boot Arguments for Ramdisk Use"
+.SS Boot arguments for ramdisk use
(Only if the kernel was compiled with
.BR CONFIG_BLK_DEV_RAM .)
In general it is a bad idea to use a ramdisk under Linux\(emthe
(This device can be used only once: the data is freed as soon as
the last process that used it has closed
.IR /dev/initrd .)
-.SS "Boot Arguments for SCSI Devices"
+.SS Boot arguments for SCSI devices
General notation for this section:
.I iobase
.I Documentation/scsi/st.txt
(or
.I drivers/scsi/README.st
-for older kernels) in the kernel source.
+for older kernels) in the Linux kernel source.
.TP
.B "Adaptec aha151x, aha152x, aic6260, aic6360, SB16-SCSI configuration"
The aha numbers refer to cards and the aic numbers refer to the actual
.I Documentation/scsi/g_NCR5380.txt
(or
.I drivers/scsi/README.g_NCR5380
-for older kernels) in the kernel source.
+for older kernels) in the Linux kernel source.
.TP
.B "NCR53C8xx configuration"
.IP
clock:x, next.
For details, see
.IR /usr/src/linux/drivers/scsi/wd33c93.c .
-.SS "Hard Disks"
+.SS Hard disks
.TP
.B "IDE Disk/CD-ROM Driver Parameters"
The IDE driver accepts a number of parameters, which range from disk
.I Documentation/ide.txt
(or
.I drivers/block/README.ide
-for older kernels) in the kernel source for more details.
+for older kernels) in the Linux kernel source for more details.
.TP
.B "The 'hd=cyls,heads,sects[,wpcom[,irq]]' options"
These options are used to specify the physical geometry of the disk.
.B "Syquest's EZ* removable disks"
.IP
.BI ez= iobase[,irq[,rep[,nybble]]]
-.SS "IBM MCA Bus Devices"
+.SS IBM MCA bus devices
See also
.IR /usr/src/linux/Documentation/mca.txt .
.TP
\&'SoundBlaster', 'LaserMate', or 'SPEA'.
The I/O base is that of the
CD-ROM interface, and not that of the sound portion of the card.
-.SS "Ethernet Devices"
+.SS Ethernet devices
Different drivers make use of different parameters, but they all at
least share having an IRQ, an I/O port base value, and a name.
In its most generic form, it looks something like this:
of the param_n values where used.
Interested readers should refer to
the section in that document on their particular card.
-.SS "The Floppy Disk Driver"
+.SS The floppy disk driver
There are many floppy driver options, and they are all listed in
.I Documentation/floppy.txt
(or
.I drivers/block/README.fd
-for older kernels) in the kernel source.
+for older kernels) in the Linux kernel source.
This information is taken directly
from that file.
.TP
be an interaction between video and floppy.
The unexpected interrupts
only affect performance, and can safely be ignored.)
-.SS "The Sound Driver"
+.SS The sound driver
The sound driver can also accept boot args to override the compiled in
values.
This is not recommended, as it is rather complex.
-It is described in the kernel source file
+It is described in the Linux kernel source file
.IR Documentation/sound/oss/README.OSS
.RI ( drivers/sound/Readme.linux
in older kernel versions).
in your own personal values as recommended.
Using a boot arg of
\&'sound=0' will disable the sound driver entirely.
-.SS "ISDN Drivers"
+.SS ISDN drivers
.TP
.B "The ICN ISDN driver"
Syntax:
where iobase is the i/o port address of the card, membase is the
shared memory base address of the card, irq is the interrupt channel
the card uses, and teles_id is the unique ASCII string identifier.
-.SS "Serial Port Drivers"
+.SS Serial port drivers
.TP
.B "The RISCom/8 Multiport Serial Driver ('riscom8=')"
Syntax:
.I Documentation/networking/baycom.txt
(or
.I drivers/net/README.baycom
-for older kernels) in the kernel source.
+for older kernels) in the Linux kernel source.
.TP
.B "Soundcard radio modem driver"
Syntax:
The mode parameter is a string with syntax hw:modem,
where hw is one of sbc, wss, wssfdx and modem is one of
afsk1200, fsk9600.
-.SS "The Line Printer Driver"
+.SS The line printer driver
.TP
.B "'lp='"
Syntax:
Syntax:
.IP
wdt=io,irq
-.SS "Mouse Drivers"
+.SS Mouse drivers
.TP
.B "'bmouse=irq'"
The busmouse driver only accepts one parameter, that being the
Otherwise, the first argument
is the x-threshold, and the second the y-threshold.
These values must lie between 1 and 20 (inclusive); the default is 2.
-.SS "Video Hardware"
+.SS Video hardware
.TP
.B "'no-scroll'"
This option tells the console driver not to use hardware scroll
Braille machines.
.\" .SH AUTHORS
.\" Linus Torvalds (and many others)
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR lilo.conf (5),
.BR klogd (8),
.BR lilo (8),
.\" Copyright (c) 2002 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 6 Aug 2002 - Initial Creation
.\" Modified 2003-05-23, Michael Kerrisk, <mtk.manpages@gmail.com>
.\" other capabilities where the permitted or inheritable bit is set.
.\" 2011-09-07, mtk/Serge hallyn: Add CAP_SYSLOG
.\"
-.TH CAPABILITIES 7 2012-04-15 "Linux" "Linux Programmer's Manual"
+.TH CAPABILITIES 7 2013-03-11 "Linux" "Linux Programmer's Manual"
.SH NAME
capabilities \- overview of Linux capabilities
.SH DESCRIPTION
which can be independently enabled and disabled.
Capabilities are a per-thread attribute.
.\"
-.SS Capabilities List
+.SS Capabilities list
The following list shows the capabilities implemented on Linux,
and the operations or behaviors that each capability permits:
.TP
.BR CAP_AUDIT_WRITE " (since Linux 2.6.11)"
Write records to kernel auditing log.
.TP
+.BR CAP_BLOCK_SUSPEND " (since Linux 3.5)"
+Employ features that can block system suspend
+.RB ( epoll (7)
+.BR EPOLLWAKEUP ,
+.IR /proc/sys/wake_lock ).
+.TP
.B CAP_CHOWN
Make arbitrary changes to file UIDs and GIDs (see
.BR chown (2)).
.BR ptrace (2);
apply
.BR get_robust_list (2)
-to arbitrary processes.
+to arbitrary processes;
+inspect processes using
+.BR kcmp (2).
.TP
.B CAP_SYS_RAWIO
+.PD 0
+.RS
+.IP * 2
Perform I/O port operations
.RB ( iopl (2)
and
.BR ioperm (2));
+.IP *
access
.IR /proc/kcore ;
+.IP *
employ the
.B FIBMAP
.BR ioctl (2)
-operation.
+operation;
+.IP *
+open devices for accessing x86 model-specific registers (MSRs, see
+.BR msr (4))
+.IP *
+update
+.IR /proc/sys/vm/mmap_min_addr ;
+.IP *
+create memory mappings at addresses below the value specified by
+.IR /proc/sys/vm/mmap_min_addr ;
+.IP *
+map files in
+.IR /proc/pci/bus ;
+.IP *
+open
+.IR /dev/mem
+and
+.IR /dev/kmem ;
+.IP *
+perform various SCSI device commands;
+.IP *
+perform certain operations on
+.BR hpsa (4)
+and
+.BR cciss (4)
+devices;
+.IP *
+perform a range of device-specific operations on other devices.
+.RE
+.PD
.TP
.B CAP_SYS_RESOURCE
.PD 0
employ
.BR prctl (2)
.B PR_SET_MM
-operation.
+operation;
+set
+.IR /proc/PID/oom_score_adj
+to a value lower than the value last set by a process with
+.BR CAP_SYS_RESOURCE .
.RE
.PD
.TP
operations on virtual terminals.
.TP
.BR CAP_SYSLOG " (since Linux 2.6.37)"
+.IP * 3
Perform privileged
.BR syslog (2)
operations.
See
.BR syslog (2)
for information on which operations require privilege.
+.IP *
+View kernel addresses exposed via
+.I /proc
+and other interfaces when
+.IR /proc/sys/kernel/kptr_restrict
+has the value 1.
+(See the discussion of the
+.I kptr_restrict
+in
+.BR proc (5).)
.TP
.BR CAP_WAKE_ALARM " (since Linux 3.0)"
Trigger something that will wake up the system (set
.B CLOCK_BOOTTIME_ALARM
timers).
.\"
-.SS Past and Current Implementation
+.SS Past and current implementation
A full implementation of capabilities requires that:
.IP 1. 3
For all privileged operations,
Before kernel 2.6.24, only the first two of these requirements are met;
since kernel 2.6.24, all three requirements are met.
.\"
-.SS Thread Capability Sets
+.SS Thread capability sets
Each thread has three capability sets containing zero or more
of the above capabilities:
.TP
.BR capset (2),
a thread may manipulate its own capability sets (see below).
.\"
-.SS File Capabilities
+.SS File capabilities
Since kernel 2.6.24, the kernel supports
associating capability sets with an executable file using
.BR setcap (8).
for all other capabilities for which the corresponding permitted or
inheritable flags is enabled.
.\"
-.SS Transformation of Capabilities During execve()
+.SS Transformation of capabilities during execve()
.PP
During an
.BR execve (2),
back into the thread's inherited set in the future.
.\"
.\"
-.SS Effect of User ID Changes on Capabilities
+.SS Effect of user ID changes on capabilities
To preserve the traditional semantics for transitions between
0 and nonzero user IDs,
the kernel makes the following changes to a thread's capability
that the thread does not currently have).
.IP 4.
The new effective set must be a subset of the new permitted set.
-.SS The """securebits"" flags: establishing a capabilities-only environment
+.SS The securebits flags: establishing a capabilities-only environment
.\" For some background:
.\" see http://lwn.net/Articles/280279/ and
.\" http://article.gmane.org/gmane.linux.kernel.lsm/5476/
SECBIT_NOROOT_LOCKED);
.fi
.in
-.SH "CONFORMING TO"
+.SH CONFORMING TO
.PP
No standards govern capabilities, but the Linux capability implementation
is based on the withdrawn POSIX.1e draft standard; see
-.IR http://wt.xpilot.org/publications/posix.1e/ .
+.UR http://wt.tuxomania.net\:/publications\:/posix.1e/
+.UE .
.SH NOTES
Since kernel 2.5.27, capabilities are an optional kernel component,
and can be enabled/disabled via the CONFIG_SECURITY_CAPABILITIES
The
.I /proc/PID/status
file shows the capability sets of a process's main thread.
+Before Linux 3.8, nonexistent capabilities were shown as being
+enabled (1) in these sets.
+Since Linux 3.8,
+.\" 7b9a7ec565505699f503b4fcf61500dceb36e744
+all non-existent capabilities (above
+.BR CAP_LAST_CAP )
+are shown as disabled (0).
The
.I libcap
programs.
It can be found at
.br
-.IR http://www.kernel.org/pub/linux/libs/security/linux-privs .
+.UR http://www.kernel.org\:/pub\:/linux\:/libs\:/security\:/linux-privs
+.UE .
Before kernel 2.6.24, and since kernel 2.6.24 if
file capabilities are not enabled, a thread with the
starts out with this capability removed from its per-process bounding
set, and that bounding set is inherited by all other processes
created on the system.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR capget (2),
.BR prctl (2),
.BR setfsuid (2),
.BR getcap (8),
.BR setcap (8)
.PP
-Comments on the purposes of various capabilities in
.I include/linux/capability.h
-in the kernel source
+in the Linux kernel source tree
.\" Copyright (c) 1996 Eric S. Raymond <esr@thyrsus.com>
.\" and Andries Brouwer <aeb@cwi.nl>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_ONEPARA)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
+.\" %%%LICENSE_END
.\"
.\" This is combined from many sources, including notes by aeb and
.\" research by esr. Portions derive from a writeup by Roman Czyborra.
.\"
.\" Last changed by David Starner <dstarner98@aasaa.ofe.org>.
-.TH CHARSETS 7 2008-06-03 "Linux" "Linux Programmer's Manual"
+.TH CHARSETS 7 2012-08-05 "Linux" "Linux Programmer's Manual"
.SH NAME
charsets \- programmer's view of character sets and internationalization
.SH DESCRIPTION
either a series of 16-bit integers (UTF-16) (needing two 16-bit integers
only when encoding certain rare characters) or a series of 8-bit bytes
(UTF-8).
-Information on Unicode is available at <http://www.unicode.org>.
+Information on Unicode is available at
+.UR http://www.unicode.org
+.UE .
.LP
Linux represents Unicode using the 8-bit Unicode Transformation Format
(UTF-8).
characters.
So Thai, Sioux and any other script needing combining
characters can't be handled on the console.
-.SS "ISO 2022 and ISO 4873"
+.SS ISO 2022 and ISO 4873
The ISO 2022 and 4873 standards describe a font-control model
based on VT100 practice.
This model is (partially) supported
In particular, \fB^N\fP and \fB^O\fP are not used anymore, ESC ( xx
can be used only with xx=B, and ESC ) xx, ESC * xx, ESC + xx
are equivalent to ESC \- xx, ESC . xx, ESC / xx, respectively.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR console (4),
.BR console_codes (4),
.BR console_ioctl (4),
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
.TH COMPLEX 7 2011-09-16 "" "Linux Programmer's Manual"
.SH NAME
printf("%f + %f * i\\n", creal(z), cimag(z));
}
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cabs (3),
.BR cacos (3),
.BR cacosh (3),
'\" t -*- coding: CP1251 -*-
.\" Copyright 2009 Lefteris Dimitroulakis (edimitro@tee.gr)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
+.\"
.TH CP1251 7 2010-09-20 "Linux" "Linux Programmer's Manual"
.SH NAME
cp1251 \- CP\ 1251 character set encoded in octal, decimal,
.TE
.SH NOTES
CP\ 1251 is also known as Windows Cyrillic.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ascii (7)
.\"
.\" Author: Paul Jackson (http://oss.sgi.com/projects/cpusets)
.\"
+.\" %%%LICENSE_START(GPLv2_MISC)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License
.\" version 2 as published by the Free Software Foundation.
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston,
-.\" MA 02111, USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
-.TH CPUSET 7 2008-11-12 "Linux" "Linux Programmer's Manual"
+.TH CPUSET 7 2013-02-12 "Linux" "Linux Programmer's Manual"
.SH NAME
cpuset \- confine processes to processor and memory node subsets
.SH DESCRIPTION
See the \fBNotify On Release\fR section, below.
.\" ====================== cpus ======================
.TP
-.I cpus
+.I cpuset.cpus
List of the physical numbers of the CPUs on which processes
in that cpuset are allowed to execute.
See \fBList Format\fR below for a description of the
file.
.\" ==================== cpu_exclusive ====================
.TP
-.I cpu_exclusive
+.I cpuset.cpu_exclusive
Flag (0 or 1).
If set (1), the cpuset has exclusive use of
its CPUs (no sibling or cousin cpuset may overlap CPUs).
of its parent cpuset.
.\" ====================== mems ======================
.TP
-.I mems
+.I cpuset.mems
List of memory nodes on which processes in this cpuset are
allowed to allocate memory.
See \fBList Format\fR below for a description of the
.IR mems .
.\" ==================== mem_exclusive ====================
.TP
-.I mem_exclusive
+.I cpuset.mem_exclusive
Flag (0 or 1).
If set (1), the cpuset has exclusive use of
its memory nodes (no sibling or cousin may overlap).
of that cpuset's parent cpuset.
.\" ==================== mem_hardwall ====================
.TP
-.IR mem_hardwall " (since Linux 2.6.26)"
+.IR cpuset.mem_hardwall " (since Linux 2.6.26)"
Flag (0 or 1).
If set (1), the cpuset is a \fBHardwall\fR cpuset (see below.)
Unlike \fBmem_exclusive\fR,
Newly created cpusets also initially default this to off (0).
.\" ==================== memory_migrate ====================
.TP
-.IR memory_migrate " (since Linux 2.6.16)"
+.IR cpuset.memory_migrate " (since Linux 2.6.16)"
Flag (0 or 1).
If set (1), then memory migration is enabled.
By default this is off (0).
See the \fBMemory Migration\fR section, below.
.\" ==================== memory_pressure ====================
.TP
-.IR memory_pressure " (since Linux 2.6.16)"
+.IR cpuset.memory_pressure " (since Linux 2.6.16)"
A measure of how much memory pressure the processes in this
cpuset are causing.
See the \fBMemory Pressure\fR section, below.
section, below.
.\" ================= memory_pressure_enabled =================
.TP
-.IR memory_pressure_enabled " (since Linux 2.6.16)"
+.IR cpuset.memory_pressure_enabled " (since Linux 2.6.16)"
Flag (0 or 1).
This file is only present in the root cpuset, normally
.IR /dev/cpuset .
\fBMemory Pressure\fR section, below.
.\" ================== memory_spread_page ==================
.TP
-.IR memory_spread_page " (since Linux 2.6.17)"
+.IR cpuset.memory_spread_page " (since Linux 2.6.17)"
Flag (0 or 1).
If set (1), pages in the kernel page cache
(file-system buffers) are uniformly spread across the cpuset.
See the \fBMemory Spread\fR section, below.
.\" ================== memory_spread_slab ==================
.TP
-.IR memory_spread_slab " (since Linux 2.6.17)"
+.IR cpuset.memory_spread_slab " (since Linux 2.6.17)"
Flag (0 or 1).
If set (1), the kernel slab caches
for file I/O (directory and inode structures) are
See the \fBMemory Spread\fR section, below.
.\" ================== sched_load_balance ==================
.TP
-.IR sched_load_balance " (since Linux 2.6.24)"
+.IR cpuset.sched_load_balance " (since Linux 2.6.24)"
Flag (0 or 1).
If set (1, the default) the kernel will
automatically load balance processes in that cpuset over
See \fBScheduler Load Balancing\fR, below, for further details.
.\" ================== sched_relax_domain_level ==================
.TP
-.IR sched_relax_domain_level " (since Linux 2.6.26)"
+.IR cpuset.sched_relax_domain_level " (since Linux 2.6.26)"
Integer, between \-1 and a small positive value.
The
.I sched_relax_domain_level
a process is allowed to use, cpusets provide the following
extended capabilities.
.\" ================== Exclusive Cpusets ==================
-.SS Exclusive Cpusets
+.SS Exclusive cpusets
If a cpuset is marked
.I cpu_exclusive
or
.I hardwall
cpuset.
.\" ================== Notify On Release ==================
-.SS Notify On Release
+.SS Notify on release
If the
.I notify_on_release
flag is enabled (1) in a cpuset,
number 0 or 1 (with optional trailing newline)
into the file, to clear or set the flag, respectively.
.\" ================== Memory Pressure ==================
-.SS Memory Pressure
+.SS Memory pressure
The
.I memory_pressure
of a cpuset provides a simple per-cpuset running average of
what action to take if it detects signs of memory pressure.
.PP
Unless memory pressure calculation is enabled by setting the pseudo-file
-.IR /dev/cpuset/memory_pressure_enabled ,
+.IR /dev/cpuset/cpuset.memory_pressure_enabled ,
it is not computed for any cpuset, and reads from any
.I memory_pressure
always return zero, as represented by the ASCII string "0\en".
will have to be reread from disk.
.PP
The
-.I memory_pressure
+.I cpuset.memory_pressure
file provides an integer number representing the recent (half-life of
10 seconds) rate of entries to the direct reclaim code caused by any
process in the cpuset, in units of reclaims attempted per second,
times 1000.
.\" ================== Memory Spread ==================
-.SS Memory Spread
+.SS Memory spread
There are two Boolean flag files per cpuset that control where the
kernel allocates pages for the file-system buffers and related
in-kernel data structures.
They are called
-.I memory_spread_page
+.I cpuset.memory_spread_page
and
-.IR memory_spread_slab .
+.IR cpuset.memory_spread_slab .
.PP
If the per-cpuset Boolean flag file
-.I memory_spread_page
+.I cpuset.memory_spread_page
is set, then
the kernel will spread the file-system buffers (page cache) evenly
over all the nodes that the faulting process is allowed to use, instead
of preferring to put those pages on the node where the process is running.
.PP
If the per-cpuset Boolean flag file
-.I memory_spread_slab
+.I cpuset.memory_spread_slab
is set,
then the kernel will spread some file-system-related slab caches,
such as those for inodes and directory entries, evenly over all the nodes
reapplied.
.PP
Both
-.I memory_spread_page
+.I cpuset.memory_spread_page
and
-.I memory_spread_slab
+.I cpuset.memory_spread_slab
are Boolean flag files.
By default they contain "0", meaning that the feature is off
for that cpuset.
especially for jobs that might have just a single
thread initializing or reading in the data set.
.\" ================== Memory Migration ==================
-.SS Memory Migration
+.SS Memory migration
Normally, under the default setting (disabled) of
-.IR memory_migrate ,
+.IR cpuset.memory_migrate ,
once a page is allocated (given a physical page
of main memory) then that page stays on whatever node it
was allocated, so long as it remains allocated, even if the
then the page will be placed on the second valid node of the new cpuset,
if possible.
.\" ================== Scheduler Load Balancing ==================
-.SS Scheduler Load Balancing
+.SS Scheduler load balancing
The kernel scheduler automatically load balances processes.
If one CPU is underutilized,
the kernel will look for processes on other more
.I sched_load_balance
as those processes aren't going anywhere else anyway.
.\" ================== Scheduler Relax Domain Level ==================
-.SS Scheduler Relax Domain Level
+.SS Scheduler relax domain level
The kernel scheduler performs immediate load balancing whenever
a CPU becomes free or another task becomes runnable.
This load
The following formats are used to represent sets of
CPUs and memory nodes.
.\" ================== Mask Format ==================
-.SS Mask Format
-The \fBMask Format\fR is used to represent CPU and memory-node bitmasks
+.SS Mask format
+The \fBMask Format\fR is used to represent CPU and memory-node bit masks
in the
.I /proc/<pid>/status
file.
The hex digits within a word are also in big-endian order.
.PP
The number of 32-bit words displayed is the minimum number needed to
-display all bits of the bitmask, based on the size of the bitmask.
+display all bits of the bit mask, based on the size of the bit mask.
.PP
Examples of the \fBMask Format\fR:
.PP
second for bit 32, the third for bit 16, the fourth for bit 8, the
fifth for bit 4, and the "7" is for bits 2, 1, and 0.
.\" ================== List Format ==================
-.SS List Format
+.SS List format
The \fBList Format\fR for
.I cpus
and
.SH WARNINGS
.SS Enabling memory_pressure
By default, the per-cpuset file
-.I memory_pressure
+.I cpuset.memory_pressure
always contains zero (0).
Unless this feature is enabled by writing "1" to the pseudo-file
-.IR /dev/cpuset/memory_pressure_enabled ,
+.IR /dev/cpuset/cpuset.memory_pressure_enabled ,
the kernel does
not compute per-cpuset
.IR memory_pressure .
.in +4n
.nf
-echo 19 > mems
+echo 19 > cpuset.mems
.fi
.in
.in +4n
.nf
-/bin/echo 19 > mems
+/bin/echo 19 > cpuset.mems
/bin/echo: write error: Invalid argument
.fi
.in
.B EACCES
Attempted to set, using
.BR write (2),
-.I cpu_exclusive
+.I cpuset.cpu_exclusive
or
-.I mem_exclusive
+.I cpuset.mem_exclusive
on a cpuset whose parent lacks the same setting.
.TP
.B EACCES
Attempted to
.BR write (2)
a
-.I memory_pressure
+.I cpuset.memory_pressure
file.
.TP
.B EACCES
Attempted to
.BR write (2)
an empty
-.I cpus
+.I cpuset.cpus
or
-.I mems
+.I cpuset.mems
list to a cpuset which has attached processes or child cpusets.
.TP
.B EINVAL
Attempted to
.BR write (2)
a
-.I cpus
+.I cpuset.cpus
or
-.I mems
+.I cpuset.mems
list which included a range with the second number smaller than
the first number.
.TP
Attempted to
.BR write (2)
a
-.I cpus
+.I cpuset.cpus
or
-.I mems
+.I cpuset.mems
list which included an invalid character in the string.
.TP
.B EINVAL
Attempted to
.BR write (2)
a list to a
-.I cpus
+.I cpuset.cpus
file that did not include any online CPUs.
.TP
.B EINVAL
Attempted to
.BR write (2)
a list to a
-.I mems
+.I cpuset.mems
file that did not include any online memory nodes.
.TP
.B EINVAL
Attempted to
.BR write (2)
a list to a
-.I mems
+.I cpuset.mems
file that included a node that held no memory.
.TP
.B EIO
of a process to a cpuset
.I tasks
file when the cpuset had an empty
-.I cpus
+.I cpuset.cpus
or empty
-.I mems
+.I cpuset.mems
setting.
.TP
.B ENOSPC
Attempted to
.BR write (2)
an empty
-.I cpus
+.I cpuset.cpus
or
-.I mems
+.I cpuset.mems
setting to a cpuset that
has tasks attached.
.TP
.TP
.B ERANGE
Specified a
-.I cpus
+.I cpuset.cpus
or
-.I mems
+.I cpuset.mems
list to the kernel which included a number too large for the kernel
-to set in its bitmasks.
+to set in its bit masks.
.TP
.B ESRCH
Attempted to
.IR pid .
.\" ================== BUGS ==================
.SH BUGS
-.I memory_pressure
+.I cpuset.memory_pressure
cpuset files can be opened
for writing, creation, or truncation, but then the
.BR write (2)
.RB "$" " cd /dev/cpuset"
.RB "$" " mkdir Charlie"
.RB "$" " cd Charlie"
-.RB "$" " /bin/echo 2-3 > cpus"
-.RB "$" " /bin/echo 1 > mems"
+.RB "$" " /bin/echo 2-3 > cpuset.cpus"
+.RB "$" " /bin/echo 1 > cpuset.mems"
.RB "$" " /bin/echo $$ > tasks"
# The current shell is now running in cpuset Charlie
# The next line should display '/Charlie'
.RB "$" " cd /dev/cpuset"
.RB "$" " mkdir beta"
.RB "$" " cd beta"
-.RB "$" " /bin/echo 16-19 > cpus"
-.RB "$" " /bin/echo 8-9 > mems"
-.RB "$" " /bin/echo 1 > memory_migrate"
+.RB "$" " /bin/echo 16-19 > cpuset.cpus"
+.RB "$" " /bin/echo 8-9 > cpuset.mems"
+.RB "$" " /bin/echo 1 > cpuset.memory_migrate"
.RB "$" " while read i; do /bin/echo $i; done < ../alpha/tasks > tasks"
.fi
.in
.BR migratepages (8),
.BR numactl (8)
.PP
-The kernel source file
-.IR Documentation/cpusets.txt .
+.IR Documentation/cpusets.txt
+in the Linux kernel source tree
.\" Copyright (c) 2007 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 2007-06-13 Creation
.\"
A process's PID is preserved across an
.BR execve (2).
-.SS Parent Process ID (PPID)
+.SS Parent process ID (PPID)
A process's parent process ID identifies the process that created
this process using
.BR fork (2).
A process's PPID is preserved across an
.BR execve (2).
-.SS Process Group ID and Session ID
+.SS Process group ID and session ID
Each process has a session ID and a process group ID,
both represented using the type
.IR pid_t .
as the PID of the process that called
.BR setsid (2).
The creator of the session is called the \fIsession leader\fP.
-.SS User and Group Identifiers
+.SS User and group identifiers
Each process has various associated user and groups IDs.
These IDs are integers, respectively represented using the types
.I uid_t
when checking the limit on the number of inotify instances
that the process may create; see
.BR inotify (7).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
Process IDs, parent process IDs, process group IDs, and session IDs
are specified in POSIX.1-2001.
The real, effective, and saved set user and groups IDs,
.BR setuid (2),
.BR setresuid (2))
is carried through to all of the POSIX threads in a process.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR bash (1),
.BR csh (1),
.BR ps (1),
.\" This man page is Copyright (C) 1998 Alan Cox.
+.\"
+.\" %%%LICENSE_START(VERBATIM_ONE_PARA)
.\" Permission is granted to distribute possibly modified copies
.\" of this page provided the header is included verbatim,
.\" and in case of nontrivial modification author and date
.\" of the modification is added to the header.
+.\" %%%LICENSE_END
+.\"
.\" $Id: ddp.7,v 1.3 1999/05/13 11:33:22 freitag Exp $
+.\"
.TH DDP 7 2008-11-20 "Linux" "Linux Programmer's Manual"
.SH NAME
ddp \- Linux AppleTalk protocol implementation
or when the process has the
.B CAP_NET_RAW
capability.
-.SS "Address Format"
+.SS Address format
An Appletalk socket address is defined as a combination of a network number,
a node number, and a port number.
.PP
is a link
local broadcast address.
.\" FIXME this doesn't make sense [johnl]
-.SS "Socket Options"
+.SS Socket options
No protocol-specific socket options are supported.
.SS /proc interfaces
IP supports a set of
.B EPERM
User doesn't have permission to set high priority,
make a configuration change,
-or send signals to the requested process or group,
+or send signals to the requested process or group.
.TP
.B EPIPE
The connection was unexpectedly closed or shut down by the other end.
.PP
The ioctls used to configure routing tables, devices,
AARP tables and other devices are not yet described.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR recvmsg (2),
.BR sendmsg (2),
.BR capabilities (7),
.\" Fri Apr 2 11:32:09 MET DST 1993
.\" and Andries Brouwer (aeb@cwi.nl), Fri Feb 14 21:47:50 1997.
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Sun Jul 25 10:45:30 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified Sun Jul 21 21:25:26 1996 by Andries Brouwer (aeb@cwi.nl)
.I gzip
should consider renaming their option to
.BR GZIP_OPT .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR bash (1),
.BR csh (1),
.BR login (1),
-.\"
-.\" epoll by Davide Libenzi ( efficient event notification retrieval )
.\" Copyright (C) 2003 Davide Libenzi
.\"
+.\" %%%LICENSE_START(GPLv2+_SW_3_PARA)
.\" This program is free software; you can redistribute it and/or modify
.\" it under the terms of the GNU General Public License as published by
.\" the Free Software Foundation; either version 2 of the License, or
.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
.\" GNU General Public License for more details.
.\"
-.\" You should have received a copy of the GNU General Public License
-.\" along with this program; if not, write to the Free Software
-.\" Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
+.\" You should have received a copy of the GNU General Public
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Davide Libenzi <davidel@xmailserver.org>
.\"
.BR epoll_wait (2)
waits for I/O events,
blocking the calling thread if no events are currently available.
-.SS Level-Triggered and Edge-Triggered
+.SS Level-triggered and edge-triggered
The
.B epoll
event distribution interface is able to behave both as edge-triggered
.I max_user_watches
is 1/25 (4%) of the available low memory,
divided by the registration cost in bytes.
-.SS Example for Suggested Usage
+.SS Example for suggested usage
While the usage of
.B epoll
when employed as a level-triggered interface does have the same
.BR epoll_ctl (2)
with
.BR EPOLL_CTL_MOD .
-.SS Questions and Answers
+.SS Questions and answers
.TP 4
.B Q0
What is the key used to distinguish the file descriptors registered in an
.BR write (2).
(Avoid this latter technique if you cannot guarantee that
the monitored file descriptor always refers to a stream-oriented file.)
-.SS Possible Pitfalls and Ways to Avoid Them
+.SS Possible pitfalls and ways to avoid them
.TP
.B o Starvation (edge-triggered)
.PP
.IR kqueue ,
and Solaris has
.IR /dev/poll .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR epoll_create (2),
.BR epoll_create1 (2),
.BR epoll_ctl (2),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" This manpage is Copyright (C) 2006, Michael Kerrisk
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH FEATURE_TEST_MACROS 7 2012-01-18 "Linux" "Linux Programmer's Manual"
+.TH FEATURE_TEST_MACROS 7 2012-08-05 "Linux" "Linux Programmer's Manual"
.SH NAME
feature_test_macros \- feature test macros
.SH SYNOPSIS
Expose definitions for the alternative API specified by the
LFS (Large File Summit) as a "transitional extension" to the
Single UNIX Specification.
-(See http://opengroup.org/platform/lfs.html.)
+(See
+.UR http:\:/\:/opengroup.org\:/platform\:/lfs.html
+.UE )
The alternative API consists of a set of new objects
(i.e., functions and types) whose names are suffixed with "64"
(e.g.,
.SH SEE ALSO
.BR libc (7),
.BR standards (7)
-.sp
+
The section "Feature Test Macros" under
.IR "info libc" .
.\" But beware: the info libc document is out of date (Jul 07, mtk)
-.sp
+
.I /usr/include/features.h
.\" This man page is Copyright (C) 1999 Claus Fischer.
+.\"
+.\" %%%LICENSE_START(VERBATIM_ONE_PARA)
.\" Permission is granted to distribute possibly modified copies
.\" of this page provided the header is included verbatim,
.\" and in case of nontrivial modification author and date
.\" of the modification is added to the header.
+.\" %%%LICENSE_END
.\"
.\" 990620 - page created - aeb@cwi.nl
.\"
and are indicated by
.IR "ls \-l"
with the file type \(aqp\(aq.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR mkfifo (1),
.BR open (2),
.BR pipe (2),
-.\" This page is made available under the MIT license.
-.\"
.\" This manpage has been automatically generated by docbook2man
.\" from a DocBook document. This tool can be found at:
.\" <http://shell.ipoline.com/~elmert/comp/docbook2X/>
.\" Please send any bug reports, improvements, comments, patches,
.\" etc. to Steve Cheng <steve@ggi-project.org>.
-.TH FUTEX 7 2002-12-31 "Linux" "Linux Programmer's Manual"
+.\"
+.\" %%%LICENSE_START(MIT)
+.\" This page is made available under the MIT license.
+.\" %%%LICENSE_END
+.\"
+.TH FUTEX 7 2012-08-05 "Linux" "Linux Programmer's Manual"
.SH NAME
-futex \- Fast Userspace Locking
+futex \- fast user-space locking
.SH SYNOPSIS
.nf
.B #include <linux/futex.h>
.fi
.SH DESCRIPTION
.PP
-The Linux kernel provides futexes ("Fast Userspace muTexes")
-as a building block for fast userspace
+The Linux kernel provides futexes ("Fast user-space mutexes")
+as a building block for fast user-space
locking and semaphores.
Futexes are very basic and lend themselves well for building higher level
locking abstractions such as POSIX mutexes.
it is a counter that can be incremented and decremented atomically;
processes can wait for the value to become positive.
.PP
-Futex operation is entirely userspace for the noncontended case.
+Futex operation is entirely user space for the noncontended case.
The kernel is only involved to arbitrate the contended case.
As any sane design will strive for noncontention,
futexes are also optimized for this situation.
.BR mmap (2),
via shared memory segments or because they share memory space,
in which case the application is commonly called multithreaded.
-.SS "Semantics"
+.SS Semantics
.PP
-Any futex operation starts in userspace,
+Any futex operation starts in user space,
but it may necessary to communicate with the kernel using the
.BR futex (2)
system call.
In the contended case, the atomic increment changed the counter
from \-1 (or some other negative number).
If this is detected, there are waiters.
-Userspace should now set the counter to 1 and instruct the
+User space should now set the counter to 1 and instruct the
kernel to wake up any waiters using the
.B FUTEX_WAKE
operation.
for
more details.
The same holds for asynchronous futex waiting.
-.SH "VERSIONS"
+.SH VERSIONS
.PP
Initial futex support was merged in Linux 2.5.7
but with different semantics from those described above.
Current semantics are available from Linux 2.5.40 onward.
-.SH "NOTES"
+.SH NOTES
.PP
To reiterate, bare futexes are not intended as an easy to use
abstraction for end-users.
Implementors are expected to be assembly literate and to have read
-the sources of the futex userspace library referenced
+the sources of the futex user-space library referenced
below.
.PP
This man page illustrates the most common use of the
.\" Matthew Kirkwood, Ingo Molnar (Red Hat) and
.\" Rusty Russell (IBM Linux Technology Center).
.\" This page written by bert hubert.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR futex (2)
-.PP
+
.IR "Fuss, Futexes and Furwocks: Fast Userlevel Locking in Linux"
(proceedings of the Ottawa Linux Symposium 2002),
futex example library, futex-*.tar.bz2
-<URL:ftp://ftp.kernel.org/pub/linux/kernel/people/rusty/>.
+.UR ftp://ftp.kernel.org\:/pub\:/linux\:/kernel\:/people\:/rusty/
+.UE .
.\" Copyright (c) 1998 Andries Brouwer
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 2003-08-24 fix for / by John Kristoff + joey
.\"
-.TH GLOB 7 2003-08-24 "Linux" "Linux Programmer's Manual"
+.TH GLOB 7 2012-07-28 "Linux" "Linux Programmer's Manual"
.SH NAME
-glob \- Globbing pathnames
+glob \- globbing pathnames
.SH DESCRIPTION
Long ago, in UNIX V6, there was a program
.I /etc/glob
that will perform this function for a user program.
The rules are as follows (POSIX.2, 3.13).
-.SS "Wildcard Matching"
+.SS Wildcard matching
A string is a wildcard pattern if it contains one of the
characters \(aq?\(aq, \(aq*\(aq or \(aq[\(aq.
Globbing is the operation
this character must be matched explicitly.
(Thus, \fIrm\ *\fP will not remove .profile, and \fItar\ c\ *\fP will not
archive all your files; \fItar\ c\ .\fP is better.)
-.SS "Empty Lists"
+.SS Empty lists
The nice and simple rule given above: "expand a wildcard pattern
into the list of matching pathnames" was the original UNIX
definition.
It allowed one to have patterns that expand into
an empty list, as in
-.br
+
.nf
xv \-wait 0 *.gif *.jpg
.fi
+
where perhaps no *.gif files are present (and this is not
an error).
However, POSIX requires that a wildcard pattern is left
matching pathnames is empty.
With
.I bash
-one can force the classical behavior by setting
-.IR allow_null_glob_expansion=true .
+one can force the classical behavior using this command:
+
+ shopt -s nullglob
+.\" In Bash v1, by setting allow_null_glob_expansion=true
(Similar problems occur elsewhere.
E.g., where old scripts have
-.br
+
.nf
rm \`find . \-name "*~"\`
.fi
+
new scripts require
-.br
+
.nf
rm \-f nosuchfile \`find . \-name "*~"\`
.fi
+
to avoid error messages from
.I rm
called with an empty argument list.)
Now that regular expressions have bracket expressions where
the negation is indicated by a \(aq^\(aq, POSIX has declared the
effect of a wildcard pattern "\fI[^...]\fP" to be undefined.
-.SS Character classes and Internationalization
+.SS Character classes and internationalization
Of course ranges were originally meant to be ASCII ranges,
so that "\fI[\ \-%]\fP" stands for "\fI[\ !"#$%]\fP" and "\fI[a\-z]\fP" stands
for "any lowercase letter".
element from its equivalence class, as defined for the
current locale.
For example, "\fI[[=a=]]\fP" might be equivalent
-.\" FIXME . the accented 'a' characters are not rendering properly
-.\" mtk May 2007
-to "\fI[aáàäâ]\fP" (warning: Latin-1 here), that is,
+to "\fI[a\('a\(`a\(:a\(^a]\fP", that is,
to "\fI[a[.a-acute.][.a-grave.][.a-umlaut.][.a-circumflex.]]\fP".
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sh (1),
.BR fnmatch (3),
.BR glob (3),
.\" Copyright (c) 1993 by Thomas Koenig (ig25@rz.uni-karlsruhe.de)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
+.\"
.\" Modified Sun Jul 25 11:05:58 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified Sat Feb 10 16:18:03 1996 by Urs Thuermann (urs@isnogud.escape.de)
.\" Modified Mon Jun 16 20:02:00 1997 by Nicolás Lichtmaier <nick@debian.org>
.\" Modified Mon Feb 6 16:41:00 1999 by Nicolás Lichtmaier <nick@debian.org>
.\" Modified Tue Feb 8 16:46:45 2000 by Chris Pepper <pepper@tgg.com>
.\" Modified Fri Sep 7 20:32:45 2001 by Tammy Fox <tfox@redhat.com>
-.TH HIER 7 2009-03-30 "Linux" "Linux Programmer's Manual"
+.TH HIER 7 2012-08-05 "Linux" "Linux Programmer's Manual"
.SH NAME
-hier \- Description of the file system hierarchy
+hier \- description of the file system hierarchy
.SH DESCRIPTION
A typical Linux system has, among others, the following directories:
.TP
.TP
.I /var/yp
Database files for NIS.
-.SH "CONFORMING TO"
-The Filesystem Hierarchy Standard, Version 2.2 <http://www.pathname.com/fhs/>.
+.SH CONFORMING TO
+The Filesystem Hierarchy Standard, Version 2.2
+.UR http://www.pathname.com\:/fhs/
+.UE .
.SH BUGS
This list is not exhaustive; different systems may be configured
differently.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR find (1),
.BR ln (1),
.BR proc (5),
.\" Copyright (c) 1987, 1990, 1993
.\" The Regents of the University of California. All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)hostname.7 8.2 (Berkeley) 12/30/93
.\" $FreeBSD: src/share/man/man7/hostname.7,v 1.7 2004/07/03 18:29:23 ru Exp $
.\" This man page is Copyright (C) 1999 Andi Kleen <ak@muc.de>.
+.\"
+.\" %%%LICENSE_START(VERBATIM_ONE_PARA)
.\" Permission is granted to distribute possibly modified copies
.\" of this page provided the header is included verbatim,
.\" and in case of nontrivial modification author and date
.\" of the modification is added to the header.
+.\" %%%LICENSE_END
+.\"
.\" $Id: icmp.7,v 1.6 2000/08/14 08:03:45 ak Exp $
+.\"
.TH ICMP 7 2012-05-10 "Linux" "Linux Programmer's Manual"
.SH NAME
icmp \- Linux IPv4 ICMP kernel module.
.br
Default mask: 0000001100000011000 (0x1818)
-Bit definitions (see the kernel source file
+Bit definitions (see the Linux kernel source file
.IR include/linux/icmp.h ):
.in +4n
This raw socket may appear in
.BR netstat (8)
output with a zero inode.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ip (7)
.PP
RFC\ 792 for a description of the ICMP protocol.
'\" t
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH INOTIFY 7 2012-04-26 "Linux" "Linux Programmer's Manual"
+.TH INOTIFY 7 2013-02-25 "Linux" "Linux Programmer's Manual"
.SH NAME
inotify \- monitoring file system events
.SH DESCRIPTION
is a unique integer that connects related events.
Currently this is only used for rename events, and
allows the resulting pair of
-.B IN_MOVE_FROM
+.B IN_MOVED_FROM
and
-.B IN_MOVE_TO
+.B IN_MOVED_TO
events to be connected by the application.
For all other event types,
.I cookie
sizeof(struct inotify_event) + NAME_MAX + 1
will be sufficient to read at least one event.
-
.SS inotify events
The
.BR inotify_add_watch (2)
.I /proc/sys/fs/inotify/max_user_watches
This specifies an upper limit on the number of watches
that can be created per real user ID.
-.SH "VERSIONS"
+.SH VERSIONS
Inotify was merged into the 2.6.13 Linux kernel.
The required library interfaces were added to glibc in version 2.4.
.RB ( IN_DONT_FOLLOW ,
and
.B IN_ONLYDIR
were only added in version 2.5.)
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The inotify API is Linux-specific.
-.SH "NOTES"
+.SH NOTES
Inotify file descriptors can be monitored using
.BR select (2),
.BR poll (2),
The inotify API provides no information about the user or process that
triggered the inotify event.
+In particular, there is no easy
+way for a process that is monitoring events via inotify
+to distinguish events that it triggers
+itself from those that are triggered by other processes.
Note that the event queue can overflow.
In this case, events are lost.
new files may already have been created in the subdirectory.
Therefore, you may want to scan the contents of the subdirectory
immediately after adding the watch.
-.SH "BUGS"
+.SH BUGS
In kernels before 2.6.16, the
.B IN_ONESHOT
.I mask
instead checked if the most recent event could be coalesced with the
.I oldest
unread event.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR inotify_add_watch (2),
.BR inotify_init (2),
.BR inotify_init1 (2),
.BR inotify_rm_watch (2),
.BR read (2),
-.BR stat (2),
-.IR Documentation/filesystems/inotify.txt .
+.BR stat (2)
+
+.IR Documentation/filesystems/inotify.txt
+in the Linux kernel source tree
.\" (michael@moria.de), Fri Apr 2 11:32:09 MET DST
.\" 1993
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified by Thomas Koenig (ig25@rz.uni-karlsruhe.de) 24 Apr 1993
.\" Modified Sat Jul 24 17:28:08 1993 by Rik Faith (faith@cs.unc.edu)
.TH INTRO 7 2007-10-23 "Linux" "Linux Programmer's Manual"
.SH NAME
-intro \- Introduction to overview, conventions, and miscellany section
+intro \- introduction to overview, conventions, and miscellany section
.SH DESCRIPTION
Section 7 of the manual provides overviews on various topics, and
describes conventions and protocols,
character set standards, the standard file system layout,
and miscellaneous other things.
.SH NOTES
-.SS Authors and Copyright Conditions
+.SS Authors and copyright conditions
Look at the header of the manual page source for the author(s) and copyright
conditions.
Note that these can be different from page to page!
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR standards (7)
'\" t
-.\" Don't change the line above. it tells man that tbl is needed.
.\" This man page is Copyright (C) 1999 Andi Kleen <ak@muc.de>.
+.\"
+.\" %%%LICENSE_START(VERBATIM_ONE_PARA)
.\" Permission is granted to distribute possibly modified copies
.\" of this page provided the header is included verbatim,
.\" and in case of nontrivial modification author and date
.\" of the modification is added to the header.
+.\" %%%LICENSE_END
+.\"
.\" $Id: ip.7,v 1.19 2000/12/20 18:10:31 ak Exp $
.\"
-.\" FIXME: Document IP_MINTTL, added in Linux 2.6.34
+.\" FIXME: The following socket options are yet to be documented
+.\" IP_XFRM_POLICY (2.5.48)
+.\" Needs CAP_NET_ADMIN
+.\" IP_IPSEC_POLICY (2.5.47)
+.\" Needs CAP_NET_ADMIN
+.\" IP_PASSSEC (2.6.17)
+.\" Boolean
+.\" commit 2c7946a7bf45ae86736ab3b43d0085e43947945c
+.\" Author: Catherine Zhang <cxzhang@watson.ibm.com>
+.\" IP_MINTTL (2.6.34)
+.\" commit d218d11133d888f9745802146a50255a4781d37a
+.\" Author: Stephen Hemminger <shemminger@vyatta.com>
+.\" MCAST_JOIN_GROUP (2.4.22 / 2.6)
+.\" MCAST_BLOCK_SOURCE (2.4.22 / 2.6)
+.\" MCAST_UNBLOCK_SOURCE (2.4.22 / 2.6)
+.\" MCAST_LEAVE_GROUP (2.4.22 / 2.6)
+.\" MCAST_JOIN_SOURCE_GROUP (2.4.22 / 2.6)
+.\" MCAST_LEAVE_SOURCE_GROUP (2.4.22 / 2.6)
+.\" MCAST_MSFILTER (2.4.22 / 2.6)
+.\" IP_MULTICAST_ALL (2.6.31)
+.\" commit f771bef98004d9d141b085d987a77d06669d4f4f
+.\" Author: Nivedita Singhvi <niv@us.ibm.com>
+.\" IP_UNICAST_IF (3.4)
+.\" commit 76e21053b5bf33a07c76f99d27a74238310e3c71
+.\" Author: Erich E. Hoover <ehoover@mines.edu>
.\"
-.TH IP 7 2011-09-22 "Linux" "Linux Programmer's Manual"
+.TH IP 7 2013-02-12 "Linux" "Linux Programmer's Manual"
.SH NAME
ip \- Linux IPv4 protocol implementation
.SH SYNOPSIS
you may specify a valid IANA IP protocol defined in
RFC\ 1700 assigned numbers.
.PP
-.\" FIXME ip current does an autobind in listen, but I'm not sure
-.\" if that should be documented.
When a process wants to receive new incoming packets or connections, it
should bind a socket to a local interface address using
.BR bind (2).
-Only one IP socket may be bound to any given local (address, port) pair.
+In this case, only one IP socket may be bound to any given local
+(address, port) pair.
When
.B INADDR_ANY
is specified in the bind call, the socket will be bound to
local interfaces.
When
.BR listen (2)
-or
+is called on an unbound socket, the socket is automatically bound
+to a random free port with the local address set to
+.BR INADDR_ANY .
+When
.BR connect (2)
-are called on an unbound socket, it is automatically bound to a
-random free port with the local address set to
+is called on an unbound socket, the socket is automatically bound
+to a random free port or to a usable shared port with the local address
+set to
.BR INADDR_ANY .
A TCP local socket address that has been bound is unavailable for
.B SO_REUSEADDR
flag has been set.
Care should be taken when using this flag as it makes TCP less reliable.
-.SS Address Format
+.SS Address format
An IP socket address is defined as a combination of an IP interface
address and a 16-bit port number.
The basic IP protocol does not supply port numbers, they
means any host and has the same effect on bind as
.B INADDR_ANY
for historical reasons.
-.SS Socket Options
+.SS Socket options
IP supports some protocol-specific socket options that can be set with
.BR setsockopt (2)
and read with
.BR setsockopt (2).
.\"
.TP
+.BR IP_ADD_SOURCE_MEMBERSHIP " (since Linux 2.4.22 / 2.5.68)"
+Join a multicast group and allow receiving data only
+from a specified source.
+Argument is an
+.I ip_mreq_source
+structure.
+.sp
+.in +4n
+.nf
+struct ip_mreq_source {
+ struct in_addr imr_multiaddr; /* IP multicast group
+ address */
+ struct in_addr imr_interface; /* IP address of local
+ interface */
+ struct in_addr imr_sourceaddr; /* IP address of
+ multicast source */
+};
+.fi
+.in
+.sp
+The
+.I ip_mreq_source
+structure is similar to
+.I ip_mreqn
+described under
+.BR IP_ADD_MEMBERSIP .
+The
+.I imr_multiaddr
+field contains the address of the multicast group the application
+wants to join or leave.
+The
+.I imr_interface
+field is the address of the local interface with which
+the system should join the multicast group.
+Finally, the
+.I imr_sourceaddr
+field contains the address of the source the
+application wants to receive data from.
+.IP
+This option can be used multiple times to allow
+receiving data from more than one source.
+.TP
+.BR IP_BLOCK_SOURCE " (since Linux 2.4.22 / 2.5.68)"
+Stop receiving multicast data from a specific source in a given group.
+This is valid only after the application has subscribed
+to the multicast group using either
+.BR IP_ADD_MEMBERSHIP
+or
+.BR IP_ADD_SOURCE_MEMBERSHIP .
+.IP
+Argument is an
+.I ip_mreq_source
+structure as described under
+.BR IP_ADD_SOURCE_MEMBERSHIP .
+.TP
.BR IP_DROP_MEMBERSHIP " (since Linux 1.2)"
Leave a multicast group.
Argument is an
structure similar to
.BR IP_ADD_MEMBERSHIP .
.TP
+.BR IP_DROP_SOURCE_MEMBERSHIP " (since Linux 2.4.22 / 2.5.68)"
+Leave a source-specific group\(emthat is, stop receiving data from
+a given multicast group that come from a given source.
+If the application has subscribed to multiple sources within
+the same group, data from the remaining sources will still be delivered.
+To stop receiving data from all sources at once, use
+.BR IP_LEAVE_GROUP .
+.IP
+Argument is an
+.I ip_mreq_source
+structure as described under
+.BR IP_ADD_SOURCE_MEMBERSHIP .
+.TP
.BR IP_FREEBIND " (since Linux 2.4)"
.\" Precisely: 2.4.0-test10
If enabled, this boolean option allows binding to an IP address
and
.B IP_TOS
are ignored.
-.\"
-.\" FIXME Document IP_IPSEC_POLICY
-.\" Since Linux 2.5.47
-.\" Needs CAP_NET_ADMIN
+.TP
+.BR IP_MSFILTER " (since Linux 2.4.22 / 2.5.68)"
+This option provides access to the advanced full-state filtering API.
+Argument is an
+.I ip_msfilter
+structure.
+.sp
+.in +4n
+.nf
+struct ip_msfilter {
+ struct in_addr imsf_multiaddr; /* IP multicast group
+ address */
+ struct in_addr imsf_interface; /* IP address of local
+ interface */
+ uint32_t imsf_fmode; /* Filter-mode */
+
+ uint32_t imsf_numsrc; /* Number of sources in
+ the following array */
+ struct in_addr imsf_slist[1]; /* Array of source
+ addresses */
+};
+.fi
+.in
+.sp
+There are two macros,
+.BR MCAST_INCLUDE
+and
+.BR MCAST_EXCLUDE ,
+which can be used to specify the filtering mode.
+Additionally, the
+.BR IP_MSFILTER_SIZE (n)
+macro exists to determine how much memory is needed to store
+.I ip_msfilter
+structure with
+.I n
+sources in the source list.
+.IP
+For the full description of multicast source filtering
+refer to RFC 3376.
.TP
.BR IP_MTU " (since Linux 2.2)"
.\" Precisely: 2.1.124
by writing (respectively, zero and nonzero values) to the
.I /proc/sys/net/ipv4/ip_no_pmtu_disc
file.
-
.TS
tab(:);
c l
with
.B IP_OPTIONS
puts the current IP options used for sending into the supplied buffer.
-.\" FIXME Document IP_PASSSEC
-.\" Boolean
-.\" Since Linux 2.6.17
-.\" commit 2c7946a7bf45ae86736ab3b43d0085e43947945c
-.\" Author: Catherine Zhang <cxzhang@watson.ibm.com>
.TP
.BR IP_PKTINFO " (since Linux 2.2)"
.\" Precisely: 2.1.68
.BR IP_TTL " (since Linux 1.0)"
Set or retrieve the current time-to-live field that is used in every packet
sent from this socket.
-.\" FIXME Document IP_XFRM_POLICY
-.\" Since Linux 2.5.48
-.\" Needs CAP_NET_ADMIN
+.TP
+.BR IP_UNBLOCK_SOURCE " (since Linux 2.4.22 / 2.5.68)"
+Unblock previously blocked multicast source.
+Returns
+.BR EADDRNOTAVAIL
+when given source is not being blocked.
+.IP
+Argument is an
+.I ip_mreq_source
+structure as described under
+.BR IP_ADD_SOURCE_MEMBERSHIP .
.SS /proc interfaces
The IP protocol
supports a set of
.BR socket (7).
.SH NOTES
.BR IP_FREEBIND ,
+.BR IP_MSFILTER ,
.BR IP_MTU ,
.BR IP_MTU_DISCOVER ,
.BR IP_RECVORIGDSTADDR ,
does not work in some 2.2 kernels.
.\" .SH AUTHORS
.\" This man page was written by Andi Kleen.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR recvmsg (2),
.BR sendmsg (2),
.BR byteorder (3),
.BR ipfw (4),
.BR capabilities (7),
+.BR icmp (7),
+.BR ipv6 (7),
.BR netlink (7),
.BR raw (7),
.BR socket (7),
.BR udp (7)
.PP
RFC\ 791 for the original IP specification.
-.br
RFC\ 1122 for the IPv4 host requirements.
-.br
RFC\ 1812 for the IPv4 router requirements.
.\" FIXME autobind INADDR REUSEADDR
.\" This man page is Copyright (C) 2000 Andi Kleen <ak@muc.de>.
+.\"
+.\" %%%LICENSE_START(VERBATIM_ONE_PARA)
.\" Permission is granted to distribute possibly modified copies
.\" of this page provided the header is included verbatim,
.\" and in case of nontrivial modification author and date
.\" of the modification is added to the header.
+.\" %%%LICENSE_END
+.\"
.\" $Id: ipv6.7,v 1.3 2000/12/20 18:10:31 ak Exp $
-.TH IPV6 7 2012-05-10 "Linux" "Linux Programmer's Manual"
+.\"
+.\" The following socket options are undocumented
+.\" All of the folloing are from:
+.\" commit 333fad5364d6b457c8d837f7d05802d2aaf8a961
+.\" Author: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
+.\" Support several new sockopt / ancillary data in Advanced API (RFC3542).
+.\" IPV6_2292PKTINFO (2.6.14)
+.\" Formerly IPV6_PKTINFO
+.\" IPV6_2292HOPOPTS (2.6.14)
+.\" Formerly IPV6_HOPOPTS, which is documented
+.\" IPV6_2292DSTOPTS (2.6.14)
+.\" Formerly IPV6_DSTOPTS, which is documented
+.\" IPV6_2292RTHDR (2.6.14)
+.\" Formerly IPV6_RTHDR, which is documented
+.\" IPV6_2292PKTOPTIONS (2.6.14)
+.\" Formerly IPV6_PKTOPTIONS
+.\" IPV6_2292HOPLIMIT (2.6.14)
+.\" Formerly IPV6_HOPLIMIT, which is documented
+.\"
+.\" IPV6_RECVHOPLIMIT (2.6.14)
+.\" IPV6_RECVHOPOPTS (2.6.14)
+.\" IPV6_RTHDRDSTOPTS (2.6.14)
+.\" IPV6_RECVRTHDR (2.6.14)
+.\" IPV6_RECVDSTOPTS (2.6.14)
+.\"
+.\" IPV6_RECVPATHMTU (2.6.35, flag value added in 2.6.14)
+.\" commit 793b14731686595a741d9f47726ad8b9a235385a
+.\" Author: Brian Haley <brian.haley@hp.com>
+.\" IPV6_PATHMTU (2.6.35, flag value added in 2.6.14)
+.\" commit 793b14731686595a741d9f47726ad8b9a235385a
+.\" Author: Brian Haley <brian.haley@hp.com>
+.\" IPV6_DONTFRAG (2.6.35, flag value added in 2.6.14)
+.\" commit 793b14731686595a741d9f47726ad8b9a235385a
+.\" Author: Brian Haley <brian.haley@hp.com>
+.\" commit 4b340ae20d0e2366792abe70f46629e576adaf5e
+.\" Author: Brian Haley <brian.haley@hp.com>
+.\"
+.\" IPV6_RECVTCLASS (2.6.14)
+.\" commit 41a1f8ea4fbfcdc4232f023732584aae2220de31
+.\" Author: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
+.\" Based on patch from David L Stevens <dlstevens@us.ibm.com>
+.\"
+.\" IPV6_CHECKSUM (2.2)
+.\" IPV6_NEXTHOP (2.2)
+.\" IPV6_JOIN_ANYCAST (2.4.21 / 2.6)
+.\" IPV6_LEAVE_ANYCAST (2.4.21 / 2.6)
+.\" IPV6_FLOWLABEL_MGR (2.2.7 / 2.4)
+.\" IPV6_FLOWINFO_SEND (2.2.7 / 2.4)
+.\" IPV6_IPSEC_POLICY (2.6)
+.\" IPV6_XFRM_POLICY (2.6)
+.\" IPV6_TCLASS (2.6)
+.\"
+.\" IPV6_ADDR_PREFERENCES (2.6.26)
+.\" commit 7cbca67c073263c179f605bdbbdc565ab29d801d
+.\" Author: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
+.\" IPV6_MINHOPCOUNT (2.6.35)
+.\" commit e802af9cabb011f09b9c19a82faef3dd315f27eb
+.\" Author: Stephen Hemminger <shemminger@vyatta.com>
+.\" IPV6_ORIGDSTADDR (2.6.37)
+.\" Actually a CMSG rather than a sockopt?
+.\" In header file, we have IPV6_RECVORIGDSTADDR == IPV6_ORIGDSTADDR
+.\" commit 6c46862280c5f55eda7750391bc65cd7e08c7535
+.\" Author: Balazs Scheidler <bazsi@balabit.hu>
+.\" IPV6_RECVORIGDSTADDR (2.6.37)
+.\" commit 6c46862280c5f55eda7750391bc65cd7e08c7535
+.\" Author: Balazs Scheidler <bazsi@balabit.hu>
+.\" Support for IPV6_RECVORIGDSTADDR sockopt for UDP sockets
+.\" were contributed by Harry Mason.
+.\" IPV6_TRANSPARENT (2.6.37)
+.\" commit 6c46862280c5f55eda7750391bc65cd7e08c7535
+.\" Author: Balazs Scheidler <bazsi@balabit.hu>
+.\" IPV6_UNICAST_IF (3.4)
+.\" commit c4062dfc425e94290ac427a98d6b4721dd2bc91f
+.\" Author: Erich E. Hoover <ehoover@mines.edu>
+.\"
+.TH IPV6 7 2012-12-16 "Linux" "Linux Programmer's Manual"
.SH NAME
ipv6 \- Linux IPv6 protocol implementation
.SH SYNOPSIS
When you get an IPv4 connection
or packet to a IPv6 socket, its source address will be mapped
to v6 and it will be mapped to v6.
-.SS "Address Format"
+.SS Address format
.in +4n
.nf
struct sockaddr_in6 {
for IPv4-mapped-on-IPv6.
.PP
The port space of IPv6 is shared with IPv4.
-.SS "Socket Options"
+.SS Socket options
IPv6 supports some protocol-specific socket options that can be set with
.BR setsockopt (2)
and read with
.B IPV6_ADD_MEMBERSHIP, IPV6_DROP_MEMBERSHIP
Control membership in multicast groups.
Argument is a pointer to a
-.I struct ipv6_mreq
-structure.
-.\" FIXME IPV6_CHECKSUM is not documented, and probably should be
-.\" FIXME IPV6_JOIN_ANYCAST is not documented, and probably should be
-.\" FIXME IPV6_LEAVE_ANYCAST is not documented, and probably should be
-.\" FIXME IPV6_RECVPKTINFO is not documented, and probably should be
-.\" FIXME IPV6_2292PKTINFO is not documented, and probably should be
-.\" FIXME there are probably many other IPV6_* socket options that
-.\" should be documented
+.IR "struct ipv6_mreq" .
.TP
.B IPV6_MTU
+.BR getsockopt ():
+Retrieve the current known path MTU of the current socket.
+Only valid when the socket has been connected.
+Returns an integer.
+
+.BR setsockopt ():
Set the MTU to be used for the socket.
The MTU is limited by the device
MTU or the path MTU when path MTU discovery is enabled.
Control whether the socket sees multicast packets that it has send itself.
Argument is a pointer to boolean.
.TP
-.B IPV6_PKTINFO
+.BR IPV6_RECVPKTINFO " (since Linux 2.6.14)"
Set delivery of the
.B IPV6_PKTINFO
control message on incoming datagrams.
+Such control messages contain a
+.IR "struct in6_pktinfo" ,
+as per RFC 3542.
Only allowed for
.B SOCK_DGRAM
or
when the passed address length contains it.
Some programs that pass a longer address buffer and then
check the outgoing address length may break.
-.SH "NOTES"
+.SH NOTES
The
.I sockaddr_in6
structure is bigger than the generic
Flow label management is not complete and not documented here.
.PP
This man page is not complete.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cmsg (3),
.BR ip (7)
.PP
-RFC\ 2553: IPv6 BASIC API.
+RFC\ 2553: IPv6 BASIC API;
Linux tries to be compliant to this.
-.PP
RFC\ 2460: IPv6 specification.
'\" t
.\" Copyright 1993-1995 Daniel Quinlan (quinlan@yggdrasil.com)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Slightly rearranged, aeb, 950713
.\" Updated, dpo, 990531
-.TH ISO_8859-1 7 2012-04-22 "Linux" "Linux Programmer's Manual"
+.TH ISO_8859-1 7 2012-08-14 "Linux" "Linux Programmer's Manual"
.nh
.SH NAME
iso_8859-1 \- ISO 8859-1 character set encoded in octal, decimal,
.P
Note that the ISO 8859-1 characters are also the first 256 characters
of ISO 10646 (Unicode).
-.SS "ISO 8859 Alphabets"
+.SS ISO 8859 alphabets
The full set of ISO 8859 alphabets includes:
.TS
l l.
ISO 8859-15 West European languages (Latin-9)
ISO 8859-16 Romanian (Latin-10)
.TE
-.SS "ISO 8859-1 Characters"
+.SS ISO 8859-1 characters
The following table displays the characters in ISO 8859-1 (Latin-1),
which are printable and unlisted in the
.BR ascii (7)
The fourth column will only show the proper glyphs
in an environment configured for ISO 8859-1.
.TS
-l l l c lp-1.
+l2 l2 l2 c2 lp-1.
Oct Dec Hex Char Description
_
240 160 A0 NO-BREAK SPACE
252 170 AA ª FEMININE ORDINAL INDICATOR
253 171 AB « LEFT-POINTING DOUBLE ANGLE QUOTATION MARK
254 172 AC ¬ NOT SIGN
-255 173 AD - SOFT HYPHEN
+255 173 AD SOFT HYPHEN (shown as a hyphen at line breaks) [1]
256 174 AE ® REGISTERED SIGN
257 175 AF ¯ MACRON
260 176 B0 ° DEGREE SIGN
376 254 FE þ LATIN SMALL LETTER THORN
377 255 FF ÿ LATIN SMALL LETTER Y WITH DIAERESIS
.TE
-.SH "SEE ALSO"
+.IP [1] 4
+See
+.BR groff_char (7)
+(soft hyphen) and the standard ISO 8859-1 ("shy",
+paragraph 6.3.3)
+or the equivalent version from your national standardization body.
+.SH SEE ALSO
.BR ascii (7),
.BR iso_8859-15 (7)
'\" t -*- coding: ISO-8859-10 -*-
.\" Copyright 2009 Lefteris Dimitroulakis (edimitro@tee.gr)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
+.\"
.TH ISO_8859-10 7 2010-09-20 "Linux" "Linux Programmer's Manual"
.SH NAME
iso_8859-10 \- ISO 8859-10 character set encoded in octal, decimal,
.\" (Though in my system with glibc-2.8-20080929
.\" I found only lg_UG using this charset, and certainly UG
.\" is not a "Nordic" country!).
-.SS "ISO 8859 Alphabets"
+.SS ISO 8859 alphabets
The full set of ISO 8859 alphabets includes:
.TS
l l.
ISO 8859-15 West European languages (Latin-9)
ISO 8859-16 Romanian (Latin-10)
.TE
-.SS "ISO 8859-10 Characters"
+.SS ISO 8859-10 characters
The following table displays the characters in ISO 8859-10, which
are printable and unlisted in the
.BR ascii (7)
.TE
.SH NOTES
ISO 8859-10 is also known as Latin-6.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ascii (7)
'\" t -*- coding: ISO-8859-11 -*-
.\" Copyright 2009 Lefteris Dimitroulakis <edimitro at tee.gr>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\"Thanomsub Noppaburana <donga.nb@gmail.com> made valuable suggestions.
.\"
The ISO 8859 standard includes several 8-bit extensions to the ASCII
character set (also known as ISO 646-IRV).
ISO 8859-11 encodes the characters used in the Thai language.
-.SS "ISO 8859 Alphabets"
+.SS ISO 8859 alphabets
The full set of ISO 8859 alphabets includes:
.TS
l l.
ISO 8859-15 West European languages (Latin-9)
ISO 8859-16 Romanian (Latin-10)
.TE
-.SS "ISO 8859-11 Characters"
+.SS ISO 8859-11 characters
The following table displays the characters in ISO 8859-11, which
are printable and unlisted in the
.BR ascii (7)
commonly known as TIS-620, except for the character in position a0:
ISO 8859-11 defines this as "nonbreaking space",
while TIS 620 leaves it undefined.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ascii (7)
'\" t -*- coding: ISO-8859-7 -*-
.\" Copyright 2009 Lefteris Dimitroulakis (edimitro@tee.gr)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
+.\"
.TH ISO_8859-13 7 2010-09-20 "Linux" "Linux Programmer's Manual"
.SH NAME
iso_8859-13 \- ISO 8859-13 character set encoded in octal, decimal,
ISO 8859-13 encodes the characters used in Baltic Rim languages.
.\" In my system with glibc-2.8-20080929 is used for
.\" Lithuanian, Latvian and the Maori language in New Zealand.
-.SS "ISO 8859 Alphabets"
+.SS ISO 8859 alphabets
The full set of ISO 8859 alphabets includes:
.TS
l l.
ISO 8859-15 West European languages (Latin-9)
ISO 8859-16 Romanian (Latin-10)
.TE
-.SS "ISO 8859-13 Characters"
+.SS ISO 8859-13 characters
The following table displays the characters in ISO 8859-13, which
are printable and unlisted in the
.BR ascii (7)
.TE
.SH NOTES
ISO 8859-13 is also known as Latin-7.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ascii (7)
'\" t -*- coding: ISO-8859-14 -*-
.\" Copyright 2009 Lefteris Dimitroulakis (edimitro@tee.gr)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
+.\"
.TH ISO_8859-14 7 2010-09-20 "Linux" "Linux Programmer's Manual"
.SH NAME
iso_8859-14 \- ISO 8859-14 character set encoded in octal, decimal,
The ISO 8859 standard includes several 8-bit extensions to the ASCII
character set (also known as ISO 646-IRV).
ISO 8859-14 encodes the characters used in Celtic languages.
-.SS "ISO 8859 Alphabets"
+.SS ISO 8859 alphabets
The full set of ISO 8859 alphabets includes:
.TS
l l.
ISO 8859-15 West European languages (Latin-9)
ISO 8859-16 Romanian (Latin-10)
.TE
-.SS "ISO 8859-14 Characters"
+.SS ISO 8859-14 characters
The following table displays the characters in ISO 8859-14, which
are printable and unlisted in the
.BR ascii (7)
.TE
.SH NOTES
ISO 8859-14 is also known as Latin-8.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ascii (7)
.\" Copyright 1993-1995 Daniel Quinlan (quinlan@yggdrasil.com)
.\" Copyright 1999 Dimitri Papadopoulos (dpo@club-internet.fr)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
+.\"
.TH ISO_8859-15 7 1999-05-31 "Linux" "Linux Programmer's Manual"
.nh
.SH NAME
Frisian, Galician, German, Greenlandic, Icelandic, Irish Gaelic,
Italian, Latin, Luxemburgish, Norwegian, Portuguese, Rhaeto-Romanic,
Scottish Gaelic, Spanish, and Swedish.
-.SS "ISO 8859 Alphabets"
+.SS ISO 8859 alphabets
The full set of ISO 8859 alphabets includes:
.TS
l l.
ISO 8859-15 West European languages (Latin-9)
ISO 8859-16 Romanian (Latin-10)
.TE
-.SS "ISO 8859-15 Characters"
+.SS ISO 8859-15 characters
The following table displays the characters in ISO 8859-15 (Latin-9),
which are printable and unlisted in the
.BR ascii (7)
376 254 FE þ LATIN SMALL LETTER THORN
377 255 FF ÿ LATIN SMALL LETTER Y WITH DIAERESIS
.TE
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ascii (7),
.BR iso_8859-1 (7)
'\" t -*- coding: ISO-8859-16 -*-
.\" Copyright 2002 Ionel Mugurel Ciobîcã (IMCiobica@netscape.net)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
-.TH ISO_8859-16 7 2003-03-05 "Linux" "Linux Programmer's Manual"
+.TH ISO_8859-16 7 2012-08-05 "Linux" "Linux Programmer's Manual"
.nh
.SH NAME
iso_8859-16 \- ISO 8859-16 character set encoded in octal, decimal,
.P
Also note that the following Cyrillic-based languages have one-to-one
transliterations to Latin 10: Macedonian and Serbian.
-.SS "ISO 8859 Alphabets"
+.SS ISO 8859 alphabets
The full set of ISO 8859 alphabets includes:
.TS
l l.
ISO 8859-15 West European languages (Latin-9)
ISO 8859-16 Romanian (Latin-10)
.TE
-.SS "ISO 8859-16 Characters"
+.SS ISO 8859-16 characters
The following table displays the characters in ISO 8859-16 (Latin-10),
which are printable and unlisted in the
.BR ascii (7)
376 254 FE þ LATIN SMALL LETTER T WITH COMMA BELOW
377 255 FF ÿ LATIN SMALL LETTER Y WITH DIAERESIS
.TE
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ascii (7),
.BR iso_8859-1 (7),
.BR iso_8859-15 (7),
.BR iso_8859-2 (7)
-.P
-Additional information:
+
.I ISO 8859-16 (Latin 10) Resources
-(http://bucovina.chem.tue.nl/fonturi/index-en.html).
+.UR http://bucovina.chem.tue.nl\:/fonturi\:/index-en.html
+.UE .
.\" Copyright 1999 Roman Maurer (roman.maurer@hermes.si)
.\" Copyright 1993-1995 Daniel Quinlan (quinlan@yggdrasil.com)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Slightly rearranged, aeb, 950713
.\" Updated, dpo, 990531
-.TH ISO_8859-2 7 2007-11-25 "Linux" "Linux Programmer's Manual"
+.TH ISO_8859-2 7 2012-08-05 "Linux" "Linux Programmer's Manual"
.nh
.SH NAME
iso_8859-2 \- ISO 8859-2 character set encoded in octal, decimal,
.P
Also note that the following Cyrillic-based languages have one-to-one
transliterations to Latin 2: Macedonian and Serbian.
-.SS "ISO 8859 Alphabets"
+.SS ISO 8859 alphabets
The full set of ISO 8859 alphabets includes:
.TS
l l.
ISO 8859-15 West European languages (Latin-9)
ISO 8859-16 Romanian (Latin-10)
.TE
-.SS "ISO 8859-2 Characters"
+.SS ISO 8859-2 characters
The following table displays the characters in ISO 8859-2 (Latin-2),
which are printable and unlisted in the
.BR ascii (7)
376 254 FE þ LATIN SMALL LETTER T WITH CEDILLA
377 255 FF ÿ DOT ABOVE
.TE
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ascii (7),
.BR iso_8859-1 (7),
.BR iso_8859-16 (7)
-.P
-Additional information:
+
.I ISO 8859-2 (Latin 2) Resources
-(http://sizif.mf.uni-lj.si/linux/cee/iso8859-2.html).
+.UR http://sizif.mf.uni-lj.si\:/linux\:/cee\:/iso8859-2.html
+.UE .
'\" t -*- coding: ISO-8859-3 -*-
.\" Copyright 2009 Lefteris Dimitroulakis (edimitro@tee.gr)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
+.\"
.TH ISO_8859-3 7 2010-09-20 "Linux" "Linux Programmer's Manual"
.nh
.SH NAME
ISO 8859-3 encodes the characters used in Southeast European languages.
.\" (Though in my system with glibc-2.8-20080929
.\" I found only mt_MT (Malta) using this charset).
-.SS "ISO 8859 Alphabets"
+.SS ISO 8859 alphabets
The full set of ISO 8859 alphabets includes:
.TS
l l.
ISO 8859-15 West European languages (Latin-9)
ISO 8859-16 Romanian (Latin-10)
.TE
-.SS "ISO 8859-3 Characters"
+.SS ISO 8859-3 characters
The following table displays the characters in ISO 8859-3, which
are printable and unlisted in the
.BR ascii (7)
.TE
.SH NOTES
ISO 8859-3 is also known as Latin-3.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ascii (7)
'\" t -*- coding: ISO-8859-4 -*-
.\" Copyright 2009 Lefteris Dimitroulakis (edimitro@tee.gr)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
+.\"
.TH ISO_8859-4 7 2009-01-24 "Linux" "Linux Programmer's Manual"
.SH NAME
iso_8859-4 \- ISO 8859-4 character set encoded in octal, decimal,
character set (also known as ISO 646-IRV).
ISO 8859-4 encodes the characters used in
Scandinavian and Baltic languages (Latin-4).
-.SS "ISO 8859 Alphabets"
+.SS ISO 8859 alphabets
The full set of ISO 8859 alphabets includes:
.TS
l l.
ISO 8859-15 West European languages (Latin-9)
ISO 8859-16 Romanian (Latin-10)
.TE
-.SS "ISO 8859-4 Characters"
+.SS ISO 8859-4 characters
The following table displays the characters in ISO 8859-4, which
are printable and unlisted in the
.BR ascii (7)
376 254 FE þ LATIN SMALL LETTER U WITH MACRON
377 255 FF ÿ DOT ABOVE (Mandarin Chinese light tone)
.TE
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ascii (7)
'\" t -*- coding: ISO-8859-5 -*-
.\" Copyright 2009 Lefteris Dimitroulakis (edimitro@tee.gr)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
+.\"
.TH ISO_8859-5 7 2010-09-20 "Linux" "Linux Programmer's Manual"
.SH NAME
iso_8859-5 \- ISO 8859-5 character set encoded in octal, decimal,
The ISO 8859 standard includes several 8-bit extensions to the ASCII
character set (also known as ISO 646-IRV).
ISO 8859-5 encodes the Cyrillic alphabet as used in Russian and Macedonian.
-.SS "ISO 8859 Alphabets"
+.SS ISO 8859 alphabets
The full set of ISO 8859 alphabets includes:
.TS
l l.
ISO 8859-15 West European languages (Latin-9)
ISO 8859-16 Romanian (Latin-10)
.TE
-.SS "ISO 8859-5 Characters"
+.SS ISO 8859-5 characters
The following table displays the characters in ISO 8859-5, which
are printable and unlisted in the
.BR ascii (7)
376 254 FE þ CYRILLIC SMALL LETTER SHORT U (Byelorussian)
377 255 FF ÿ CYRILLIC SMALL LETTER DZHE
.TE
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ascii (7),
.BR koi8-r (7)
'\" t -*- coding: ISO-8859-6 -*-
.\" Copyright 2009 Lefteris Dimitroulakis (edimitro@tee.gr)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
+.\"
.TH ISO_8859-6 7 2010-09-20 "Linux" "Linux Programmer's Manual"
.SH NAME
iso_8859-6 \- ISO 8859-6 character set encoded in octal, decimal,
The ISO 8859 standard includes several 8-bit extensions to the ASCII
character set (also known as ISO 646-IRV).
ISO 8859-6 encodes the characters used in the Arabic language.
-.SS "ISO 8859 Alphabets"
+.SS ISO 8859 alphabets
The full set of ISO 8859 alphabets includes:
.TS
l l.
ISO 8859-15 West European languages (Latin-9)
ISO 8859-16 Romanian (Latin-10)
.TE
-.SS "ISO 8859-6 Characters"
+.SS ISO 8859-6 characters
The following table displays the characters in ISO 8859-6, which
are printable and unlisted in the
.BR ascii (7)
.SH NOTES
ISO 8859-6 lacks the glyphs required for many related languages,
such as Urdu and Persian (Farsi).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ascii (7)
'\" t -*- coding: ISO-8859-7 -*-
.\" Copyright 1999 Dimitri Papadopoulos (dpo@club-internet.fr)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
+.\"
.TH ISO_8859-7 7 2008-10-30 "Linux" "Linux Programmer's Manual"
.nh
.SH NAME
character set (also known as ISO 646-IRV).
ISO 8859-7 encodes the
characters used in modern monotonic Greek.
-.SS "ISO 8859 Alphabets"
+.SS ISO 8859 alphabets
The full set of ISO 8859 alphabets includes:
.TS
l l.
ISO 8859-15 West European languages (Latin-9)
ISO 8859-16 Romanian (Latin-10)
.TE
-.SS "ISO 8859-7 Characters"
+.SS ISO 8859-7 characters
The following table displays the characters in ISO 8859-7, which
are printable and unlisted in the
.BR ascii (7)
.TE
.SH NOTES
ISO 8859-7 was formerly known as ELOT-928 or ECMA-118:1986.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ascii (7)
'\" t -*- coding: ISO-8859-8 -*-
.\" Copyright 2009 Lefteris Dimitroulakis (edimitro@tee.gr)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Eli Zaretskii <eliz@gnu.org> made valuable suggestions
.\"
characters used in Modern Hebrew (or Ivrit).
Neither short vowels nor diacritical marks are included,
and Yiddish is not provided for.
-.SS "ISO 8859 Alphabets"
+.SS ISO 8859 alphabets
The full set of ISO 8859 alphabets includes:
.TS
l l.
ISO 8859-15 West European languages (Latin-9)
ISO 8859-16 Romanian (Latin-10)
.TE
-.SS "ISO 8859-8 Characters"
+.SS ISO 8859-8 characters
The following table displays the characters in ISO 8859-8, which
are printable and unlisted in the
.BR ascii (7)
.TE
.SH NOTES
ISO 8859-8 was also known as ISO-IR-138.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ascii (7)
'\" t -*- coding: ISO-8859-9 -*-
.\" Copyright 2002 Dimitri Papadopoulos (dpo@club-internet.fr)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
+.\"
.TH ISO_8859-9 7 2002-09-24 "Linux" "Linux Programmer's Manual"
.nh
.SH NAME
character set (also known as ISO 646-IRV).
ISO 8859-9, also known as
the "Latin Alphabet No. 5", encodes the characters used in Turkish.
-.SS "ISO 8859 Alphabets"
+.SS ISO 8859 alphabets
The full set of ISO 8859 alphabets includes:
.TS
l l.
ISO 8859-15 West European languages (Latin-9)
ISO 8859-16 Romanian (Latin-10)
.TE
-.SS "ISO 8859-9 Characters"
+.SS ISO 8859-9 characters
The following table displays the characters in ISO 8859-9 (Latin-5),
which are printable and unlisted in the
.BR ascii (7)
376 254 FE þ LATIN SMALL LETTER S WITH CEDILLA
377 255 FF ÿ LATIN SMALL LETTER Y WITH DIAERESIS
.TE
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ascii (7)
.\"
.\" Lots of text ripped from http://koi8.pp.ru/
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
-.TH KOI8-R 7 2010-10-24 "Linux" "Linux Programmer's Manual"
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
+.\"
+.TH KOI8-R 7 2012-08-05 "Linux" "Linux Programmer's Manual"
.nh
.SH NAME
koi8-r \- Russian character set encoded in octal, decimal, and
.PP
A more complete set of Cyrillic characters is also defined by the
ISO-8859-5 character set.
-.SS "KOI8-R Characters"
+.SS KOI8-R characters
The following table displays the characters in KOI8-R, which
are printable and unlisted in the
.BR ascii (7)
375 253 FD ý CYRILLIC CAPITAL LETTER SHCHA
376 254 FE þ CYRILLIC CAPITAL LETTER CHE
377 255 FF ÿ CYRILLIC CAPITAL LETTER HARD SIGN
-
.TE
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ascii (7),
.BR iso-8859-5 (7),
-.BR koi8-u (7),
+.BR koi8-u (7)
+
RFC\ 1489,
-http://koi8.pp.ru/
+.UR http://koi8.pp.ru/
+.UE
'\" t -*- coding: KOI8-U -*-
.\" Copyright 2009 Lefteris Dimitroulakis <edimitro at tee.gr>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 2009-01-15, mtk, Some edits
.\"
for all Russian letters, and extends KOI8-R with four
Ukrainian letters (in both upper and lower case)
in locations that are compliant with ISO-IR-111.
-.SS "KOI8-U Characters"
+.SS KOI8-U characters
The following table displays the characters in KOI8-U, which
are printable and unlisted in the
.BR ascii (7)
.SH NOTES
The differences from KOI8-R are in the hex positions
A4, A6, A7, AD, B4, B6, B7, and BD.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ascii (7),
.BR koi8-r (7)
.\" Copyright (c) 2009 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH LIBC 7 2009-01-13 "Linux" "Linux Programmer's Manual"
+.TH LIBC 7 2012-08-05 "Linux" "Linux Programmer's Manual"
.SH NAME
-libc \- Overview of standard C libraries on Linux
+libc \- overview of standard C libraries on Linux
.SH DESCRIPTION
The term "libc" is commonly used as a shorthand for
the "standard C library",
to refer to the standard C library is somewhat ambiguous on Linux.
.SS glibc
By far the most widely used C library on Linux is the GNU C Library
-.RI ( http://www.gnu.org/software/libc/ ),
+.UR http://www.gnu.org\:/software\:/libc/
+.UE ,
often referred to as
.IR glibc .
This is the C library that is nowadays used in all
.\" Copyright (c) 1993 by Thomas Koenig (ig25@rz.uni-karlsruhe.de)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified Sat Jul 24 17:28:34 1993 by Rik Faith <faith@cs.unc.edu>
.\" Modified Sun Jun 01 17:16:34 1997 by Jochen Hein
.\" see http://sourceware.org/bugzilla/show_bug.cgi?id=174
.TH LOCALE 7 2008-12-05 "Linux" "Linux Programmer's Manual"
.SH NAME
-locale \- Description of multilanguage support
+locale \- description of multilanguage support
.SH SYNOPSIS
.nf
.B #include <locale.h>
};
.fi
.in
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
The GNU gettext functions are specified in LI18NUX2000.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR locale (1),
.BR localedef (1),
.BR gettext (3),
-.\"
.\" Copyright (c) 1983, 1987 The Regents of the University of California.
.\" All rights reserved.
.\"
+.\" @(#)mailaddr.7 6.5 (Berkeley) 2/14/89
+.\"
+.\" Extensively rewritten by Arnt Gulbrandsen <agulbra@troll.no>. My
+.\" changes are placed under the same copyright as the original BSD page.
+.\"
+.\" Adjusted by Arnt Gulbrandsen <arnt@gulbrandsen.priv.no> in 2004 to
+.\" account for changes since 1995. Route-addrs are now even less
+.\" common, etc. Some minor wording improvements. Same copyright.
+.\"
+.\" %%%LICENSE_START(PERMISSIVE_MISC)
.\" Redistribution and use in source and binary forms are permitted
.\" provided that the above copyright notice and this paragraph are
.\" duplicated in all such forms and that any documentation,
.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
.\" IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
.\" WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
-.\"
-.\" @(#)mailaddr.7 6.5 (Berkeley) 2/14/89
-.\"
-.\" Extensively rewritten by Arnt Gulbrandsen <agulbra@troll.no>. My
-.\" changes are placed under the same copyright as the original BSD page.
-.\"
-.\" Adjusted by Arnt Gulbrandsen <arnt@gulbrandsen.priv.no> in 2004 to
-.\" account for changes since 1995. Route-addrs are now even less
-.\" common, etc. Some minor wording improvements. Same copyright.
+.\" %%%LICENSE_END
.\"
.TH MAILADDR 7 2004-09-15 "Linux" "Linux User's Manual"
.UC 5
.I /etc/aliases
.br
.I ~/.forward
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR binmail (1),
.BR mail (1),
.BR mconnect (1),
.\" (faith@cs.unc.edu and dwheeler@ida.org)
.\" and (C) Copyright 2007 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 2007-05-30 created by mtk, using text from old man.7 plus
.\" rewrites and additional text.
.\"
-.TH MAN-PAGES 7 2008-10-28 "Linux" "Linux Programmer's Manual"
+.TH MAN-PAGES 7 2013-02-24 "Linux" "Linux Programmer's Manual"
.SH NAME
man-pages \- conventions for writing Linux man pages
.SH SYNOPSIS
.SH DESCRIPTION
This page describes the conventions that should be employed
when writing man pages for the Linux \fIman-pages\fP project,
-which comprises Sections 2, 3, 4, 5, and 7 of the Linux manual pages.
+which documents the user-space API provided by the Linux kernel
+and the GNU C library.
+The project thus provides most of the pages in Section 2,
+as well as many of the pages that appear
+in Sections 3, 4, 5, and 7 of the man pages on a Linux system.
The conventions described on this page may also be useful
for authors writing man pages for other projects.
-.SS Sections of the Manual Pages
+.SS Sections of the manual pages
.PP
The manual Sections are traditionally defined as follows:
.TP 10
.TP
.B 6 Games
.TP
-.B 7 Conventions and miscellaneous
+.B 7 Overview, conventions, and miscellaneous
Overviews of various topics, conventions and protocols,
character set standards, and miscellaneous other things.
.TP
.BR man (7)
for important details of the line(s) that should follow the
\fB.SH NAME\fP command.
+All words in this line (including the word immediately
+following the "\\\-") should be in lowercase,
+except where English or technical terminological convention
+dictates otherwise.
.TP
.B SYNOPSIS
briefly describes the command or function's interface.
then alphabetically by name, possibly followed by
other related pages or documents.
Do not terminate this with a period.
+.IP
+Where the SEE ALSO list contains many long manual page names,
+to improve the visual result of the output, it may be useful to employ the
+.I .ad l
+(don't right justify)
+and
+.I .nh
+(don't hyphenate)
+directives.
+Hyphenation of individual page names can be prevented
+by preceding words with the string "\\%".
.SS Font conventions
.PP
For functions, the arguments are always specified using italics,
.I man-pages
follows American spelling conventions;
please write all new pages and patches according to these conventions.
-.SS Example Programs and Shell Sessions
+.SS Capitalization
+In subsection ("SS") headings
+capitalize the first word in heading, but otherwise use lower case,
+except where English usage (e.g., proper nouns) or programming
+language requirements (e.g., identifier names) dictate otherwise.
+.SS Example programs and shell sessions
Manual pages can include example programs demonstrating how to
use a system call or library function.
However, note the following:
.\" (C) Copyright 1992-1999 Rickard E. Faith and David A. Wheeler
.\" (faith@cs.unc.edu and dwheeler@ida.org)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified Sun Jul 25 11:06:05 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified Sat Jun 8 00:39:52 1996 by aeb
.\" Modified Tue Jul 27 20:12:02 2004 by Colin Watson <cjwatson@debian.org>
.\" 2007-05-30, mtk: various rewrites and moved much text to new man-pages.7.
.\"
-.TH MAN 7 2011-10-05 "Linux" "Linux Programmer's Manual"
+.TH MAN 7 2012-08-05 "Linux" "Linux Programmer's Manual"
.SH NAME
man \- macros to format man pages
.SH SYNOPSIS
punctuation in Roman.
If no arguments are given, the command is applied to the following line
of text.
-.SS "Other Macros and Strings"
+.SS Other macros and strings
.PP
Below are other relevant macros and predefined strings.
Unless noted otherwise, all macros
try to use ens or ems as units for
indents, since these will automatically adjust to font size changes.
The other key macro definitions are:
-.SS "Normal Paragraphs"
+.SS Normal paragraphs
.TP 9m
.B \&.LP
Same as
.TP
.B \&.PP
Begin a new paragraph and reset prevailing indent.
-.SS "Relative Margin Indent"
+.SS Relative margin indent
.TP 9m
.BI \&.RS " i"
Start relative margin indent: moves the left margin
.B \&.RE
End relative margin indent and
restores the previous value of the prevailing indent.
-.SS "Indented Paragraph Macros"
+.SS Indented paragraph macros
.TP 9m
.BI \&.HP " i"
Begin paragraph with a hanging indent
its results are like those of the
.B \&.IP
command.
-.SS "Hypertext Link Macros"
+.SS Hypertext link macros
(Feature supported with
.B groff
only.)
See
.BR groff_www (7)
for more details.
-.SS "Miscellaneous Macros"
+.SS Miscellaneous macros
.TP 9m
.B \&.DT
Reset tabs to default tab values (every 0.5 inches);
(like
.BR \&.SH ,
but used for a subsection inside a section).
-.SS "Predefined Strings"
+.SS Predefined strings
The
.B man
package has the following predefined strings:
Left angled double quote: \*(lq
.IP \e*(rq
Right angled double quote: \*(rq
-.SS "Safe Subset"
+.SS Safe subset
Although technically
.B man
is a troff macro package, in reality a large number of other tools
.B URL
macro to identify links to related information.
If you include URLs, use the full URL
-(e.g., <http://www.kernelnotes.org>) to ensure that tools
-can automatically find the URLs.
+(e.g.,
+.UR http://www.kernelnotes.org
+.UE )
+to ensure that tools can automatically find the URLs.
.PP
Tools processing these files should open the file and examine the first
nonwhitespace character.
.\" .IP \(em
.\" David A. Wheeler (dwheeler@ida.org) heavily modified this
.\" manual page, such as adding detailed information on sections and macros.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR apropos (1),
.BR groff (1),
.BR lexgrog (1),
.\" Copyright (c) 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH MATH_ERROR 7 2008-08-11 "Linux" "Linux Programmer's Manual"
.SH NAME
The error conditions that can occur for mathematical functions
are described below.
-.SS Domain Error
+.SS Domain error
A
.I domain error
occurs when a mathematical function is supplied with an argument whose
and an "invalid"
.RB ( FE_INVALID )
floating-point exception is raised.
-.SS Pole Error
+.SS Pole error
A
.I pole error
occurs when the mathematical result of a function is an exact infinity
and a "divide-by-zero"
.RB ( FE_DIVBYZERO )
floating-point exception is raised.
-.SS Range Error
+.SS Range error
A
.I range error
occurs when the magnitude of the function result means that it
.BR isgreater (3),
.BR matherr (3),
.BR nan (3)
-.br
+
.I "info libc"
.\" Copyright (c) 1991, 1993
.\" The Regents of the University of California. All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)mdoc.7 8.2 (Berkeley) 12/30/93
.\" $Id: mdoc.7,v 1.8 1998/12/04 00:51:17 jkoshy Exp $
Options:
.Bl -tag -width flag -compact
.It Ar List-types
-.Bl -column xbullet -compact
+.Bl -column ".Fl bullet" -compact
.It Fl bullet Ta "Bullet Item List"
.It Fl item Ta "Unlabeled List"
.It Fl enum Ta "Enumerated List"
.ne 1i
.Ss Manual Domain Macros
.Bl -column "Name" "Parsed" Callable" -compact
-.It Em Name Parsed Callable Description
+.It Em "Name Parsed Callable Description"
.It Li \&Ad Ta Yes Ta Yes Ta "Address. (This macro may be deprecated.)"
.It Li \&An Ta Yes Ta Yes Ta "Author name."
.It Li \&Ar Ta Yes Ta Yes Ta "Command-line argument."
.Xr man 7 ,
.Xr man-pages 7
.Sh COLOPHON
-This page is part of release 3.41 of the Linux
+This page is part of release 3.50 of the Linux
.Em man-pages
project.
A description of the project,
.\" Copyright (c) 1990, 1993
.\" The Regents of the University of California. All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)mdoc.samples.7 8.2 (Berkeley) 12/30/93
.\" $Id: mdoc.samples.7,v 1.17 1998/12/03 03:38:45 jkoshy Exp $
.\" times and is guaranteed to give a worst case performance
.\" for an already extremely slow package.
.\"
+.\" String \*(Pu was not defined, probably means punctuation
+.ds Pu "[ .,:;()[]?! ]
.Dd December 30, 1993
.Os
.Dt MDOC.SAMPLES 7
.\" PS1 UNIX Programmer's Supplementary Documents
.Pp
.Bl -column SMM -offset indent -compact
-.It Li AMD UNIX Ancestral Manual Documents
-.It Li SMM UNIX System Manager's Manual
-.It Li URM UNIX Reference Manual
-.It Li PRM UNIX Programmer's Manual
+.It Li "AMD UNIX Ancestral Manual Documents"
+.It Li "SMM UNIX System Manager's Manual"
+.It Li "URM UNIX Reference Manual"
+.It Li "PRM UNIX Programmer's Manual"
.El
.Pp
The default volume labeling is
of the form addr1[,addr2[,addr3]].
.Pp
.Dl Usage: .Ad address ... \*(Pu
-.Bl -tag -width ".Ad f1 , f2 , f3 :" -compact -offset 14n
+.Bl -tag -width "\&.Ad f1 , f2 , f3 :" -compact -offset 14n
.It Li \&.Ad addr1
.Ad addr1
.It Li \&.Ad addr1\ .
to be punctuation.
.Pp
.Dl Usage: .An author_name \*(Pu
-.Bl -tag -width ".An Joe Author ) ) ," -compact -offset 14n
+.Bl -tag -width "\&.An Joe Author ) ) ," -compact -offset 14n
.It Li \&.An Joe\ Author
.An Joe Author
.It Li \&.An Joe\ Author\ ,
a command-line argument is referenced.
.Pp
.Dl Usage: .Ar argument ... \*(Pu
-.Bl -tag -width ".Ar file1 file2" -compact -offset 15n
+.Bl -tag -width "\&.Ar file1 file2" -compact -offset 15n
.It Li \&.Ar
.Ar
.It Li \&.Ar file1
If
.Ql \&.Ar
is called without arguments
-.Ql Ar
+.Ql \&Ar
is assumed.
The
.Ql \&.Ar
.Ql \&.Dv .
.Pp
.Dl Usage: .Dv defined_variable ... \*(Pu
-.Bl -tag -width ".Dv MAXHOSTNAMELEN" -compact -offset 14n
+.Bl -tag -width "\&.Dv MAXHOSTNAMELEN" -compact -offset 14n
.It Li ".Dv MAXHOSTNAMELEN"
.Dv MAXHOSTNAMELEN
.It Li ".Dv TIOCGPGRP )"
a section two manual page.
.Pp
.Dl Usage: .Er ERRNOTYPE ... \*(Pu
-.Bl -tag -width ".Bq Er ENOTDIR" -compact -offset 14n
+.Bl -tag -width "\&.Bq Er ENOTDIR" -compact -offset 14n
.It Li \&.Er ENOENT
.Er ENOENT
.It Li \&.Er ENOENT\ )\ ;
macro specifies an environment variable.
.Pp
.Dl Usage: .Ev argument ... \*(Pu
-.Bl -tag -width ".Ev PRINTER ) ) ," -compact -offset 14n
+.Bl -tag -width "\&.Ev PRINTER ) ) ," -compact -offset 14n
.It Li \&.Ev DISPLAY
.Ev DISPLAY
.It Li \&.Ev PATH\ .
may also be used to refer to structure members.
.Pp
.Dl Usage: .Fa function_argument ... \*(Pu
-.Bl -tag -width ".Fa d_namlen\ )\ )\ ," -compact -offset 14n
+.Bl -tag -width "\&.Fa d_namlen\ )\ )\ ," -compact -offset 14n
.It Li \&.Fa d_namlen\ )\ )\ ,
.Fa d_namlen ) ) ,
.It Li \&.Fa iov_len
macro is identical, but without the dash.
.Pp
.Dl Usage: .Fl argument ... \*(Pu
-.Bl -tag -width ".Fl \-s \-t \-v" -compact -offset 14n
+.Bl -tag -width "\&.Fl \-s \-t \-v" -compact -offset 14n
.It Li \&.Fl
.Fl
.It Li \&.Fl cfv
.Bd -literal
Usage: .Fn [type] function [[type] parameters ... \*(Pu]
.Ed
-.Bl -tag -width ".Fn _int align_ _const * char *sptrsxx" -compact
+.Bl -tag -width "\&.Fn _int align_ _const * char *sptrsxx" -compact
.It Li "\&.Fn getchar"
.Fn getchar
.It Li "\&.Fn strlen ) ,"
macro designates an interactive or internal command.
.Pp
.Dl Usage: .Ic argument ... \*(Pu
-.Bl -tag -width ".Ic setenv , unsetenvxx" -compact -offset 14n
+.Bl -tag -width "\&.Ic setenv , unsetenvxx" -compact -offset 14n
.It Li \&.Ic :wq
.Ic :wq
.It Li \&.Ic do while {...}
it can not recall the first argument it was invoked with.
.Pp
.Dl Usage: .Nm argument ... \*(Pu
-.Bl -tag -width ".Nm mdoc.sample" -compact -offset 14n
+.Bl -tag -width "\&.Nm mdoc.sample" -compact -offset 14n
.It Li \&.Nm mdoc.sample
.Nm mdoc.sample
.It Li \&.Nm \e-mdoc
may be used across one or more lines.
.Pp
.Dl Usage: .Op options ... \*(Pu
-.Bl -tag -width ".Op Fl c Ar objfil Op Ar corfil ," -compact -offset indent
+.Bl -tag -width "\&.Op Fl c Ar objfil Op Ar corfil ," -compact -offset indent
.It Li \&.Op
.Op
.It Li ".Op Fl k"
macro formats pathnames or filenames.
.Pp
.Dl Usage: .Pa pathname \*(Pu
-.Bl -tag -width ".Pa /tmp/fooXXXXX ) ." -compact -offset 14n
+.Bl -tag -width "\&.Pa /tmp/fooXXXXX ) ." -compact -offset 14n
.It Li \&.Pa /usr/share
.Pa /usr/share
.It Li \&.Pa /tmp/fooXXXXX\ )\ .
Generic variable reference:
.Pp
.Dl Usage: .Va variable ... \*(Pu
-.Bl -tag -width ".Va char s ] ) ) ," -compact -offset 14n
+.Bl -tag -width "\&.Va char s ] ) ) ," -compact -offset 14n
.It Li \&.Va count
.Va count
.It Li \&.Va settimer ,
remaining arguments are assumed to be punctuation.
.Pp
.Dl Usage: .Xr man_page [1,...,8] \*(Pu
-.Bl -tag -width ".Xr mdoc 7 ) ) ," -compact -offset 14n
+.Bl -tag -width "\&.Xr mdoc 7 ) ) ," -compact -offset 14n
.It Li \&.Xr mdoc
.Xr mdoc
.It Li \&.Xr mdoc\ ,
.Bd -literal -offset indent -compact
Usage: .At [v6 | v7 | 32v | V.1 | V.4] ... \*(Pu
.Ed
-.Bl -tag -width ".At v6 ) ," -compact -offset 14n
+.Bl -tag -width "\&.At v6 ) ," -compact -offset 14n
.It Li ".At"
.At
.It Li ".At v6 ."
It accepts at most two arguments.
.Ss BSD Macro
.Dl Usage: .Bx [Version/release] ... \*(Pu
-.Bl -tag -width ".Bx 4.3 ) ," -compact -offset 14n
+.Bl -tag -width "\&.Bx 4.3 ) ," -compact -offset 14n
.It Li ".Bx"
.Bx
.It Li ".Bx 4.3 ."
.Bd -literal -offset indent -compact
Usage: .Fx Version.release ... \*(Pu
.Ed
-.Bl -tag -width ".Fx 2.2 ) ," -compact -offset 14n
+.Bl -tag -width "\&.Fx 2.2 ) ," -compact -offset 14n
.It Li ".Fx 2.2 ."
.Fx 2.2 .
.El
It accepts at most two arguments.
.Ss UNIX Macro
.Dl Usage: .Ux ... \*(Pu
-.Bl -tag -width ".Ux 4.3 ) ," -compact -offset 14n
+.Bl -tag -width "\&.Ux 4.3 ) ," -compact -offset 14n
.It Li ".Ux"
.Ux
.El
.Pp
.ne 4
Examples of quoting:
-.Bl -tag -width ".Aq Pa ctype.h ) ,xxxxxxxx" -compact -offset indent
+.Bl -tag -width "\&.Aq Pa ctype.h ) ,xxxxxxxx" -compact -offset indent
.It Li \&.Aq
.Aq
.It Li \&.Aq \&Ar ctype.h\ )\ ,
macro eliminates unwanted spaces in between macro requests.
It is useful for old style argument lists where there is no space
between the flag and argument:
-.Bl -tag -width ".Op Fl I Ns Ar directoryxx" -offset indent
+.Bl -tag -width "\&.Op Fl I Ns Ar directoryxx" -offset indent
.It Li ".Op Fl I Ns Ar directory"
produces
.Op Fl I Ns Ar directory
.Ql \&.Rv -std atexit
will generate the following text:
.Pp
-.\" fake chapter 3 to avoid error message from Rv
-.ds cH 3
+.\" fake section 3 to avoid error message from Rv
+.\".ds cH 3
+.ds section 3
.Rv -std atexit
.\" and back to 7 again
-.ds cH 7
+.\".ds cH 7
+.ds section 7
.Pp
The
.Fl std
all upper case words longer than two characters.
.Pp
.Dl Usage: .Tn symbol ... \*(Pu
-.Bl -tag -width ".Tn ASCII" -compact -offset 14n
+.Bl -tag -width "\&.Tn ASCII" -compact -offset 14n
.It Li \&.Tn DEC
.Tn DEC
.It Li \&.Tn ASCII
.Ql \&.Sh
macro can take up to nine arguments.
It is parsed and but is not callable.
-.Bl -tag -width ".Sh SYNOPSIS"
+.Bl -tag -width "\&.Sh SYNOPSIS"
.It \&.Sh NAME
The
.Ql \&.Sh NAME
configuration device usage macro.
Several other macros may be necessary to produce
the synopsis line as shown below:
+.El
.Pp
.Bd -filled -offset indent
.Nm cat
.Sx PREDEFINED STRINGS
for a usable \*(Ba
character in other situations.
+.Bl -tag
.It \&.Sh DESCRIPTION
In most cases the first text in the
.Sx DESCRIPTION
The display-type must be one of the following four types and
may have an offset specifier for indentation:
.Ql \&.Bd .
+.El
.Pp
.Bl -tag -width "file file_name " -compact
.It Fl ragged
work and perhaps may never do the right thing by
.Xr troff .
.El
-.El
.It ".Ed"
End-display.
.El
The usual font for emphasis is italic.
.Pp
.Dl Usage: .Em argument ... \*(Pu
-.Bl -tag -width ".Em vide infra ) ) ," -compact -offset 14n
+.Bl -tag -width "\&.Em vide infra ) ) ," -compact -offset 14n
.It Li ".Em does not"
.Em does not
.It Li ".Em exceed 1024 ."
would be typed.
.Pp
.Dl Usage: .Li argument ... \*(Pu
-.Bl -tag -width ".Li cntrl-D ) ," -compact -offset 14n
+.Bl -tag -width "\&.Li cntrl-D ) ," -compact -offset 14n
.It Li \&.Li \een
.Li \en
.It Li \&.Li M1 M2 M3\ ;
either the symbolic sense or the traditional English usage.
.Pp
.Dl Usage: .Sy symbol ... \*(Pu
-.Bl -tag -width ".Sy Important Noticex" -compact -offset 14n
+.Bl -tag -width "\&.Sy Important Noticex" -compact -offset 14n
.It Li \&.Sy Important Notice
.Sy Important Notice
-.El
.Pp
The
.Ql \&.Sy
Arguments to
.Ql \&.Sy
may be quoted.
+.El
.It Li \&.Bf
Begin font mode.
The
\&Lastly item three goes here.
\&.El
.Ed
+.El
.Pp
The results:
.Pp
Bullet two here.
.El
.Pp
+.Bl -ohang -compact
.It Fl tag
.It Fl diag
.It Fl hang
.Em tagged .
This
list was constructed with the
-.Ql Fl ohang
+.Ql \&Fl ohang
list-type.
The
.Ql \&.It
macro is parsed only for the inset, hang
and tag list-types and is not callable.
Here is an example of inset labels:
+.El
.Bl -inset -offset indent
.It Em Tag
The tagged list (also called a tagged paragraph) is the
again, the width is set to the constant width of the string
given.
.El
-.El
.Pp
If a width is not specified for the tag list type, the first
time
.Xr groff_mdoc 7 ,
.Xr mdoc 7
.Sh COLOPHON
-This page is part of release 3.41 of the Linux
+This page is part of release 3.50 of the Linux
.Em man-pages
project.
A description of the project,
'\" t
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH MQ_OVERVIEW 7 2009-09-27 "Linux" "Linux Programmer's Manual"
.SH NAME
-mq_overview \- Overview of POSIX message queues
+mq_overview \- overview of POSIX message queues
.SH DESCRIPTION
POSIX message queues allow processes to exchange data in
the form of messages.
or
.BR epoll (7).
This is not portable.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
System V message queues
.SH EXAMPLE
An example of the use of various message queue functions is shown in
.BR mq_notify (3).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getrlimit (2),
.BR mq_getsetattr (2),
.BR poll (2),
'\" t
-.\" Don't change the first line, it tells man that tbl is needed.
.\" This man page is Copyright (C) 1999 Andi Kleen <ak@muc.de>.
+.\"
+.\" %%%LICENSE_START(VERBATIM_ONE_PARA)
.\" Permission is granted to distribute possibly modified copies
.\" of this page provided the header is included verbatim,
.\" and in case of nontrivial modification author and date
.\" of the modification is added to the header.
+.\" %%%LICENSE_END
+.\"
.\" $Id: netdevice.7,v 1.10 2000/08/17 10:09:54 ak Exp $
.\"
.\" Modified, 2004-11-25, mtk, formatting and a few wording fixes
.\"
.TH NETDEVICE 7 2012-04-26 "Linux" "Linux Programmer's Manual"
.SH NAME
-netdevice \- Low level access to Linux network devices
+netdevice \- low-level access to Linux network devices
.SH SYNOPSIS
.B "#include <sys/ioctl.h>"
.br
Get or set the active flag word of the device.
.I ifr_flags
contains a bit mask of the following values:
+.\" Do not right adjust text blocks in tables
+.na
.TS
tab(:);
c s
IFF_LOOPBACK:Interface is a loopback interface.
IFF_POINTOPOINT:Interface is a point-to-point link.
IFF_RUNNING:Resources allocated.
-IFF_NOARP:No arp protocol, L2 destination address not set.
+IFF_NOARP:T{
+No arp protocol, L2 destination address not set.
+T}
IFF_PROMISC:Interface is in promiscuous mode.
IFF_NOTRAILERS:Avoid use of trailers.
IFF_ALLMULTI:Receive all multicast packets.
IFF_DORMANT:Driver signals dormant (since Linux 2.6.17)
IFF_ECHO:Echo sent packets (since Linux 2.6.25)
-
.TE
+.ad
Setting the active flag word is a privileged operation, but any
process may read it.
.TP
#endif
.fi
.in
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR proc (5),
.BR capabilities (7),
.BR ip (7),
'\" t
-.\" Don't change the first line, it tells man that tbl is needed.
-.\" This man page is Copyright (c) 1998 by Andi Kleen. Subject to the GPL.
+.\" This man page is Copyright (c) 1998 by Andi Kleen.
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
+.\" Subject to the GPL.
+.\" %%%LICENSE_END
+.\"
.\" Based on the original comments from Alexey Kuznetsov
.\" Modified 2005-12-27 by Hasso Tepper <hasso@estpak.ee>
.\" $Id: netlink.7,v 1.8 2000/06/22 13:23:00 ak Exp $
-.TH NETLINK 7 2012-04-14 "Linux" "Linux Programmer's Manual"
+.TH NETLINK 7 2013-03-15 "Linux" "Linux Programmer's Manual"
.SH NAME
-netlink \- Communication between kernel and userspace (AF_NETLINK)
+netlink \- communication between kernel and user space (AF_NETLINK)
.SH SYNOPSIS
.nf
.B #include <asm/types.h>
.fi
.SH DESCRIPTION
Netlink is used to transfer information between kernel and
-userspace processes.
-It consists of a standard sockets-based interface for userspace
+user-space processes.
+It consists of a standard sockets-based interface for user space
processes and an internal kernel API for kernel modules.
The internal kernel interface is not documented in this manual page.
There is also an obsolete netlink interface
Reserved for user-mode socket protocols.
.TP
.B NETLINK_FIREWALL
-Transport IPv4 packets from netfilter to userspace.
+Transport IPv4 packets from netfilter to user space.
Used by
.I ip_queue
kernel module.
.TP
.B NETLINK_FIB_LOOKUP
.\" FIXME More details on NETLINK_FIB_LOOKUP needed.
-Access to FIB lookup from userspace.
+Access to FIB lookup from user space.
.TP
.B NETLINK_CONNECTOR
Kernel connector.
See
.I Documentation/connector/*
-in the kernel source for further information.
+in the Linux kernel source tree for further information.
.TP
.B NETLINK_NETFILTER
.\" FIXME More details on NETLINK_NETFILTER needed.
Netfilter subsystem.
.TP
.B NETLINK_IP6_FW
-Transport IPv6 packets from netfilter to userspace.
+Transport IPv6 packets from netfilter to user space.
Used by
.I ip6_queue
kernel module.
.TP
.B NETLINK_KOBJECT_UEVENT
.\" FIXME More details on NETLINK_KOBJECT_UEVENT needed.
-Kernel messages to userspace.
+Kernel messages to user space.
.TP
.B NETLINK_GENERIC
Generic netlink family for simplified netlink usage.
__u16 nlmsg_type; /* Type of message content. */
__u16 nlmsg_flags; /* Additional flags. */
__u32 nlmsg_seq; /* Sequence number. */
- __u32 nlmsg_pid; /* PID of the sending process. */
+ __u32 nlmsg_pid; /* Sender port ID. */
};
.fi
.in
.BR rtnetlink (7)
for
.BR NETLINK_ROUTE .
-
-Standard flag bits in
-.I nlmsg_flags
-.br
----------------------------------
.TS
tab(:);
+l s
lB l.
+Standard flag bits in \fInlmsg_flags\fP
+_
NLM_F_REQUEST:Must be set on all request messages.
NLM_F_MULTI:T{
The message is part of a multipart message terminated by
NLM_F_ACK:Request for an acknowledgment on success.
NLM_F_ECHO:Echo this request.
.TE
-
-Additional flag bits for GET requests
-.br
--------------------------------------
+.ad
+.sp 1
+.\" No right adjustment for text blocks in tables
+.na
.TS
tab(:);
+l s
lB l.
+Additional flag bits for GET requests
+_
NLM_F_ROOT:Return the complete table instead of a single entry.
NLM_F_MATCH:T{
Return all entries matching criteria passed in message content.
T}
.\" FIXME NLM_F_ATOMIC is not used any more?
NLM_F_ATOMIC:Return an atomic snapshot of the table.
-NLM_F_DUMP:Convenience macro; equivalent to (NLM_F_ROOT|NLM_F_MATCH).
+NLM_F_DUMP:T{
+Convenience macro; equivalent to (NLM_F_ROOT|NLM_F_MATCH).
+T}
.TE
-
+.ad
+.sp 1
Note that
.B NLM_F_ATOMIC
requires the
.B CAP_NET_ADMIN
capability or an effective UID of 0.
-
-Additional flag bits for NEW requests
-.br
--------------------------------------
+.na
.TS
tab(:);
+l s
lB l.
+Additional flag bits for NEW requests
+_
NLM_F_REPLACE:Replace existing matching object.
NLM_F_EXCL:Don't replace if the object already exists.
NLM_F_CREATE:Create object if it doesn't already exist.
NLM_F_APPEND:Add to the end of the object list.
.TE
-
+.ad
+.sp 1
.I nlmsg_seq
and
.I nlmsg_pid
However, reliable transmissions from kernel to user are impossible
in any case.
The kernel can't send a netlink message if the socket buffer is full:
-the message will be dropped and the kernel and the userspace process will
+the message will be dropped and the kernel and the user-space process will
no longer have the same view of kernel state.
It is up to the application to detect when this happens (via the
.B ENOBUFS
error returned by
.BR recvmsg (2))
and resynchronize.
-.SS Address Formats
+.SS Address formats
The
.I sockaddr_nl
structure describes a netlink client in user space or in the kernel.
struct sockaddr_nl {
sa_family_t nl_family; /* AF_NETLINK */
unsigned short nl_pad; /* Zero. */
- pid_t nl_pid; /* Process ID. */
+ pid_t nl_pid; /* Port ID. */
__u32 nl_groups; /* Multicast groups mask. */
};
.fi
.I nl_pid
is the unicast address of netlink socket.
It's always 0 if the destination is in the kernel.
-For a userspace process,
+For a user-space process,
.I nl_pid
is usually the PID of the process owning the destination socket.
However,
Only processes with an effective UID of 0 or the
.B CAP_NET_ADMIN
capability may send or listen to a netlink multicast group.
+Since Linux 2.6.13,
+.\" commit d629b836d151d43332492651dd841d32e57ebe3b
+messages can't be broadcast to multiple groups.
Any replies to a message received for a multicast group should be
sent back to the sending PID and the multicast group.
Some Linux kernel subsystems may additionally allow other users
.nf
struct nlmsghdr *nh; /* The nlmsghdr with payload to send. */
struct sockaddr_nl sa;
-struct iovec iov = { (void *) nh, nh\->nlmsg_len };
+struct iovec iov = { nh, nh\->nlmsg_len };
struct msghdr msg;
-msg = { (void *)&sa, sizeof(sa), &iov, 1, NULL, 0, 0 };
+msg = { &sa, sizeof(sa), &iov, 1, NULL, 0, 0 };
memset(&sa, 0, sizeof(sa));
sa.nl_family = AF_NETLINK;
nh\->nlmsg_pid = 0;
struct msghdr msg;
struct nlmsghdr *nh;
-msg = { (void *)&sa, sizeof(sa), &iov, 1, NULL, 0, 0 };
+msg = { &sa, sizeof(sa), &iov, 1, NULL, 0, 0 };
len = recvmsg(fd, &msg, 0);
for (nh = (struct nlmsghdr *) buf; NLMSG_OK (nh, len);
}
.fi
.in
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cmsg (3),
.BR netlink (3),
.BR capabilities (7),
.BR rtnetlink (7)
-.PP
-ftp://ftp.inr.ac.ru/ip-routing/iproute2*
-for information about libnetlink.
-http://people.suug.ch/~tgr/libnl/
-for information about libnl.
+.UR ftp://ftp.inr.ac.ru\:/ip-routing\:/iproute2*
+information about libnetlink
+.UE
+
+.UR http://people.suug.ch\:/~tgr\:/libnl/
+information about libnl
+.UE
RFC 3549 "Linux Netlink as an IP Services Protocol"
.\" numa_maps material Copyright (c) 2005 Silicon Graphics Incorporated.
.\" Christoph Lameter, <cl@linux-foundation.org>.
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH NUMA 7 2008-08-15 "Linux" "Linux Programmer's Manual"
+.TH NUMA 7 2012-08-05 "Linux" "Linux Programmer's Manual"
.SH NAME
numa \- overview of Non-Uniform Memory Architecture
.SH DESCRIPTION
However, applications should normally use the interface provided by
.IR libnuma ;
see "Library Support" below.
-.SS /proc/[number]/numa_maps " (since Linux 2.6.14)"
+.SS /proc/[number]/numa_maps (since Linux 2.6.14)
.\" See also Changelog-2.6.14
This file displays information about a process's
NUMA memory policy and allocation.
.TP
.I writeback=<pages>
Number of pages that are currently being written out to disk.
+.SH CONFORMING TO
+No standards govern NUMA interfaces.
.SH NOTES
The Linux NUMA system calls and
.I /proc
if the kernel was configured and built with the
.BR CONFIG_NUMA
option.
-.SS Library Support
+.SS Library support
Link with \fI\-lnuma\fP
to get the system call definitions.
.I libnuma
The
.I numactl
package is available at
-.IR ftp://oss.sgi.com/www/projects/libnuma/download/ .
+.UR ftp://oss.sgi.com\:/www\:/projects\:/libnuma\:/download/
+.UE .
The package is also included in some Linux distributions.
Some distributions include the development library and header
in the separate
.I numactl-devel
package.
-.SH "CONFORMING TO"
-No standards govern NUMA interfaces.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR get_mempolicy (2),
.BR mbind (2),
.BR move_pages (2),
.\" Copyright (c) 1989, 1990, 1993
.\" The Regents of the University of California. All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_3_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)operator.7 8.1 (Berkeley) 6/9/93
.\"
.\" This man page is Copyright (C) 1999 Andi Kleen <ak@muc.de>.
+.\"
+.\" %%%LICENSE_START(VERBATIM_ONE_PARA)
.\" Permission is granted to distribute possibly modified copies
.\" of this page provided the header is included verbatim,
.\" and in case of nontrivial modification author and date
.\" of the modification is added to the header.
+.\" %%%LICENSE_END
+.\"
.\" $Id: packet.7,v 1.13 2000/08/14 08:03:45 ak Exp $
+.\"
.TH PACKET 7 2012-05-10 "Linux" "Linux Programmer's Manual"
.SH NAME
packet \- packet interface on device level.
.BR recvfrom (2)
the real length of the packet on the wire is always returned,
even when it is longer than the buffer.
-.SS Address Types
+.SS Address types
The sockaddr_ll is a device independent physical layer address.
.in +4n
and
.I sll_ifindex
are used.
-.SS Socket Options
+.SS Socket options
Packet sockets can be used to configure physical layer multicasting
and promiscuous mode.
It works by calling
and
.BR socket (7)
are valid on packet sockets.
-.SS Error Handling
+.SS Error handling
Packet sockets do no error handling other than errors occurred
while passing the packet to the device driver.
They don't have the concept of a pending error.
.\" This man page was written by Andi Kleen with help from Matthew Wilcox.
.\" AF_PACKET in Linux 2.2 was implemented
.\" by Alexey Kuznetsov, based on code by Alan Cox and others.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR socket (2),
.BR pcap (3),
.BR capabilities (7),
.BR socket (7)
RFC\ 894 for the standard IP Ethernet encapsulation.
-
RFC\ 1700 for the IEEE 802.3 IP encapsulation.
The
.\" Copyright (C) 2003 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PATH_RESOLUTION 7 2009-12-05 "Linux" "Linux Programmer's Manual"
.SH NAME
.SH DESCRIPTION
Some UNIX/Linux system calls have as parameter one or more filenames.
A filename (or pathname) is resolved as follows.
-.SS "Step 1: Start of the resolution process"
+.SS Step 1: start of the resolution process
If the pathname starts with the \(aq/\(aq character,
the starting lookup directory
is the root directory of the calling process.
Pathnames starting with a \(aq/\(aq character are called absolute pathnames.
Pathnames not starting with a \(aq/\(aq are called relative pathnames.
-.SS "Step 2: Walk along the path"
+.SS Step 2: walk along the path
Set the current lookup directory to the starting lookup directory.
Now, for each nonfinal component of the pathname, where a component
is a substring delimited by \(aq/\(aq characters, this component is looked up
.\" presently: max recursion depth during symlink resolution: 5
.\" max total number of symbolic links followed: 40
.\" _POSIX_SYMLOOP_MAX is 8
-.SS "Step 3: Find the final entry"
+.SS Step 3: find the final entry
The lookup of the final component of the pathname goes just like
that of all other components, as described in the previous step,
with two differences: (i) the final component need not be a
The details on the treatment
of the final entry are described in the manual pages of the specific
system calls.
-.SS ". and .."
+.SS . and ..
By convention, every directory has the entries "." and "..",
which refer to the directory itself and to its parent directory,
respectively.
actually present in the physical file system.
One cannot walk down past the root: "/.." is the same as "/".
-.SS "Mount points"
+.SS Mount points
After a "mount dev path" command, the pathname "path" refers to
the root of the file system hierarchy on the device "dev", and no
longer to whatever it referred to earlier.
One can walk out of a mounted file system: "path/.." refers to
the parent directory of "path",
outside of the file system hierarchy on "dev".
-.SS "Trailing slashes"
+.SS Trailing slashes
If a pathname ends in a \(aq/\(aq, that forces resolution of the preceding
component as in Step 2: it has to exist and resolve to a directory.
Otherwise a trailing \(aq/\(aq is ignored.
(Or, equivalently, a pathname with a trailing \(aq/\(aq is equivalent to
the pathname obtained by appending \(aq.\(aq to it.)
-.SS "Final symlink"
+.SS Final symlink
If the last component of a pathname is a symbolic link, then it
depends on the system call whether the file referred to will be
the symbolic link or the result of path resolution on its contents.
will operate on the symlink, while
.BR stat (2)
operates on the file pointed to by the symlink.
-.SS "Length limit"
+.SS Length limit
There is a maximum length for pathnames.
If the pathname (or some
intermediate pathname obtained while resolving symbolic links)
is too long, an
.B ENAMETOOLONG
error is returned ("Filename too long").
-.SS "Empty pathname"
+.SS Empty pathname
In the original UNIX, the empty pathname referred to the current directory.
Nowadays POSIX decrees that an empty pathname must not be resolved
successfully.
Linux returns
.B ENOENT
in this case.
-.SS "Permissions"
+.SS Permissions
The permission bits of a file consist of three groups of three bits, cf.\&
.BR chmod (1)
and
See
.BR setfsgid (2).
.\" FIXME say something about file system mounted read-only ?
-.SS "Bypassing permission checks: superuser and capabilities"
+.SS Bypassing permission checks: superuser and capabilities
On a traditional UNIX system, the superuser
.RI ( root ,
user ID 0) is all-powerful, and bypasses all permissions restrictions
on directories, and read permission on ordinary files.
.\" FIXME say something about immutable files
.\" FIXME say something about ACLs
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR readlink (2),
.BR capabilities (7),
.BR credentials (7),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2005 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PIPE 7 2005-12-08 "Linux" "Linux Programmer's Manual"
.SH NAME
although FIFOs have a pathname in the file system,
I/O on FIFOs does not involve operations on the underlying device
(if there is one).
-.SS "I/O on Pipes and FIFOs"
+.SS I/O on pipes and FIFOs
The only difference between pipes and FIFOs is the manner in which
they are created and opened.
Once these tasks have been accomplished,
It is not possible to apply
.BR lseek (2)
to a pipe.
-.SS "Pipe Capacity"
+.SS Pipe capacity
A pipe has a limited capacity.
If the pipe is full, then a
.BR write (2)
.BR write (2)
to see how many bytes were actually written),
and these bytes may be interleaved with writes by other processes.
-.SS "Open File Status Flags"
+.SS Open file status flags
The only open file status flags that can be meaningfully applied to
a pipe or FIFO are
.B O_NONBLOCK
On Linux,
.B O_ASYNC
is supported for pipes and FIFOs only since kernel 2.6.
-.SS "Portability notes"
+.SS Portability notes
On some systems (but not Linux), pipes are bidirectional:
data can be transmitted in both directions between the pipe ends.
According to POSIX.1-2001, pipes only need to be unidirectional.
Portable applications should avoid reliance on
bidirectional pipe semantics.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR dup (2),
.BR fcntl (2),
.BR open (2),
.\" Copyright (c) 2003 Andries Brouwer (aeb@cwi.nl)
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.TH POSIXOPTIONS 7 2007-12-21 "" "Linux Programmer's Manual"
.SH NAME
a very short description.
Much more precise detail can be found in the POSIX standard itself,
versions of which can nowadays be accessed freely on the web.
-.SS "ADV - _POSIX_ADVISORY_INFO - _SC_ADVISORY_INFO"
+.SS ADV - _POSIX_ADVISORY_INFO - _SC_ADVISORY_INFO
The following advisory functions are present:
.br
.nf
.br
.in -4
.fi
-.SS "AIO - _POSIX_ASYNCHRONOUS_IO - _SC_ASYNCHRONOUS_IO"
+.SS AIO - _POSIX_ASYNCHRONOUS_IO - _SC_ASYNCHRONOUS_IO
The header
.I <aio.h>
is present.
.br
.in -4
.fi
-.SS "BAR - _POSIX_BARRIERS - _SC_BARRIERS"
+.SS BAR - _POSIX_BARRIERS - _SC_BARRIERS
This option implies the
.B _POSIX_THREADS
and
.\" Batch environment.
.\" .SS "CD"
.\" C development.
-.SS "--- - POSIX_CHOWN_RESTRICTED"
+.SS --- - POSIX_CHOWN_RESTRICTED
If this option is in effect (as it always is under POSIX.1-2001)
then only root may change the owner of a file, and nonroot can only
set the group of a file to one of the groups it belongs to.
.IR chown (),
.IR fchown ().
.\" What about lchown() ?
-.SS "CS - _POSIX_CLOCK_SELECTION - _SC_CLOCK_SELECTION"
+.SS CS - _POSIX_CLOCK_SELECTION - _SC_CLOCK_SELECTION
This option implies the
.B _POSIX_TIMERS
option.
is changed by the function
.IR clock_settime (),
then this affects all timers set for an absolute time.
-.SS "CPT - _POSIX_CPUTIME - _SC_CPUTIME"
+.SS CPT - _POSIX_CPUTIME - _SC_CPUTIME
The clockID CLOCK_PROCESS_CPUTIME_ID is supported.
The initial value of this clock is 0 for each process.
This option implies the
.\" Fortran development
.\" .SS "FR"
.\" Fortran runtime
-.SS "--- - _POSIX_FILE_LOCKING - _SC_FILE_LOCKING"
+.SS --- - _POSIX_FILE_LOCKING - _SC_FILE_LOCKING
This option has been deleted.
Not in final XPG6.
-.SS "FSC - _POSIX_FSYNC - _SC_FSYNC "
+.SS FSC - _POSIX_FSYNC - _SC_FSYNC
The function
.IR fsync ()
is present.
-.SS "IP6 - _POSIX_IPV6 - _SC_IPV6"
+.SS IP6 - _POSIX_IPV6 - _SC_IPV6
Internet Protocol Version 6 is supported.
-.SS "--- - _POSIX_JOB_CONTROL - _SC_JOB_CONTROL"
+.SS --- - _POSIX_JOB_CONTROL - _SC_JOB_CONTROL
If this option is in effect (as it always is under POSIX.1-2001)
then the system implements POSIX-style job control,
and the following functions are present:
.IR tcsetpgrp ().
.in -4
.fi
-.SS "MF - _POSIX_MAPPED_FILES - _SC_MAPPED_FILES"
+.SS MF - _POSIX_MAPPED_FILES - _SC_MAPPED_FILES
Shared memory is supported.
The include file
.I <sys/mman.h>
.IR mmap (),
.IR msync (),
.IR munmap ().
-.SS "ML - _POSIX_MEMLOCK - _SC_MEMLOCK"
+.SS ML - _POSIX_MEMLOCK - _SC_MEMLOCK
Shared memory can be locked into core.
The functions
.IR mlockall (),
.IR munlockall ()
are present.
-.SS "MR/MLR - _POSIX_MEMLOCK_RANGE - _SC_MEMLOCK_RANGE"
+.SS MR/MLR - _POSIX_MEMLOCK_RANGE - _SC_MEMLOCK_RANGE
More precisely, ranges can be locked into core.
The functions
.IR mlock (),
.IR munlock ()
are present.
-.SS "MPR - _POSIX_MEMORY_PROTECTION - _SC_MEMORY_PROTECTION"
+.SS MPR - _POSIX_MEMORY_PROTECTION - _SC_MEMORY_PROTECTION
The function
.IR mprotect ()
is present.
-.SS "MSG - _POSIX_MESSAGE_PASSING - _SC_MESSAGE_PASSING"
+.SS MSG - _POSIX_MESSAGE_PASSING - _SC_MESSAGE_PASSING
The include file
.I <mqueue.h>
is present.
.br
.in -4
.fi
-.SS "MON - _POSIX_MONOTONIC_CLOCK - _SC_MONOTONIC_CLOCK"
+.SS MON - _POSIX_MONOTONIC_CLOCK - _SC_MONOTONIC_CLOCK
.B CLOCK_MONOTONIC
is supported.
This option implies the
.IR timer_create ().
.in -4
.fi
-.SS "--- - _POSIX_MULTI_PROCESS - _SC_MULTI_PROCESS"
+.SS --- - _POSIX_MULTI_PROCESS - _SC_MULTI_PROCESS
This option has been deleted.
Not in final XPG6.
.\" .SS "MX"
.\" IEC 60559 Floating-Point Option.
-.SS "--- - _POSIX_NO_TRUNC"
+.SS --- - _POSIX_NO_TRUNC
If this option is in effect (as it always is under POSIX.1-2001)
then pathname components longer than
.B NAME_MAX
are not truncated,
but give an error.
This property may be dependent on the path prefix of the component.
-.SS "PIO - _POSIX_PRIORITIZED_IO - _SC_PRIORITIZED_IO"
+.SS PIO - _POSIX_PRIORITIZED_IO - _SC_PRIORITIZED_IO
This option says that one can specify priorities for asynchronous I/O.
This affects the functions
.br
.IR aio_write ().
.in -4
.fi
-.SS "PS - _POSIX_PRIORITY_SCHEDULING - _SC_PRIORITY_SCHEDULING"
+.SS PS - _POSIX_PRIORITY_SCHEDULING - _SC_PRIORITY_SCHEDULING
The include file
.I <sched.h>
is present.
.IR posix_spawnattr_setschedpolicy ().
.in -4
.fi
-.SS "RS - _POSIX_RAW_SOCKETS"
+.SS RS - _POSIX_RAW_SOCKETS
Raw sockets are supported.
Affected functions are
.IR getsockopt (),
.IR setsockopt ().
-.SS "--- - _POSIX_READER_WRITER_LOCKS - _SC_READER_WRITER_LOCKS"
+.SS --- - _POSIX_READER_WRITER_LOCKS - _SC_READER_WRITER_LOCKS
This option implies the
.B _POSIX_THREADS
option.
.IR pthread_rwlockattr_init ().
.in -4
.fi
-.SS "RTS - _POSIX_REALTIME_SIGNALS - _SC_REALTIME_SIGNALS"
+.SS RTS - _POSIX_REALTIME_SIGNALS - _SC_REALTIME_SIGNALS
Realtime signals are supported.
The following functions are present:
.br
.br
.in -4
.fi
-.SS "--- - _POSIX_REGEXP - _SC_REGEXP"
+.SS --- - _POSIX_REGEXP - _SC_REGEXP
If this option is in effect (as it always is under POSIX.1-2001)
then POSIX regular expressions are supported
and the following functions are present:
.br
.in -4
.fi
-.SS "--- - _POSIX_SAVED_IDS - _SC_SAVED_IDS"
+.SS --- - _POSIX_SAVED_IDS - _SC_SAVED_IDS
If this option is in effect (as it always is under POSIX.1-2001)
then a process has a saved set-user-ID and a saved set-group-ID.
Affected functions are
.fi
.\" .SS "SD"
.\" Software development
-.SS "SEM - _POSIX_SEMAPHORES - _SC_SEMAPHORES"
+.SS SEM - _POSIX_SEMAPHORES - _SC_SEMAPHORES
The include file
.I <semaphore.h>
is present.
.br
.in -4
.fi
-.SS "SHM - _POSIX_SHARED_MEMORY_OBJECTS - _SC_SHARED_MEMORY_OBJECTS"
+.SS SHM - _POSIX_SHARED_MEMORY_OBJECTS - _SC_SHARED_MEMORY_OBJECTS
The following functions are present:
.br
.nf
.br
.in -4
.fi
-.SS "--- - _POSIX_SHELL - _SC_SHELL"
+.SS --- - _POSIX_SHELL - _SC_SHELL
If this option is in effect (as it always is under POSIX.1-2001),
the function
.IR system ()
is present.
-.SS "SPN - _POSIX_SPAWN - _SC_SPAWN"
+.SS SPN - _POSIX_SPAWN - _SC_SPAWN
This option describes support for process creation in a context where
it is difficult or impossible to use
.IR fork (),
.IR posix_spawnattr_setschedpolicy ().
.in -4
.fi
-.SS "SPI - _POSIX_SPIN_LOCKS - _SC_SPIN_LOCKS"
+.SS SPI - _POSIX_SPIN_LOCKS - _SC_SPIN_LOCKS
This option implies the
.B _POSIX_THREADS
and
.in -4
.br
.fi
-.SS "SS - _POSIX_SPORADIC_SERVER - _SC_SPORADIC_SERVER"
+.SS SS - _POSIX_SPORADIC_SERVER - _SC_SPORADIC_SERVER
The scheduling policy
.B SCHED_SPORADIC
is supported.
.in -4
.br
.fi
-.SS "SIO - _POSIX_SYNCHRONIZED_IO - _SC_SYNCHRONIZED_IO"
+.SS SIO - _POSIX_SYNCHRONIZED_IO - _SC_SYNCHRONIZED_IO
Affected functions are
.IR open (),
.IR msync (),
.IR fsync (),
.IR fdatasync ().
-.SS "TSA - _POSIX_THREAD_ATTR_STACKADDR - _SC_THREAD_ATTR_STACKADDR"
+.SS TSA - _POSIX_THREAD_ATTR_STACKADDR - _SC_THREAD_ATTR_STACKADDR
Affected functions are
.br
.nf
.in -4
.br
.fi
-.SS "TSS - _POSIX_THREAD_ATTR_STACKSIZE - _SC_THREAD_ATTR_STACKSIZE"
+.SS TSS - _POSIX_THREAD_ATTR_STACKSIZE - _SC_THREAD_ATTR_STACKSIZE
Affected functions are
.br
.nf
.in -4
.br
.fi
-.SS "TCT - _POSIX_THREAD_CPUTIME - _SC_THREAD_CPUTIME"
+.SS TCT - _POSIX_THREAD_CPUTIME - _SC_THREAD_CPUTIME
The clockID CLOCK_THREAD_CPUTIME_ID is supported.
This option implies the
.B _POSIX_TIMERS
.in -4
.br
.fi
-.SS "TPI - _POSIX_THREAD_PRIO_INHERIT - _SC_THREAD_PRIO_INHERIT"
+.SS TPI - _POSIX_THREAD_PRIO_INHERIT - _SC_THREAD_PRIO_INHERIT
Affected functions are
.br
.nf
.in -4
.br
.fi
-.SS "TPP - _POSIX_THREAD_PRIO_PROTECT - _SC_THREAD_PRIO_PROTECT"
+.SS TPP - _POSIX_THREAD_PRIO_PROTECT - _SC_THREAD_PRIO_PROTECT
Affected functions are
.br
.nf
.in -4
.br
.fi
-.SS "TPS - _POSIX_THREAD_PRIORITY_SCHEDULING - _SC_THREAD_PRIORITY_SCHEDULING"
+.SS TPS - _POSIX_THREAD_PRIORITY_SCHEDULING - _SC_THREAD_PRIORITY_SCHEDULING
If this option is in effect, the different threads inside a process
can run with different priorities and/or different schedulers.
Affected functions are
.in -4
.br
.fi
-.SS "TSH - _POSIX_THREAD_PROCESS_SHARED - _SC_THREAD_PROCESS_SHARED"
+.SS TSH - _POSIX_THREAD_PROCESS_SHARED - _SC_THREAD_PROCESS_SHARED
Affected functions are
.br
.nf
.in -4
.br
.fi
-.SS "TSF - _POSIX_THREAD_SAFE_FUNCTIONS - _SC_THREAD_SAFE_FUNCTIONS"
+.SS TSF - _POSIX_THREAD_SAFE_FUNCTIONS - _SC_THREAD_SAFE_FUNCTIONS
Affected functions are
.br
.nf
.in -4
.br
.fi
-.SS "TSP - _POSIX_THREAD_SPORADIC_SERVER - _SC_THREAD_SPORADIC_SERVER"
+.SS TSP - _POSIX_THREAD_SPORADIC_SERVER - _SC_THREAD_SPORADIC_SERVER
This option implies the
.B _POSIX_THREAD_PRIORITY_SCHEDULING
option.
.in -4
.br
.fi
-.SS "THR - _POSIX_THREADS - _SC_THREADS"
+.SS THR - _POSIX_THREADS - _SC_THREADS
Basic support for POSIX threads is available.
The following functions are present:
.br
.in -4
.br
.fi
-.SS "TMO - _POSIX_TIMEOUTS - _SC_TIMEOUTS"
+.SS TMO - _POSIX_TIMEOUTS - _SC_TIMEOUTS
The following functions are present:
.br
.nf
.in -4
.br
.fi
-.SS "TMR - _POSIX_TIMERS - _SC_TIMERS"
+.SS TMR - _POSIX_TIMERS - _SC_TIMERS
The following functions are present:
.br
.nf
.in -4
.br
.fi
-.SS "TRC - _POSIX_TRACE - _SC_TRACE"
+.SS TRC - _POSIX_TRACE - _SC_TRACE
POSIX tracing is available.
The following functions are present:
.br
.in -4
.br
.fi
-.SS "TEF - _POSIX_TRACE_EVENT_FILTER - _SC_TRACE_EVENT_FILTER"
+.SS TEF - _POSIX_TRACE_EVENT_FILTER - _SC_TRACE_EVENT_FILTER
This option implies the
.B _POSIX_TRACE
option.
.in -4
.br
.fi
-.SS "TRI - _POSIX_TRACE_INHERIT - _SC_TRACE_INHERIT"
+.SS TRI - _POSIX_TRACE_INHERIT - _SC_TRACE_INHERIT
Tracing children of the traced process is supported.
This option implies the
.B _POSIX_TRACE
.in -4
.br
.fi
-.SS "TRL - _POSIX_TRACE_LOG - _SC_TRACE_LOG"
+.SS TRL - _POSIX_TRACE_LOG - _SC_TRACE_LOG
This option implies the
.B _POSIX_TRACE
option.
.in -4
.br
.fi
-.SS "TYM - _POSIX_TYPED_MEMORY_OBJECTS - _SC_TYPED_MEMORY_OBJECT"
+.SS TYM - _POSIX_TYPED_MEMORY_OBJECTS - _SC_TYPED_MEMORY_OBJECT
The following functions are present:
.br
.nf
.in -4
.br
.fi
-.SS "--- - _POSIX_VDISABLE"
+.SS --- - _POSIX_VDISABLE
Always present (probably 0).
Value to set a changeable special control
character to indicate that it is disabled.
-.SH "XOPEN EXTENSIONS"
+.SH XOPEN EXTENSIONS
.BR _XOPEN_CRYPT ,
.BR _XOPEN_LEGACY ,
.BR _XOPEN_REALTIME ,
.BR _XOPEN_REALTIME_THREADS ,
.BR _XOPEN_UNIX .
.\" To be described.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sysconf (3),
.BR standards (7)
'\" t
.\" Copyright (c) 2005 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTHREADS 7 2010-11-14 "Linux" "Linux Programmer's Manual"
.SH NAME
.IP \- 3
CPU affinity
.RB ( sched_setaffinity (2))
-.SS "Pthreads function return values"
+.SS Pthreads function return values
Most pthreads functions return 0 on success, and an error number of failure.
Note that the pthreads functions do not set
.IR errno .
In all pthreads functions that accept a thread ID as an argument,
that ID by definition refers to a thread in
the same process as the caller.
-.SS "Thread-safe functions"
+.SS Thread-safe functions
A thread-safe function is one that can be safely
(i.e., it will deliver the same results regardless of whether it is)
called from multiple threads at the same time.
pthread_setcanceltype()
.fi
.in
-.SS Cancellation Points
+.SS Cancellation points
POSIX.1 specifies that certain functions must,
and certain other functions may, be cancellation points.
If a thread is cancelable, its cancelability type is deferred,
.\" vscanf
.\" vsyslog
.\" vwscanf
-.SS "Compiling on Linux"
+.SS Compiling on Linux
On Linux, programs that use the Pthreads API should be compiled using
.IR "cc \-pthread" .
-.SS "Linux Implementations of POSIX Threads"
+.SS Linux implementations of POSIX threads
Over time, two threading implementations have been provided by
the GNU C library on Linux:
.TP
shell built-in command
.RI ( "limit stacksize"
in the C shell).
-.SS "Determining the Threading Implementation"
+.SS Determining the threading implementation
Since glibc 2.3.2, the
.BR getconf (1)
command can be used to determine
Native POSIX Threads Library by Ulrich Drepper et al
.in
.fi
-.SS "Selecting the Threading Implementation: LD_ASSUME_KERNEL"
+.SS Selecting the threading implementation: LD_ASSUME_KERNEL
On systems with a glibc that supports both LinuxThreads and NPTL
(i.e., glibc 2.3.\fIx\fP), the
.B LD_ASSUME_KERNEL
linuxthreads-0.10 by Xavier Leroy
.in
.fi
-.SH "SEE ALSO"
+.SH SEE ALSO
.ad l
.nh
.BR clone (2),
.BR futex (7),
.BR sigevent (7),
.BR signal (7),
-.br
-and various Pthreads manual pages, for example:
+
+Various Pthreads manual pages, for example:
.BR pthread_attr_init (3),
.BR pthread_atfork (3),
.BR pthread_cancel (3),
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2005 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH PTY 7 2005-10-10 "Linux" "Linux Programmer's Manual"
.SH NAME
Conversely, anything that is written to the slave end of the
pseudoterminal can be read by the process that is connected to
the master end.
-Psuedoterminals are used by applications such as network login services
+Pseudoterminals are used by applications such as network login services
.RB ( ssh "(1), " rlogin "(1), " telnet (1)),
terminal emulators,
.BR script (1),
Since kernel 2.6.4, BSD-style pseudoterminals are considered deprecated
(they can be disabled when configuring the kernel);
UNIX 98 pseudoterminals should be used in new applications.
-.SS "UNIX 98 pseudoterminals"
+.SS UNIX 98 pseudoterminals
An unused UNIX 98 pseudoterminal master is opened by calling
.BR posix_openpt (3).
(This function opens the master clone device,
indicates how many pseudoterminals are currently in use.
For further details on these two files, see
.BR proc (5).
-.SS "BSD pseudoterminals"
+.SS BSD pseudoterminals
BSD-style pseudoterminals are provided as precreated pairs, with
names of the form
.I /dev/ptyXY
each pseudoterminal master until an open succeeds.
The corresponding pseudoterminal slave (substitute "tty"
for "pty" in the name of the master) can then be opened.
-.SH "FILES"
+.SH FILES
.I /dev/ptmx
(UNIX 98 master clone device)
.br
.br
.I /dev/tty[p-za-e][0-9a-f]
(BSD slave devices)
-.SH "NOTES"
+.SH NOTES
A description of the
.B TIOCPKT
.BR ioctl (2),
and
.BR TIOCREMOTE
have not been implemented under Linux.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR select (2),
.BR setsid (2),
.BR forkpty (3),
'\" t
-.\" Don't change the first line, it tells man that we need tbl.
.\" This man page is Copyright (C) 1999 Andi Kleen <ak@muc.de>.
+.\"
+.\" %%%LICENSE_START(VERBATIM_ONE_PARA)
.\" Permission is granted to distribute possibly modified copies
.\" of this page provided the header is included verbatim,
.\" and in case of nontrivial modification author and date
.\" of the modification is added to the header.
+.\" %%%LICENSE_END
+.\"
.\" $Id: raw.7,v 1.6 1999/06/05 10:32:08 freitag Exp $
+.\"
.TH RAW 7 2012-05-10 "Linux" "Linux Programmer's Manual"
.SH NAME
raw \- Linux IPv4 raw sockets
When a packet is received, it is passed to any raw sockets which have
been bound to its protocol before it is passed to other protocol handlers
(e.g., kernel protocol modules).
-.SS Address Format
+.SS Address format
Raw sockets use the standard
.I sockaddr_in
address structure defined in
See the
.I <netinet/in.h>
include file for valid IP protocols.
-.SS Socket Options
+.SS Socket options
Raw socket options can be set with
.BR setsockopt (2)
and read with
.BR ip (7)
.B IPPROTO_IP
socket options valid for datagram sockets are supported.
-.SS Error Handling
+.SS Error handling
Errors originating from the network are only passed to the user when the
socket is connected or the
.B IP_RECVERR
call is always used.
.\" .SH AUTHORS
.\" This man page was written by Andi Kleen.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR recvmsg (2),
.BR sendmsg (2),
.BR capabilities (7),
.B RFC\ 1191
for path MTU discovery.
-
.B RFC\ 791
and the
.I <linux/ip.h>
-include file for the IP protocol.
+header file for the IP protocol.
.\" distribution). The package carries the following copyright:
.\"
.\" Copyright 1992, 1993, 1994 Henry Spencer. All rights reserved.
+.\" %%%LICENSE_START(MISC)
.\" This software is not subject to any license of the American Telephone
.\" and Telegraph Company or of the Regents of the University of California.
.\"
.\" ever read sources, credits must appear in the documentation.
.\"
.\" 4. This notice may not be removed or altered.
+.\" %%%LICENSE_END
.\"
.\" In order to comply with `credits must appear in the documentation'
.\" I added an AUTHOR paragraph below - aeb.
.\" Sigh... The page license means we must have the author's name
.\" in the formatted output.
This page was taken from Henry Spencer's regex package.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR grep (1),
.BR regex (3)
.PP
.\" Copyright (c) 2009 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 2009-01-12, mtk, Created
.\"
-.TH RTLD-AUDIT 7 2010-09-10 "Linux" "Linux Programmer's Manual"
+.TH RTLD-AUDIT 7 2012-07-07 "Linux" "Linux Programmer's Manual"
.SH NAME
rtld-audit \- auditing API for the dynamic linker
.SH SYNOPSIS
.SS la_objclose()
\&
.nf
-.BI "unsigned int la_objclose(uintptr_t *" cookie);
+.BI "unsigned int la_objclose(uintptr_t *" cookie );
.fi
.PP
The dynamic linker invokes this function after any finalization
is the address to which control should be passed after the function returns.
If the auditing library is simply monitoring symbol bindings,
then it should return
-.IR sym\->st_name .
+.IR sym\->st_value .
A different value may be returned if the library wishes to direct control
to an alternate location.
.SS la_pltenter()
.\" symbol binding should return the value of the 'retval' argument
.\" (not provided by GNU, but equivalent to returning outregs->lrv_eax
.\" on (say) x86-32).
-.SH "CONFORMING TO"
+.SH CONFORMING TO
This API is nonstandard, but very similar to the Solaris API,
described in the Solaris
.IR "Linker and Libraries Guide" ,
arguments (but does provide a
.IR retval
argument with the function return value).
+.SH BUGS
+In glibc versions up to and include 2.9,
+specifying more than one audit library in
+.B LD_AUDIT
+results in a run-time crash.
+This is reportedly fixed in glibc 2.10.
+.\" FIXME Specifying multiple audit libraries doesn't work on GNU.
+.\" My simple tests on Solaris work okay, but not on Linux -- mtk, Jan 2009
+.\" glibc bug filed: http://sourceware.org/bugzilla/show_bug.cgi?id=9733
+.\" Reportedly, this is fixed on 16 Mar 2009 (i.e., for glibc 2.10)
.SH EXAMPLE
.nf
#include <link.h>
return sym\->st_value;
}
.fi
-.SH BUGS
-In glibc versions up to and include 2.9,
-specifying more than one audit library in
-.B LD_AUDIT
-results in a run-time crash.
-This is reportedly fixed in glibc 2.10.
-.\" FIXME Specifying multiple audit libraries doesn't work on GNU.
-.\" My simple tests on Solaris work okay, but not on Linux -- mtk, Jan 2009
-.\" glibc bug filed: http://sourceware.org/bugzilla/show_bug.cgi?id=9733
-.\" Reportedly, this is fixed on 16 Mar 2009 (i.e., for glibc 2.10)
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ldd (1),
.BR dlopen (3),
.BR ld.so (8),
'\" t
-.\" Don't remove the line above, it tells man that tbl is needed.
.\" This man page is Copyright (C) 1999 Andi Kleen <ak@muc.de>.
+.\"
+.\" %%%LICENSE_START(VERBATIM_ONE_PARA)
.\" Permission is granted to distribute possibly modified copies
.\" of this page provided the header is included verbatim,
.\" and in case of nontrivial modification author and date
.\" of the modification is added to the header.
+.\" %%%LICENSE_END
+.\"
.\" Based on the original comments from Alexey Kuznetsov, written with
.\" help from Matthew Wilcox.
.\" $Id: rtnetlink.7,v 1.8 2000/01/22 01:55:04 freitag Exp $
-.TH RTNETLINK 7 2012-05-10 "Linux" "Linux Programmer's Manual"
+.\"
+.TH RTNETLINK 7 2013-03-05 "Linux" "Linux Programmer's Manual"
.SH NAME
rtnetlink \- Linux IPv4 routing socket
.SH SYNOPSIS
.BR netlink (7)
for more information.
.\" FIXME ? all these macros could be moved to rtnetlink(3)
-.SS "Routing Attributes"
+.SS Routing attributes
Some rtnetlink messages have optional attributes after the initial header:
.in +4n
contains the device flags, see
.BR netdevice (7);
.I ifi_index
-is the unique interface index,
+is the unique interface index
+(since Linux 3.7, it is possible to feed a nonzero value with the
+.B RTM_NEWLINK
+message, thus creating a link with the given
+.IR ifindex );
.I ifi_change
is reserved for future use and should be always set to 0xFFFFFFFF.
+.na
.TS
tab(:);
-c
+c s s
l l l.
Routing attributes
rta_type:value type:description
see below
T}:Interface Statistics.
.TE
+.ad
.sp
-The value type for IFLA_STATS is \fIstruct net_device_stats\fP.
+The value type for
+.B IFLA_STATS
+is
+.IR "struct rtnl_link_stats"
+.RI ( "struct net_device_stats"
+in Linux 2.4 and earlier).
.TP
.BR RTM_NEWADDR ", " RTM_DELADDR ", " RTM_GETADDR
Add, remove or receive information about an IP address associated with
for a permanent address set by the user and other undocumented flags.
.TS
tab(:);
-c
+c s s
l l l.
Attributes
rta_type:value type:description
unsigned int rtm_flags;
};
.fi
+.na
.TS
tab(:);
l l.
refer to an external resolver (not implemented)
T}
.TE
+.ad
+.na
.TS
tab(:);
l l.
RTPROT_BOOT:during boot
RTPROT_STATIC:by the administrator
.TE
+.ad
Values larger than
.B RTPROT_STATIC
.I rtm_scope
is the distance to the destination:
+.na
.TS
tab(:);
l l.
RT_SCOPE_HOST:route on the local host
RT_SCOPE_NOWHERE:destination doesn't exist
.TE
+.ad
The values between
.B RT_SCOPE_UNIVERSE
The
.I rtm_flags
have the following meanings:
+.na
.TS
tab(:);
l l.
RTM_F_CLONED:route is cloned from another route
RTM_F_EQUALIZE:a multipath equalizer (not yet implemented)
.TE
+.ad
.I rtm_table
specifies the routing table
.B RT_TABLE_UNSPEC
and
.BR RT_TABLE_DEFAULT .
+.\" Keep table on same page
+.bp +1
.TS
tab(:);
-c
+c s s
l l l.
Attributes
rta_type:value type:description
.fi
.TS
tab(:);
-c
-l l l.
+c s s
+l2 l2 l.
Attributes
rta_type:value type:Description
_
is a new feature of Linux 2.2.
.SH BUGS
This manual page is incomplete.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR cmsg (3),
.BR rtnetlink (3),
.BR ip (7),
'\" t
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH SEM_OVERVIEW 7 2010-05-22 "Linux" "Linux Programmer's Manual"
+.TH SEM_OVERVIEW 7 2012-05-13 "Linux" "Linux Programmer's Manual"
.SH NAME
-sem_overview \- Overview of POSIX semaphores
+sem_overview \- overview of POSIX semaphores
.SH DESCRIPTION
POSIX semaphores allow processes and threads to synchronize their actions.
a semaphore will exist until the system is shut down.
.SS Linking
Programs using the POSIX semaphores API must be compiled with
-.I cc \-lrt
+.I cc \-pthread
to link against the real-time library,
.IR librt .
.SS Accessing named semaphores via the file system
Since Linux 2.6.19, ACLs can be placed on files under this directory,
to control object permissions on a per-user and per-group basis.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
System V semaphores
.SH EXAMPLE
An example of the use of various POSIX semaphore functions is shown in
.BR sem_wait (3).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sem_close (3),
.BR sem_destroy (3),
.BR sem_getvalue (3),
'\" t
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) 2008, Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH SHM_OVERVIEW 7 2010-09-10 "Linux" "Linux Programmer's Manual"
.SH NAME
-shm_overview \- Overview of POSIX shared memory
+shm_overview \- overview of POSIX shared memory
.SH DESCRIPTION
The POSIX shared memory API allows processes to communicate information
by sharing a region of memory.
.IR /dev/shm .
Since kernel 2.6.19, Linux supports the use of access control lists (ACLs)
to control the permissions of objects in the virtual file system.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1-2001.
.SH NOTES
Typically, processes must synchronize their access to a shared
POSIX shared memory provides a simpler, and better designed interface;
on the other hand POSIX shared memory is somewhat less widely available
(especially on older systems) than System V shared memory.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR fchmod (2),
.BR fchown (2),
.BR fstat (2),
.\" Copyright (C) 2006, 2010 Michael Kerrisk <mtk.manpages@gmail.com>
.\" Copyright (C) 2009 Petr Baudis <pasky@suse.cz>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.TH SIGEVENT 7 2011-09-09 "GNU" "Linux Programmer's Manual"
.SH NAME
.BR timer_create (2).
.SH CONFORMING TO
POSIX.1-2001.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR timer_create (2),
.BR aio_fsync (3),
.BR aio_read (3),
.\" and Copyright (c) 2008 Linux Foundation, written by Michael Kerrisk
.\" <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Modified Sat Jul 24 17:34:08 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified Sun Jan 7 01:41:27 1996 by Andries Brouwer (aeb@cwi.nl)
.SH DESCRIPTION
Linux supports both POSIX reliable signals (hereinafter
"standard signals") and POSIX real-time signals.
-.SS "Signal Dispositions"
+.SS Signal dispositions
Each signal has a current
.IR disposition ,
which determines how the process behaves when it is delivered
.BR execve (2),
the dispositions of handled signals are reset to the default;
the dispositions of ignored signals are left unchanged.
-.SS Sending a Signal
+.SS Sending a signal
The following system calls and library functions allow
the caller to send a signal:
.TP 16
.TP
.BR sigqueue (3)
Sends a real-time signal with accompanying data to a specified process.
-.SS Waiting for a Signal to be Caught
+.SS Waiting for a signal to be caught
The following system calls suspend execution of the calling process
or thread until a signal is caught
(or an unhandled signal terminates the process):
.BR sigsuspend (2)
Temporarily changes the signal mask (see below) and suspends
execution until one of the unmasked signals is caught.
-.SS Synchronously Accepting a Signal
+.SS Synchronously accepting a signal
Rather than asynchronously catching a signal via a signal handler,
it is possible to synchronously accept the signal, that is,
to block execution until the signal is delivered,
The buffer returned by
.BR read (2)
contains a structure describing the signal.
-.SS "Signal Mask and Pending Signals"
+.SS Signal mask and pending signals
A signal may be
.IR blocked ,
which means that it will not be delivered until it is later unblocked.
initially has an empty pending signal set;
the pending signal set is preserved across an
.BR execve (2).
-.SS "Standard Signals"
+.SS Standard signals
Linux supports the standard signals listed below.
Several signal numbers
are architecture-dependent, as indicated in the "Value" column.
and the last one for mips.
(Values for parisc are
.I not
-shown; see the kernel source for signal numbering on that architecture.)
+shown; see the Linux kernel source for signal numbering on that architecture.)
A \- denotes that a signal is absent on the corresponding architecture.)
First the signals described in the original POSIX.1-1990 standard.
SIGCHLD 20,17,18 Ign Child stopped or terminated
SIGCONT 19,18,25 Cont Continue if stopped
SIGSTOP 17,19,23 Stop Stop process
-SIGTSTP 18,20,24 Stop Stop typed at tty
-SIGTTIN 21,21,26 Stop tty input for background process
-SIGTTOU 22,22,27 Stop tty output for background process
+SIGTSTP 18,20,24 Stop Stop typed at terminal
+SIGTTIN 21,21,26 Stop Terminal input for background process
+SIGTTOU 22,22,27 Stop Terminal output for background process
.TE
The signals
.\" parisc is the only exception: SIGSYS is 12, SIGUNUSED is 31
.B SIGSYS
on most architectures.
-.SS "Real-time Signals"
+.SS Real-time signals
Linux supports real-time signals as originally defined in the POSIX.1b
real-time extensions (and now included in POSIX.1-2001).
The range of supported real-time signals is defined by the macros
signals; see
.BR setrlimit (2)
for further details.
-.SS "Async-signal-safe functions"
+.SS Async-signal-safe functions
.PP
A signal handler function must be very careful,
since processing elsewhere may be interrupted
utimes()
.fi
.in
-.SS Interruption of System Calls and Library Functions by Signal Handlers
+.SS Interruption of system calls and library functions by signal handlers
If a signal handler is invoked while a system call or library
function call is blocked, then either:
.IP * 2
.BR sleep (3)
function is also never restarted if interrupted by a handler,
but gives a success return: the number of seconds remaining to sleep.
-.SS Interruption of System Calls and Library Functions by Stop Signals
+.SS Interruption of system calls and library functions by stop signals
On Linux, even in the absence of signal handlers,
certain blocking interfaces can fail with the error
.BR EINTR
Linux 2.4 and earlier:
.BR nanosleep (2).
.RE
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.1, except as noted.
.\" It must be a *very* long time since this was true:
.\" .SH BUGS
.\" the build process of some software still thinks that
.\" signal 29 is
.\" .BR SIGLOST .
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR kill (1),
.BR getrlimit (2),
.BR kill (2),
'\" t
-.\" Don't change the first line, it tells man that we need tbl.
.\" This man page is Copyright (C) 1999 Andi Kleen <ak@muc.de>.
.\" and copyright (c) 1999 Matthew Wilcox.
+.\"
+.\" %%%LICENSE_START(VERBATIM_ONE_PARA)
.\" Permission is granted to distribute possibly modified copies
.\" of this page provided the header is included verbatim,
.\" and in case of nontrivial modification author and date
.\" of the modification is added to the header.
+.\" %%%LICENSE_END
.\"
.\" 2002-10-30, Michael Kerrisk, <mtk.manpages@gmail.com>
.\" Added description of SO_ACCEPTCONN
.\" Documented SO_DOMAIN and SO_PROTOCOL.
.\" FIXME
.\" The following are not yet documented:
-.\" SO_PEERNAME
-.\" SO_TIMESTAMPNS
-.\" SO_MARK (see https://bugzilla.kernel.org/show_bug.cgi?id=16461)
+.\" SO_PEERNAME (2.4?)
+.\" get only
+.\" Seems to do something similar to getpeernam(), but then
+.\" why is it necessary / how does it differ?
+.\" SO_TIMESTAMPNS (2.6.22)
+.\" Documentation/networking/timestamping.txt
+.\" commit 92f37fd2ee805aa77925c1e64fd56088b46094fc
+.\" Author: Eric Dumazet <dada1@cosmosbay.com>
.\" SO_TIMESTAMPING (2.6.30)
+.\" Documentation/networking/timestamping.txt
+.\" commit cb9eff097831007afb30d64373f29d99825d0068
+.\" Author: Patrick Ohly <patrick.ohly@intel.com>
.\" SO_RXQ_OVFL (2.6.33)
+.\" commit 3b885787ea4112eaa80945999ea0901bf742707f
+.\" Author: Neil Horman <nhorman@tuxdriver.com>
+.\" SO_WIFI_STATUS (3.3)
+.\" commit 6e3e939f3b1bf8534b32ad09ff199d88800835a0
+.\" Author: Johannes Berg <johannes.berg@intel.com>
+.\" Also: SCM_WIFI_STATUS
+.\" SO_PEEK_OFF (3.4)
+.\" commit ef64a54f6e558155b4f149bb10666b9e914b6c54
+.\" Author: Pavel Emelyanov <xemul@parallels.com>
+.\" SO_NOFCS (3.4)
+.\" commit 3bdc0eba0b8b47797f4a76e377dd8360f317450f
+.\" Author: Ben Greear <greearb@candelatech.com>
.\"
-.TH SOCKET 7 2012-04-23 Linux "Linux Programmer's Manual"
+.TH SOCKET 7 2013-03-15 Linux "Linux Programmer's Manual"
.SH NAME
socket \- Linux socket interface
.SH SYNOPSIS
See
.BR socket (2)
for more information on families and types.
-.SS Socket Layer Functions
+.SS Socket-layer functions
These functions are used by the user process to send or receive packets
and to do other socket operations.
For more information see their respective manual pages.
.\" or
.\" .BR close (2).
.TE
-
.PP
An alternative to
.BR poll (2)
See the
.I Signals
discussion below.
-.SS Socket Options
+.SS Socket address structures
+Each socket domain has its own format for socket addresses,
+with a domain-specific address structure.
+Each of these structures begins with an
+integer "family" field (typed as
+.IR sa_family_t )
+that indicates the type of the address structure.
+This allows
+the various system calls (e.g.,
+.BR connect (2),
+.BR bind (2),
+.BR accept (2),
+.BR getsockname (2),
+.BR getpeername (2)),
+which are generic to all socket domains,
+to determine the domain of a particular socket address.
+
+To allow any type of socket address to be passed to
+interfaces in the sockets API,
+the type
+.IR "struct sockaddr"
+is defined.
+The purpose of this type is purely to allow casting of
+domain-specific socket address types to a "generic" type,
+so as to avoid compiler warnings about type mismatches in
+calls to the sockets API.
+
+In addition, the sockets API provides the data type
+.IR "struct sockaddr_storage".
+This type
+is suitable to accommodate all supported domain-specific socket
+address structures; it is large enough and is aligned properly.
+(In particular, it is large enough to hold
+IPv6 socket addresses.)
+The structure includes the following field, which can be used to identify
+the type of socket address actually stored in the structure:
+
+.in +4n
+.nf
+ sa_family_t ss_family;
+.fi
+.in
+
+The
+.I sockaddr_storage
+structure is useful in programs that must handle socket addresses
+in a generic way
+(e.g., programs that must deal with both IPv4 and IPv6 socket addresses).
+.SS Socket options
These socket options can be set by using
.BR setsockopt (2)
and read with
It is not supported for packet sockets (use normal
.BR bind (2)
there).
+
+Before Linux 3.8,
+this socket option could be set, but could not retrieved with
+.BR getsockopt (2).
+Since Linux 3.8, it is readable.
+The
+.I optlen
+argument should contain the buffer size available
+to receive the device name and is recommended to be
+.BR IFNAMSZ
+bytes.
+The real device name length is reported back in the
+.I optlen
+argument.
.TP
.B SO_BROADCAST
Set or get the broadcast flag.
.BR exit (2),
it always lingers in the background.
.TP
+.BR SO_MARK " (since Linux 2.6.25)"
+.\" commit 4a19ec5800fc3bb64e2d87c4d9fdd9e636086fe0
+.\" and 914a9ab386a288d0f22252fc268ecbc048cdcbd5
+Set the mark for each packet sent through this socket
+(similar to the netfilter MARK target but socket-based).
+Changing the mark can be used for mark-based
+routing without netfilter or for packet filtering.
+Setting this option requires the
+.B CAP_NET_ADMIN
+capability.
+.TP
.B SO_OOBINLINE
If this option is enabled,
out-of-band data is directly placed into the receive data stream.
.BR connect (2)
or
.BR socketpair (2).
-Argument is a
+The argument is a
.I ucred
-structure.
+structure; define the
+.B GNU_SOURCE
+feature test macro to obtain the definition of that structure from
+.IR <sys/socket.h> .
This socket option is read-only.
.TP
.B SO_PRIORITY
.BR setsockopt (2),
and this doubled value is returned by
.BR getsockopt (2).
+.\" The following thread on LMKL is quite informative:
+.\" getsockopt/setsockopt with SO_RCVBUF and SO_SNDBUF "non-standard" behaviour
+.\" 17 July 2012
+.\" http://thread.gmane.org/gmane.linux.kernel/1328935
The default value is set by the
.I /proc/sys/net/core/rmem_default
file, and the maximum allowed value is set by the
and the timeout has been reached then \-1 is returned with
.I errno
set to
-.B EAGAIN
+.BR EAGAIN
or
-.B EWOULDBLOCK
+.BR EWOULDBLOCK ,
.\" in fact to EAGAIN
+or
+.B EINPROGRESS
+(for
+.BR connect (2))
just as if the socket was specified to be nonblocking.
If the timeout is set to zero (the default)
then the operation will never timeout.
The kernel doubles this value (to allow space for bookkeeping overhead)
when it is set using
.\" Most (all?) other implementations do not do this -- MTK, Dec 05
+.\" See also the comment to SO_RCVBUF (17 Jul 2012 LKML mail)
.BR setsockopt (2),
and this doubled value is returned by
.BR getsockopt (2).
may have already disappeared when the process reacts to the signal.
If this happens, the process should wait again because Linux
will resend the signal later.
-.\" .SS Ancillary Messages
+.\" .SS Ancillary messages
.SS /proc interfaces
The core socket networking parameters can be accessed
via files in the directory
library.
.\" .SH AUTHORS
.\" This man page was written by Andi Kleen.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getsockopt (2),
+.BR connect (2),
.BR setsockopt (2),
.BR socket (2),
.BR capabilities (7),
.\" Copyright (c) International Business Machines Corp., 2006
.\"
+.\" %%%LICENSE_START(GPLv2+_SW_3_PARA)
.\" This program is free software; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
.\" the GNU General Public License for more details.
.\"
-.\" You should have received a copy of the GNU General Public License
-.\" along with this program; if not, write to the Free Software
-.\" Foundation, Inc., 59 Temple Place, Suite 330, Boston,
-.\" MA 02111-1307 USA
+.\" You should have received a copy of the GNU General Public
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" HISTORY:
.\" 2005-09-28, created by Arnd Bergmann <arndb@de.ibm.com>,
used for manipulating the state of the logical SPU.
Users can change permissions on the files, but can't
add or remove files.
-.SS Mount Options
+.SS Mount options
.TP
.B uid=<uid>
Set the user owning the mount point; the default is 0 (root).
.BR close (2),
.BR spu_create (2),
.BR spu_run (2),
-.BR capabilities (7),
+.BR capabilities (7)
+
.I The Cell Broadband Engine Architecture (CBEA) specification
.\" includes some material by other authors that was formerly
.\" in intro.2.
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
-.TH STANDARDS 7 2009-06-01 "Linux" "Linux Programmer's Manual"
+.TH STANDARDS 7 2012-08-05 "Linux" "Linux Programmer's Manual"
.SH NAME
standards \- C and UNIX Standards
.SH DESCRIPTION
.TP
.B SVID 4
System V Interface Definition version 4, issued in 1995.
-Available online at http://www.sco.com/developers/devspecs/ .
+Available online at
+.UR http://www.sco.com\:/developers\:/devspecs/
+.UE .
.TP
.B C89
This was the first C language standard, ratified by ANSI
This revision of the C language standard was ratified by ISO in 1999
.RI ( "ISO/IEC 9899:1999" ).
Available online at
-http://www.open-std.org/jtc1/sc22/wg14/www/standards.
+.UR http://www.open-std.org\:/jtc1\:/sc22\:/wg14\:/www\:/standards
+.UE .
.TP
.B POSIX.1-1990
"Portable Operating System Interface for Computing Environments".
Systems conforming to this standard can be branded
.IR "UNIX 98" .
See also
-http://www.UNIX-systems.org/version2/ .)
+.UR http://www.UNIX-systems.org\:/version2/
+.UE .)
.TP
.B POSIX.1-2001, SUSv3
This was a 2001 revision and consolidation of the
POSIX.1, POSIX.2, and SUS standards into a single document,
conducted under the auspices of the Austin group
-(http://www.opengroup.org/austin/ .)
+.UR http://www.opengroup.org\:/austin/
+.UE .
The standard is available online at
-http://www.unix-systems.org/version3/ ,
+.UR http://www.unix-systems.org\:/version3/
+.UE ,
and the interfaces that it describes are also available in the Linux
manual pages package under sections 1p and 3p (e.g., "man 3p open").
conforms to POSIX.1-2008, unless otherwise noted.
Further information can be found on the Austin group web site,
-http://www.opengroup.org/austin/ .
-.SH "SEE ALSO"
+.UR http://www.opengroup.org\:/austin/
+.UE .
+.SH SEE ALSO
.BR feature_test_macros (7),
.BR libc (7),
.BR posixoptions (7)
'\" t
.\" Copyright (c) 1993 by Thomas Koenig (ig25@rz.uni-karlsruhe.de)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.\" License.
+.\" %%%LICENSE_END
+.\"
.\" Modified Sat Jul 24 17:35:15 1993 by Rik Faith <faith@cs.unc.edu>
.\" Modified Sun Feb 19 22:02:32 1995 by Rik Faith <faith@cs.unc.edu>
.\" Modified Tue Oct 22 23:28:12 1996 by Eric S. Raymond <esr@thyrsus.com>
.\" Modified Thu Nov 16 23:28:25 2000 by David A. Wheeler
.\" <dwheeler@dwheeler.com>
.\"
-.\" FIXME, mtk, May 2007: rendering this page yields the error:
-.\" grotty:suffixes.7:1725: character above first line discarded
-.\"
+.\" "nroff" ("man") (or "tbl") needs a long page to avoid warnings
+.\" from "grotty" (at imagined page breaks). Bug in grotty?
+.if n .pl 1000v
.TH SUFFIXES 7 2000-11-16 "Linux" "Linux Programmer's Manual"
.SH NAME
suffixes \- list of file suffixes
~ Emacs or \fBpatch\fP(1) backup file
rc startup (`run control') file, e.g., \fI.newsrc\fP
.TE
-.SH "CONFORMING TO"
+.SH CONFORMING TO
General UNIX conventions.
.SH BUGS
This list is not exhaustive.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR file (1),
.BR make (1)
.\" Copyright 1993 Giorgio Ciucci (giorgio@crcc.it)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" FIXME There is now duplication of some of the information
.\" below in semctl.2, msgctl.2, and shmctl.2 -- MTK, Nov 04
-.TH SVIPC 7 2009-01-26 "Linux" "Linux Programmer's Manual"
+.TH SVIPC 7 2013-02-12 "Linux" "Linux Programmer's Manual"
.SH NAME
svipc \- System V interprocess communication mechanisms
.SH SYNOPSIS
.nf
-.B #include <sys/types.h>
-.B #include <sys/ipc.h>
.B #include <sys/msg.h>
.B #include <sys/sem.h>
.B #include <sys/shm.h>
In the following, the word
.I resource
means an instantiation of one among such mechanisms.
-.SS Resource Access Permissions
+.SS Resource access permissions
For each resource, the system uses a common structure of type
.I "struct ipc_perm"
to store information needed in determining permissions to perform an
IPC operation.
The
.I ipc_perm
-structure, defined by the
-.I <sys/ipc.h>
-system header file, includes the following members:
+structure includes the following members:
.in +4n
.nf
be OR'ed into an
.I int
type variable.
-.SS Message Queues
+.SS Message queues
A message queue is uniquely identified by a positive integer
.RI "(its " msqid )
and has an associated data structure of type
system call that changed a member of the
.I msqid_ds
structure.
-.SS Semaphore Sets
+.SS Semaphore sets
A semaphore set is uniquely identified by a positive integer
.RI "(its " semid )
and has an associated data structure of type
.\"Number of processes suspended awaiting for
.\".I semval
.\"to become zero.
-.SS Shared Memory Segments
+.SS Shared memory segments
A shared memory segment is uniquely identified by a positive integer
.RI "(its " shmid )
and has an associated data structure of type
.BR shmctl (2)
system call that changed
.IR shmid_ds .
-.SH "SEE ALSO"
+.SH SEE ALSO
+.BR ipcmk (1),
+.BR ipcrm (1),
+.BR ipcs (1),
.BR ipc (2),
.BR msgctl (2),
.BR msgget (2),
-.\"-
.\" Copyright (c) 1992, 1993, 1994
.\" The Regents of the University of California. All rights reserved.
.\"
+.\" %%%LICENSE_START(BSD_3_CLAUSE_UCB)
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
+.\" %%%LICENSE_END
.\"
.\" @(#)symlink.7 8.3 (Berkeley) 3/31/94
.\" $FreeBSD: src/bin/ln/symlink.7,v 1.30 2005/02/13 22:25:09 ru Exp $
.\" This man page is Copyright (C) 1999 Andi Kleen <ak@muc.de>.
+.\"
+.\" %%%LICENSE_START(VERBATIM_ONE_PARA)
.\" Permission is granted to distribute possibly modified copies
.\" of this page provided the header is included verbatim,
.\" and in case of nontrivial modification author and date
.\" of the modification is added to the header.
+.\" %%%LICENSE_END
.\"
.\" 2.4 Updates by Nivedita Singhvi 4/20/02 <nivedita@us.ibm.com>.
.\" Modified, 2004-11-11, Michael Kerrisk and Andries Brouwer
.\" be more or less up to date and complete as at Linux 2.6.27
.\" (other than the remaining FIXMEs in the page source below).
.\"
+.\" FIXME The following need to be documented
+.\" TCP_CONGESTION (new in 2.6.13)
+.\" commit 5f8ef48d240963093451bcf83df89f1a1364f51d
+.\" Author: Stephen Hemminger <shemminger@osdl.org>
+.\" TCP_MD5SIG (2.6.20)
+.\" commit cfb6eeb4c860592edd123fdea908d23c6ad1c7dc
+.\" Author was yoshfuji@linux-ipv6.org
+.\" Needs CONFIG_TCP_MD5SIG
+.\" From net/inet/Kconfig
+.\" bool "TCP: MD5 Signature Option support (RFC2385) (EXPERIMENTAL)"
+.\" RFC2385 specifies a method of giving MD5 protection to TCP sessions.
+.\" Its main (only?) use is to protect BGP sessions between core routers
+.\" on the Internet.
+.\"
+.\" There is a TCP_MD5SIG option documented in FreeBSD's tcp(4),
+.\" but probably many details are different on Linux
+.\" http://thread.gmane.org/gmane.linux.network/47490
+.\" http://www.daemon-systems.org/man/tcp.4.html
+.\" http://article.gmane.org/gmane.os.netbsd.devel.network/3767/match=tcp_md5sig+freebsd
+.\" TCP_COOKIE_TRANSACTIONS (2.6.33)
+.\" commit 519855c508b9a17878c0977a3cdefc09b59b30df
+.\" Author: William Allen Simpson <william.allen.simpson@gmail.com>
+.\" commit e56fb50f2b7958b931c8a2fc0966061b3f3c8f3a
+.\" Author: William Allen Simpson <william.allen.simpson@gmail.com>
+.\" TCP_THIN_LINEAR_TIMEOUTS (2.6.34)
+.\" commit 36e31b0af58728071e8023cf8e20c5166b700717
+.\" Author: Andreas Petlund <apetlund@simula.no>
+.\" TCP_THIN_DUPACK (2..6.34)
+.\" commit 7e38017557bc0b87434d184f8804cadb102bb903
+.\" Author: Andreas Petlund <apetlund@simula.no>
+.\" TCP_USER_TIMEOUT (new in 2.6.37)
+.\" Author: Jerry Chu <hkchu@google.com>
+.\" commit dca43c75e7e545694a9dd6288553f55c53e2a3a3
+.\" TCP_REPAIR (3.5)
+.\" commit ee9952831cfd0bbe834f4a26489d7dce74582e37
+.\" Author: Pavel Emelyanov <xemul@parallels.com>
+.\" TCP_REPAIR_QUEUE (3.5)
+.\" commit ee9952831cfd0bbe834f4a26489d7dce74582e37
+.\" Author: Pavel Emelyanov <xemul@parallels.com>
+.\" TCP_QUEUE_SEQ (3.5)
+.\" commit ee9952831cfd0bbe834f4a26489d7dce74582e37
+.\" Author: Pavel Emelyanov <xemul@parallels.com>
+.\" TCP_REPAIR_OPTIONS (3.5)
+.\" commit b139ba4e90dccbf4cd4efb112af96a5c9e0b098c
+.\" Author: Pavel Emelyanov <xemul@parallels.com>
+.\"
.TH TCP 7 2012-04-23 "Linux" "Linux Programmer's Manual"
.SH NAME
tcp \- TCP protocol
Explicit Congestion Notification, new
management of TIME_WAIT sockets, keep-alive socket options
and support for Duplicate SACK extensions.
-.SS Address Formats
+.SS Address formats
TCP is built on top of IP (see
.BR ip (7)).
The address formats defined by
remote TCP is broken and treats the window as a signed quantity.
If disabled, assume that the remote TCP is not broken even if we do
not receive a window scaling option from it.
-.SS Socket Options
+.SS Socket options
To set or get a TCP socket option, call
.BR getsockopt (2)
to read or
socket options are valid on TCP sockets.
For more information see
.BR ip (7).
-.\" FIXME Document TCP_CONGESTION (new in 2.6.13)
.TP
.BR TCP_CORK " (since Linux 2.2)"
.\" precisely: since 2.1.127
Values greater than the (eventual) interface MTU have no effect.
TCP will also impose
its minimum and maximum bounds over the value provided.
-.\" FIXME
-.\" Document TCP_MD5SIG, added in Linux 2.6.20,
-.\" Needs CONFIG_TCP_MD5SIG
-.\" From net/inet/Kconfig
-.\" bool "TCP: MD5 Signature Option support (RFC2385) (EXPERIMENTAL)"
-.\" RFC2385 specifies a method of giving MD5 protection to TCP sessions.
-.\" Its main (only?) use is to protect BGP sessions between core routers
-.\" on the Internet.
-.\"
-.\" There is a TCP_MD5SIG option documented in FreeBSD's tcp(4),
-.\" but probably many details are different on Linux
-.\" Authors were yoshfuji@linux-ipv6.org and Dave Muller
-.\" http://thread.gmane.org/gmane.linux.network/47490
-.\" http://www.daemon-systems.org/man/tcp.4.html
-.\" http://article.gmane.org/gmane.os.netbsd.devel.network/3767/match=tcp_md5sig+freebsd
.TP
.B TCP_NODELAY
.\" Present in Linux 1.0
delayed ack timeouts occurring and data transfer.
This option should not be used in code intended to be
portable.
-.\" FIXME Document TCP_USER_TIMEOUT (new in 2.6.37)
-.\" See commit dca43c75e7e545694a9dd6288553f55c53e2a3a3
.TP
.BR TCP_SYNCNT " (since Linux 2.4)"
.\" Precisely: since 2.3.18
.BR TIOCOUTQ ,
defined in
.IR <sys/ioctl.h> .
-.SS Error Handling
+.SS Error handling
When a network error occurs, TCP tries to resend the packet.
If it doesn't succeed after some time, either
.B ETIMEDOUT
.\" It was updated for 2.4 by Nivedita Singhvi with input from
.\" Alexey Kuznetsov's Documentation/networking/ip-sysctl.txt
.\" document.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR accept (2),
.BR bind (2),
.BR connect (2),
.\" Copyright (c) 2006 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 28 Dec 2006 - Initial Creation
.\"
-.TH TERMIO 7 2006-12-28 "Linux" "Linux Programmer's Manual"
+.TH TERMIO 7 2013-02-12 "Linux" "Linux Programmer's Manual"
.SH NAME
termio \- System V terminal driver interface
.SH DESCRIPTION
.BR termios (3)
or
.BR tty_ioctl (4).
-.SH "SEE ALSO"
+.SH SEE ALSO
+.BR reset (1),
+.BR setterm (1),
+.BR stty (1),
.BR termios (3),
+.BR tty (4),
.BR tty_ioctl (4)
.\" Copyright (c) 2006 by Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" 2008-06-24, mtk: added some details about where jiffies come into
.\" play; added section on high-resolution timers.
.\"
-.TH TIME 7 2010-02-25 "Linux" "Linux Programmer's Manual"
+.TH TIME 7 2012-10-28 "Linux" "Linux Programmer's Manual"
.SH NAME
time \- overview of time and timers
.SH DESCRIPTION
-.SS "Real time and process time"
+.SS Real time and process time
.I "Real time"
is defined as time measured from some fixed point,
either from a standard point in the past
.BR getrusage (2),
or
.BR clock (3).
-.SS "The Hardware Clock"
+.SS The hardware clock
Most computers have a (battery-powered) hardware clock which the kernel
reads at boot time in order to initialize the software clock.
For further details, see
.BR rtc (4)
and
.BR hwclock (8).
-.SS "The Software Clock, HZ, and Jiffies"
+.SS The software clock, HZ, and jiffies
The accuracy of various system calls that set timeouts,
(e.g.,
.BR select (2),
system call is a special case.
It reports times with a granularity defined by the kernel constant
.IR USER_HZ .
-Userspace applications can determine the value of this constant using
+User-space applications can determine the value of this constant using
.IR sysconf(_SC_CLK_TCK) .
.\" glibc gets this info with a little help from the ELF loader;
.\" see glibc elf/dl-support.c and kernel fs/binfmt_elf.c.
.\"
-.SS "High-Resolution Timers"
+.SS High-resolution timers
Before Linux 2.6.21, the accuracy of timer and sleep system calls
(see below) was also limited by the size of the jiffy.
HRTs are not supported on all hardware architectures.
(Support is provided on x86, arm, and powerpc, among others.)
-.SS "The Epoch"
+.SS The Epoch
UNIX systems represent time in seconds since the
.IR Epoch ,
1970-01-01 00:00:00 +0000 (UTC).
nearest second.
The system time can be changed using
.BR settimeofday (2).
-.SS "Broken-down time"
+.SS Broken-down time
Certain library functions use a structure of
type
.I tm
.BR strftime (3),
and
.BR strptime (3).
-.SS "Sleeping and Setting Timers"
+.SS Sleeping and setting timers
Various system calls and functions allow a program to sleep
(suspend execution) for a specified period of time; see
.BR nanosleep (2),
.BR timerfd_create (2),
and
.BR timer_create (2).
-.SH "SEE ALSO"
+.SS Timer slack
+Since Linux 2.6.28, it is possible to control the "timer slack"
+value for a thread.
+The timer slack is the length of time by
+which the kernel may delay the wake-up of certain
+system calls that block with a timeout.
+Permitting this delay allows the kernel to coalesce wake-up events,
+thus possibly reducing the number of system wake-ups and saving power.
+For more details, see the description of
+.B PR_SET_TIMERSLACK
+in
+.BR prctl (2).
+.SH SEE ALSO
+.ad l
+.nh
.BR date (1),
.BR time (1),
.BR adjtimex (2),
.\" This man page is Copyright (C) 1999 Andi Kleen <ak@muc.de>.
+.\"
+.\" %%%LICENSE_START(VERBATIM_ONE_PARA)
.\" Permission is granted to distribute possibly modified copies
.\" of this page provided the header is included verbatim,
.\" and in case of nontrivial modification author and date
.\" of the modification is added to the header.
+.\" %%%LICENSE_END
+.\"
.\" $Id: udp.7,v 1.7 2000/01/22 01:55:05 freitag Exp $
.\"
.TH UDP 7 2010-06-13 "Linux" "Linux Programmer's Manual"
that exceed the interface MTU.
However, disabling it is not recommended
for performance and reliability reasons.
-.SS "Address Format"
+.SS Address format
UDP uses the IPv4
.I sockaddr_in
address format described in
.BR ip (7).
-.SS "Error Handling"
+.SS Error handling
All fatal errors will be passed to the user as an error return even
when the socket is not connected.
This includes asynchronous errors
even if total pages of UDP sockets exceed
.I udp_mem
pressure.
-.SS "Socket Options"
+.SS Socket options
To set or get a UDP socket option, call
.BR getsockopt (2)
to read or
is a new feature in Linux 2.2.
.\" .SH CREDITS
.\" This man page was written by Andi Kleen.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ip (7),
.BR raw (7),
.BR socket (7),
.\" Copyright (c) 2008 by Gerrit Renker <gerrit@erg.abdn.ac.uk>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" $Id: udplite.7,v 1.12 2008/07/23 15:22:22 gerrit Exp gerrit $
.\"
.BR udp (7),
i.e., it shares the same API and API behaviour, and in addition
offers two socket options to control the checksum coverage.
-.SS "Address Format"
+.SS Address format
UDP-Litev4 uses the
.I sockaddr_in
address format described in
.I sockaddr_in6
address format described in
.BR ipv6 (7).
-.SS "Socket Options"
+.SS Socket options
To set or get a UDP-Lite socket option, call
.BR getsockopt (2)
to read or
.BR udp (7)
may be returned.
UDP-Lite does not add further errors.
+.SH FILES
+.I /proc/net/snmp
+\- basic UDP-Litev4 statistics counters.
+.br
+.I /proc/net/snmp6
+\- basic UDP-Litev6 statistics counters.
+.SH VERSIONS
+UDP-Litev4/v6 first appeared in Linux 2.6.20.
.SH BUGS
.\" FIXME . remove this section once glibc supports UDP-Lite
Where glibc support is missing, the following definitions are needed:
#define UDPLITE_RECV_CSCOV 11
.fi
.in
-.SH FILES
-.I /proc/net/snmp
-\- basic UDP-Litev4 statistics counters.
-.br
-.I /proc/net/snmp6
-\- basic UDP-Litev6 statistics counters.
-.SH VERSIONS
-UDP-Litev4/v6 first appeared in Linux 2.6.20.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR ip (7),
.BR ipv6 (7),
.BR socket (7),
.BR udp (7)
-RFC\ 3828 for the Lightweight User Datagram Protocol (UDP-Lite)
-.br
+RFC\ 3828 for the Lightweight User Datagram Protocol (UDP-Lite).
+
.I Documentation/networking/udplite.txt
+in the Linux kernel source tree
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) Markus Kuhn, 1995, 2001
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 1995-11-26 Markus Kuhn <mskuhn@cip.informatik.uni-erlangen.de>
.\" First version written
.\" 2001-05-11 Markus Kuhn <mgk25@cl.cam.ac.uk>
.\" Update
.\"
-.TH UNICODE 7 2001-05-11 "GNU" "Linux Programmer's Manual"
+.TH UNICODE 7 2012-08-05 "GNU" "Linux Programmer's Manual"
.SH NAME
Unicode \- universal character set
.SH DESCRIPTION
character set and the characters in the range 0x0000 to 0x00ff
are identical to those in
.BR "ISO 8859-1 Latin-1" .
-.SS "Combining Characters"
+.SS Combining characters
Some code points in
.B UCS
have been assigned to
Combining characters are essential for instance for encoding the Thai
script or for mathematical typesetting and users of the International
Phonetic Alphabet.
-.SS "Implementation Levels"
+.SS Implementation levels
As not all systems are expected to support advanced mechanisms like
combining characters, ISO 10646-1 specifies the following three
.I implementation levels
They provide guidelines and algorithms for
editing, sorting, comparing, normalizing, converting and displaying
Unicode strings.
-.SS "Unicode Under Linux"
+.SS Unicode under Linux
Under GNU/Linux, the C type
.I wchar_t
is a signed 32-bit integer type.
general precomposed characters should be preferred where available
(Unicode calls this
.BR "Normalization Form C" ).
-.SS "Private Area"
+.SS Private area
In the
.BR BMP ,
the range 0xe000 to 0xf8ff will never be assigned to any characters by
This is the official specification of
.BR UCS .
-Available as a PDF file on CD-ROM from http://www.iso.ch/.
+Available as a PDF file on CD-ROM from
+.UR http://www.iso.ch/
+.UE .
.TP
*
The Unicode Standard, Version 3.0.
*
Unicode Technical Reports.
.RS
-http://www.unicode.org/unicode/reports/
+.UR http://www.unicode.org\:/unicode\:/reports/
+.UE
.RE
.TP
*
Markus Kuhn: UTF-8 and Unicode FAQ for UNIX/Linux.
.RS
-http://www.cl.cam.ac.uk/~mgk25/unicode.html
+.UR http://www.cl.cam.ac.uk\:/~mgk25\:/unicode.html
+.UE
Provides subscription information for the
.I linux-utf8
*
Bruno Haible: Unicode HOWTO.
.RS
-ftp://ftp.ilog.fr/pub/Users/haible/utf8/Unicode-HOWTO.html
+.UR ftp://ftp.ilog.fr\:/pub\:/Users\:/haible\:/utf8\:/Unicode-HOWTO.html
+.UE
.RE
.SH BUGS
When this man page was last revised, the GNU C Library support for
with sophisticated text rendering engines.
.\" .SH AUTHOR
.\" Markus Kuhn <mgk25@cl.cam.ac.uk>
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR setlocale (3),
.BR charsets (7),
.BR utf-8 (7)
'\" t
.\" Copyright (C) 2001 Andries Brouwer <aeb@cwi.nl>
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
-.TH UNITS 7 2001-12-22 "Linux" "Linux Programmer's Manual"
+.TH UNITS 7 2012-08-05 "Linux" "Linux Programmer's Manual"
.SH NAME
units, kilo, kibi, mega, mebi, giga, gibi \- decimal and binary prefixes
.SH DESCRIPTION
See also
.sp
.RS
-http://physics.nist.gov/cuu/Units/prefixes.html
+.UR http://physics.nist.gov\:/cuu\:/Units\:/prefixes.html
+.UE
.RE
.SS Binary prefixes
The binary prefixes resemble the decimal ones,
See also
.sp
-.RS
-http://physics.nist.gov/cuu/Units/binary.html
-.RE
+.UR http://physics.nist.gov\:/cuu\:/Units\:/binary.html
+.UE
.SS Discussion
Before these binary prefixes were introduced, it was fairly
common to use k=1000 and K=1024, just like b=bit, B=byte.
.\" This man page is Copyright (C) 1999 Andi Kleen <ak@muc.de>.
+.\"
+.\" %%%LICENSE_START(VERBATIM_ONE_PARA)
.\" Permission is granted to distribute possibly modified copies
.\" of this page provided the header is included verbatim,
.\" and in case of nontrivial modification author and date
.\" of the modification is added to the header.
+.\" %%%LICENSE_END
.\"
.\" Modified, 2003-12-02, Michael Kerrisk, <mtk.manpages@gmail.com>
.\" Modified, 2003-09-23, Adam Langley
.\"
.TH UNIX 7 2012-05-10 "Linux" "Linux Programmer's Manual"
.SH NAME
-unix \- Sockets for local
-interprocess communication
+unix \- sockets for local interprocess communication
.SH SYNOPSIS
.B #include <sys/socket.h>
.br
UNIX domain sockets support passing file descriptors or process credentials
to other processes using ancillary data.
-.SS Address Format
+.SS Address format
A UNIX domain socket address is represented in the following structure:
.in +4n
.nf
bytes of
.IR sun_path .
The abstract socket namespace is a nonportable Linux extension.
-.SS Socket Options
+.SS Socket options
For historical reasons these socket options are specified with a
.B SOL_SOCKET
type even though they are
When this option is set and the socket is not yet connected
a unique name in the abstract namespace will be generated automatically.
Expects an integer boolean flag.
-.SS Autobind Feature
+.SS Autobind feature
If a
.BR bind (2)
call specifies
This limit is calculated as the doubled (see
.BR socket (7))
option value less 32 bytes used for overhead.
-.SS Ancillary Messages
+.SS Ancillary messages
Ancillary data is sent and received using
.BR sendmsg (2)
and
.BR SCM_RIGHTS
see
.BR cmsg (3).
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR recvmsg (2),
.BR sendmsg (2),
.BR socket (2),
-'\"
.\" (C) Copyright 1999-2000 David A. Wheeler (dwheeler@dwheeler.com)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" Fragments of this document are directly derived from IETF standards.
.\" For those fragments which are directly derived from such standards,
.\" Modified Fri Aug 21 23:00:00 1999 by David A. Wheeler (dwheeler@dwheeler.com)
.\" Modified Tue Mar 14 2000 by David A. Wheeler (dwheeler@dwheeler.com)
.\"
-.TH URI 7 2000-03-14 "Linux" "Linux Programmer's Manual"
+.TH URI 7 2012-08-05 "Linux" "Linux Programmer's Manual"
.SH NAME
uri, url, urn \- uniform resource identifier (URI), including a URL or URN
.SH SYNOPSIS
interaction mechanism (called POST) which does
not include the data in the URI.
See the Common Gateway Interface specification at
-<http://www.w3.org/CGI> for more information.
+.UR http://www.w3.org\:/CGI
+.UE
+for more information.
.PP
.B "ftp \- File Transfer Protocol (FTP)"
.PP
A
.I message-id
corresponds to the Message-ID of
-.UR http://www.ietf.org/rfc/rfc1036.txt
+.UR http://www.ietf.org\:/rfc\:/rfc1036.txt
IETF RFC\ 1036,
.UE
without the enclosing "<"
a set of servers for hierarchically organized information
(such as people and computing resources).
See
-.UR http://www.ietf.org/rfc/rfc2255.txt
+.UR http://www.ietf.org\:/rfc\:/rfc2255.txt
RFC\ 2255
.UE
for more information on the LDAP URL scheme.
.IP dn
the LDAP Distinguished Name, which identifies
the base object of the LDAP search (see
-.UR http://www.ietf.org/rfc/rfc2253.txt
+.UR http://www.ietf.org\:/rfc\:/rfc2253.txt
RFC\ 2253
.UE
section 3).
to return).
If omitted, all entries should be returned.
See
-.UR http://www.ietf.org/rfc/rfc2254.txt
+.UR http://www.ietf.org\:/rfc\:/rfc2254.txt
RFC\ 2254
.UE
section 4.
.PP
This scheme designates a WAIS database, search, or document
(see
-.UR http://www.ietf.org/rfc/rfc1625.txt
+.UR http://www.ietf.org\:/rfc\:/rfc1625.txt
IETF RFC\ 1625
.UE
for more information on WAIS).
(e.g., urn:ietf:... would identify IETF documents); at this time
URNs are not widely implemented.
Not all tools support all schemes.
-.SS "Character Encoding"
+.SS Character encoding
.PP
URIs use a limited number of characters so that they can be
typed in and used in a variety of situations.
.IP 2.
use the URI escaping mechanism, that is,
use the %HH encoding for unsafe octets.
-.SS "Writing a URI"
+.SS Writing a URI
When written, URIs should be placed inside double quotes
(e.g., "http://www.kernelnotes.org"),
enclosed in angle brackets (e.g., <http://lwn.net>),
is preferred practice in Great Britain and hackers worldwide
(see the
Jargon File's section on Hacker Writing Style,
-.IR http://www.fwi.uva.nl/~mes/jargon/h/HackerWritingStyle.html ,
+.UR http://www.fwi.uva.nl\:/~mes\:/jargon\:/h\:/HackerWritingStyle.html
+.UE ,
for more information).
Older documents suggested inserting the prefix "URL:"
just before the URI, but this form has never caught on.
(such as in dialog boxes).
Don't use abbreviated URIs as hypertext links inside a document;
use the standard format as described here.
-.SH "CONFORMING TO"
-.PP
-.I http://www.ietf.org/rfc/rfc2396.txt
-(IETF RFC\ 2396),
-.I http://www.w3.org/TR/REC-html40
-(HTML 4.0).
+.SH CONFORMING TO
+.PP
+.UR http://www.ietf.org\:/rfc\:/rfc2396.txt
+(IETF RFC\ 2396)
+.UE ,
+.UR http://www.w3.org\:/TR\:/REC-html40
+(HTML 4.0)
+.UE .
.SH NOTES
Any tool accepting URIs (e.g., a web browser) on a Linux system should
be able to handle (directly or indirectly) all of the
tools) and invokes the right tool for any URI.
.\" .SH AUTHOR
.\" David A. Wheeler (dwheeler@dwheeler.com) wrote this man page.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR lynx (1),
.BR man2html (1),
.BR mailaddr (7),
-.BR utf-8 (7),
-.UR http://www.ietf.org/rfc/rfc2255.txt
+.BR utf-8 (7)
+
+.UR http://www.ietf.org\:/rfc\:/rfc2255.txt
IETF RFC\ 2255
.UE
-.\" Hey Emacs! This file is -*- nroff -*- source.
-.\"
.\" Copyright (C) Markus Kuhn, 1996, 2001
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 1995-11-26 Markus Kuhn <mskuhn@cip.informatik.uni-erlangen.de>
.\" First version written
.RS
11100010 10001001 10100000 = 0xe2 0x89 0xa0
.RE
-.SS "Application Notes"
+.SS Application notes
Users have to select a
.B UTF-8
locale, for example with
ISO/IEC 10646-1:2000, Unicode 3.1, RFC\ 3629, Plan 9.
.\" .SH AUTHOR
.\" Markus Kuhn <mgk25@cl.cam.ac.uk>
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR nl_langinfo (3),
.BR setlocale (3),
.BR charsets (7),
.\" This man page is Copyright (C) 1998 Heiner Eisen.
+.\"
+.\" %%%LICENSE_START(VERBATIM_ONE_PARA)
.\" Permission is granted to distribute possibly modified copies
.\" of this page provided the header is included verbatim,
.\" and in case of nontrivial modification author and date
.\" of the modification is added to the header.
+.\" %%%LICENSE_END
+.\"
.\" $Id: x25.7,v 1.4 1999/05/18 10:35:12 freitag Exp $
-.TH X25 7 2012-05-10 "Linux" "Linux Programmer's Manual"
+.\"
+.TH X25 7 2012-08-05 "Linux" "Linux Programmer's Manual"
.SH NAME
x25 \- ITU-T X.25 / ISO-8208 protocol interface.
.SH SYNOPSIS
(such as socket memory or buffer size limits) become effective.
If that
occurs, the X.25 connection will be reset.
-.SS Socket Addresses
+.SS Socket addresses
The
.B AF_X25
socket address family uses the
consists of up to 15 (not counting the terminating 0) ASCII
characters forming the X.121 address.
Only the decimal digit characters from \(aq0\(aq to \(aq9\(aq are allowed.
-.SS Socket Options
+.SS Socket options
The following X.25-specific socket options can be set by using
.BR setsockopt (2)
and read with
X.25 N-Reset events are not propagated to the user process yet.
Thus,
if a reset occurred, data might be lost without notice.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR socket (2),
.BR socket (7)
.PP
Jonathan Simon Naylor:
\(lqThe Re-Analysis and Re-Implementation of X.25.\(rq
The URL is
-.RS
-.I ftp://ftp.pspt.fi/pub/ham/linux/ax25/x25doc.tgz
-.RE
+.UR ftp://ftp.pspt.fi\:/pub\:/ham\:/linux\:/ax25\:/x25doc.tgz
+.UE .
.\" Fri Apr 2 11:32:09 MET DST 1993
.\" and Copyright (C) 2007 Michael Kerrisk <mtk.manpages@gmail.com>
.\"
+.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, write to the Free
-.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
-.\" USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified Sat Jul 24 17:35:48 1993 by Rik Faith (faith@cs.unc.edu)
.\" 2007-10-23 mtk: minor rewrites, and added paragraph on exit status
.\"
.TH INTRO 8 2007-10-23 "Linux" "Linux Programmer's Manual"
.SH NAME
-intro \- Introduction to administration and privileged commands
+intro \- introduction to administration and privileged commands
.SH DESCRIPTION
Section 8 of the manual describes commands
which either can be or are only used by the superuser,
.BR intro (1)
for more information.
.SH NOTES
-.SS Authors and Copyright Conditions
+.SS Authors and copyright conditions
Look at the header of the manual page source for the author(s) and copyright
conditions.
Note that these can be different from page to page!
+.\" %%%LICENSE_START(PUBLIC_DOMAIN)
.\" This is in the public domain
-.TH LD.SO 8 2012-04-17 "GNU" "Linux Programmer's Manual"
+.\" %%%LICENSE_END
+.\"
+.TH LD.SO 8 2013-02-10 "GNU" "Linux Programmer's Manual"
.SH NAME
ld.so, ld-linux.so* \- dynamic linker/loader
.SH SYNOPSIS
and
.IR /etc/ld.so.conf .
.LP
-The shared libraries needed by the program are searched for
-in the following order:
+When resolving library dependencies,
+the dynamic linker first inspects each dependency
+string to see if it contains a slash (this can occur if
+a library pathname containing slashes was specified at link time).
+If a slash is found, then the dependency string is interpreted as
+a (relative or absolute) pathname,
+and the library is loaded using that pathname.
+.LP
+If a library dependency does not contain a slash,
+then it is searched for in the following order:
.IP o 3
(ELF only) Using the directories specified in the
DT_RPATH dynamic section attribute
of the binary if present.
.IP o
From the cache file
-.I /etc/ld.so.cache
+.IR /etc/ld.so.cache ,
which contains a compiled list of candidate libraries previously found
in the augmented library path.
If, however, the binary was linked with the
.\" it appears.
.\"
.\" There is also $PLATFORM. This is a kind of wildcard
-.\" of directories related at AT_HWCAP. To get an idea of the
+.\" of directories related to AT_PLATFORM. To get an idea of the
.\" places that $PLATFORM would match, look at the output of the
.\" following:
.\"
dfp, eimm, esan3, etf3enh, g5, highgprs, hpage, ldisp, msa, stfle,
z900, z990, z9-109, z10, zarch
.TP
-.TP
.B x86 (32-bit only)
acpi, apic, clflush, cmov, cx8, dts, fxsr, ht, i386, i486, i586, i686, mca, mmx,
mtrr, pat, pbe, pge, pn, pse36, sep, ss, sse, sse2, tm
Similar to the
.B PATH
environment variable.
+Ignored in set-user-ID and set-group-ID programs.
.TP
.B LD_PRELOAD
-A whitespace-separated list of additional, user-specified, ELF shared
+A list of additional, user-specified, ELF shared
libraries to be loaded before all others.
+The items of the list can be separated by spaces or colons.
This can be used to selectively override functions in other shared libraries.
+The libraries are searched for using the rules given under DESCRIPTION.
For set-user-ID/set-group-ID ELF binaries,
-only libraries in the standard search
-directories that are also set-user-ID will be loaded.
+preload pathnames containing slashes are ignored,
+and libraries in the standard search directories are loaded
+only if the set-user-ID permission bit is enabled on the library file.
.TP
.B LD_TRACE_LOADED_OBJECTS
(ELF only)
(glibc since 2.1)
If set to a nonempty string,
output symbol versioning information about the
-program if querying information about the program (i.e., either
+program if
.B LD_TRACE_LOADED_OBJECTS
-has been set, or
-.B \-\-list
-or
-.B \-\-verify
-options have been given to the dynamic linker).
+variable has been set.
.TP
.B LD_WARN
(ELF only)(glibc since 2.1.3)
libraries and an ordered list of candidate libraries.
.TP
.I /etc/ld.so.preload
-File containing a whitespace separated list of ELF shared libraries to
+File containing a whitespace-separated list of ELF shared libraries to
be loaded before the program.
.TP
.B lib*.so*
ELF functionality is available since Linux 1.1.52 and libc5.
.SH SEE ALSO
.BR ldd (1),
+.BR sln (1),
+.BR getauxval (3),
.BR rtld-audit (7),
.BR ldconfig (8)
.\" .SH AUTHORS
-.\" -*- nroff -*-
.\" Copyright 1999 SuSE GmbH Nuernberg, Germany
.\" Author: Thorsten Kukuk <kukuk@suse.de>
.\"
+.\" %%%LICENSE_START(GPLv2+_SW_3_PARA)
.\" This program is free software; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of the
.\" General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this program; see the file COPYING. If not,
-.\" write to the Free Software Foundation, Inc., 59 Temple Place - Suite 330,
-.\" Boston, MA 02111-1307, USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" Modified, 6 May 2002, Michael Kerrisk, <mtk.manpages@gmail.com>
.\" Change listed order of /usr/lib and /lib
-.\" -*- nroff -*-
.\" Copyright 1999 SuSE GmbH Nuernberg, Germany
.\" Author: Thorsten Kukuk <kukuk@suse.de>
.\"
+.\" %%%LICENSE_START(GPLv2+_SW_3_PARA)
.\" This program is free software; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of the
.\" General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
-.\" License along with this program; see the file COPYING. If not,
-.\" write to the Free Software Foundation, Inc., 59 Temple Place - Suite 330,
-.\" Boston, MA 02111-1307, USA.
+.\" License along with this manual; if not, see
+.\" <http://www.gnu.org/licenses/>.
+.\" %%%LICENSE_END
.\"
.\" 2008-12-05 Petr Baudis <pasky@suse.cz>
.\" Rewrite the NOTES section to reflect modern reality
invalidates its cache:
$ \fBnscd -i\fP \fI<database>\fP
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR nscd.conf (5),
.BR nsswitch.conf (5)
.\" .SH AUTHOR
--- /dev/null
+.\" Copyright (c) 2013 by Michael Kerrisk <mtk.manpages@gmail.com>
+.\"
+.\" %%%LICENSE_START(VERBATIM)
+.\" Permission is granted to make and distribute verbatim copies of this
+.\" manual provided the copyright notice and this permission notice are
+.\" preserved on all copies.
+.\"
+.\" Permission is granted to copy and distribute modified versions of this
+.\" manual under the conditions for verbatim copying, provided that the
+.\" entire resulting derived work is distributed under the terms of a
+.\" permission notice identical to this one.
+.\"
+.\" Since the Linux kernel and libraries are constantly changing, this
+.\" manual page may be incorrect or out-of-date. The author(s) assume no
+.\" responsibility for errors or omissions, or for damages resulting from
+.\" the use of the information contained herein. The author(s) may not
+.\" have taken the same level of care in the production of this manual,
+.\" which is licensed free of charge, as they might when working
+.\" professionally.
+.\"
+.\" Formatted or processed versions of this manual, if unaccompanied by
+.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
+.\"
+.TH SLN 8 2013-02-10 "GNU" "Linux Programmer's Manual"
+.SH NAME
+sln \- create symbolic links
+.SH SYNOPSIS
+.BI sln " source dest"
+.br
+.BI sln " filelist"
+.SH DESCRIPTION
+The
+.B sln
+program creates symbolic links.
+Unlike the
+.BR ln (1)
+program, it is statically linked.
+This means that if for some reason the dynamic linker is not working,
+.BR sln
+can be used to make symbolic links to dynamic libraries.
+
+The command line has two forms.
+In the first form, it creates
+.I dest
+as a new symbolic link to
+.IR source .
+
+In the second form,
+.I filelist
+is a list of space-separated pathname pairs,
+and the effect is as if
+.BR sln
+was executed once for each line of the file,
+with the two pathnames as the arguments.
+
+The
+.B sln
+program supports no command-line options.
+.SH SEE ALSO
+.BR ln (1),
+.BR ldconfig (8),
+.BR ld.so (8)
.\" sync(8) manpage, dating back to the Linux 0.99 days. The Linux-specific
.\" information is attributed to Linus Torvalds
.\" Copyright 1992, 1993 Rickard E. Faith (faith@cs.unc.edu)
+.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" May be distributed under the GNU General Public License
+.\" %%%LICENSE_END
+.\"
.TH SYNC 8 1998-11-01 "GNU" "Linux Programmer's Manual"
.SH NAME
sync \- synchronize data on disk with memory
and
.BR halt (8)
directly.)
-.SH "OPTIONS"
+.SH OPTIONS
.TP
.B "\-\-help"
Print a usage message on standard output and exit successfully.
.SH ENVIRONMENT
The variables \fBLANG\fP, \fBLC_ALL\fP, \fBLC_CTYPE\fP,
and \fBLC_MESSAGES\fP have the usual meaning.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
POSIX.2.
.SH NOTES
On Linux,
.B sync
as found in the file\%utils-4.0 package;
other versions may differ slightly.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR sync (2),
.BR halt (8),
.BR reboot (8),
+.\" %%%LICENSE_START(PUBLIC_DOMAIN)
.\" This page is in the public domain
+.\" %%%LICENSE_END
.\"
.TH TZSELECT 8 2007-05-18 "" "Linux System Administration"
.SH NAME
environment variable.
.PP
All interaction with the user is done via standard input and standard error.
-.SH "EXIT STATUS"
+.SH EXIT STATUS
The exit status is zero if a timezone was successfully obtained
from the user, nonzero otherwise.
.SH ENVIRONMENT
.TP
\fBTZDIR\fP\fI/\fP\fITZ\fP
Time zone data file for timezone \fITZ\fP.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR tzfile (5),
.BR zdump (8),
.BR zic (8)
+.\" %%%LICENSE_START(PUBLIC_DOMAIN)
.\" This page is in the public domain
+.\" %%%LICENSE_END
.\"
-.TH ZDUMP 8 2007-05-18 "" "Linux System Administration"
+.TH ZDUMP 8 2013-02-12 "" "Linux System Administration"
.SH NAME
zdump \- timezone dumper
.SH SYNOPSIS
.B zdump
[
+.B \-\-version
+] [
+.B \-\-help
+] [
.B \-v
] [
.B \-c
-cutoffyear ] [ zonename ... ]
+.RI [ loyear \fB,\fR] hiyear
+] [
+.IR zonename " ... ]"
.SH DESCRIPTION
.I Zdump
prints the current time in each
.PP
These options are available:
.TP
+.B \-\-version
+Output version information and exit.
+.TP
+.B \-\-help
+Output short usage and exit.
+.TP
.B \-v
For each
.I zonename
.B isdst=0
otherwise.
.TP
-.BI "\-c " cutoffyear
-Cut off the verbose output near the start of the given year.
-.SH "SEE ALSO"
+.BI "\-c " \fR[\fIloyear , \fR]\fIhiyear
+Cut off the verbose output near the start of the given year(s).
+The output still includes the lowest possible time value
+and one day after it, and the highest possible time value
+preceded by the time value one day before it.
+.SH SEE ALSO
.BR tzfile (5),
.BR zic (8)
.\" @(#)zdump.8 7.3
+.\" %%%LICENSE_START(PUBLIC_DOMAIN)
.\" This page is in the public domain
+.\" %%%LICENSE_END
.\"
.TH ZIC 8 2010-02-25 "" "Linux System Administration"
.SH NAME
.B AT
field of the earliest transition time's rule to ensure that
the earliest transition time recorded in the compiled file is correct.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR tzfile (5),
.BR zdump (8)
.\" @(#)zic.8 7.19
-×:LDP man-pages:3.41:2011/10/31:getent:1:::::
-○:LDP man-pages:3.41:2007/11/15:intro:1:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2000/10/30:ldd:1:2002/02/14::ysato@h4.dion.ne.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2008/11/14:time:1:2008/11/20::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:_Exit:2:_exit:2:
-@:LDP man-pages:3.41:2011/09/08:__clone2:2:clone:2:
-○:LDP man-pages:3.41:2010/09/20:_exit:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:1995/06/10:_llseek:2:llseek:2:
-@:LDP man-pages:3.41:2012/05/02:_newselect:2:select:2:
-○:LDP man-pages:3.41:2007/12/19:_syscall:2:2008/02/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/11/20:_sysctl:2:sysctl:2:
-○:LDP man-pages:3.41:2010/09/10:accept:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/10:accept4:2:accept:2:
-○:LDP man-pages:3.41:2010/10/24:access:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/06/16:acct:2:2005/02/14::ysato444@yahoo.co.jp:Yuichi SATO:
-×:LDP man-pages:3.41:2010/02/25:add_key:2:::::
-○:LDP man-pages:3.41:2004/05/27:adjtimex:2:2006/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2007/07/05:afs_syscall:2:unimplemented:2:
-○:LDP man-pages:3.41:2008/06/12:alarm:2:1997/02/22::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
-○:LDP man-pages:3.41:2007/05/31:alloc_hugepages:2:2007/06/13::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2007/12/26:arch_prctl:2:2005/11/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/10/09:arm_fadvise:2:posix_fadvise:2:
-@:LDP man-pages:3.41:2010/10/09:arm_fadvise64_64:2:posix_fadvise:2:
-@:LDP man-pages:3.41:2010/10/09:arm_sync_file_range:2:sync_file_range:2:
-○:LDP man-pages:3.41:2012/03/05:bdflush:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2007/12/28:bind:2:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2007/07/05:break:2:unimplemented:2:
-○:LDP man-pages:3.41:2010/09/20:brk:2:2007/02/08::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2007/05/26:cacheflush:2:2005/10/05::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:capget:2:2009/03/09::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:capset:2:capget:2:
-○:LDP man-pages:3.41:2010/11/25:chdir:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/26:chmod:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/11/22:chown:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/11/22:chown32:2:chown:2:
-○:LDP man-pages:3.41:2010/09/20:chroot:2:2005/01/14::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2012/04/30:clock_getres:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/04/30:clock_gettime:2:clock_getres:2:
-○:LDP man-pages:3.41:2010/12/03:clock_nanosleep:2:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/04/30:clock_settime:2:clock_getres:2:
-○:LDP man-pages:3.41:2011/09/08:clone:2:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2011/09/08:clone2:2:clone:2:
-○:LDP man-pages:3.41:2007/12/28:close:2:2007/10/14::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/12/03:connect:2:2005/10/05::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/05/01:creat:2:open:2:
-○:LDP man-pages:3.41:2007/06/03:create_module:2:2006/07/30::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:0000/00/00:delete_module:2:2006/07/30::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/02/14:dup:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/02/14:dup2:2:dup:2:
-@:LDP man-pages:3.41:2012/02/14:dup3:2:dup:2:
-○:LDP man-pages:3.41:2012/04/15:epoll_create:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/04/15:epoll_create1:2:epoll_create:2:
-○:LDP man-pages:3.41:2012/04/15:epoll_ctl:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/05/02:epoll_pwait:2:epoll_wait:2:
-○:LDP man-pages:3.41:2012/05/02:epoll_wait:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/08/30:eventfd:2:2012/05/26::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/08/30:eventfd2:2:eventfd:2:
-○:LDP man-pages:3.41:2012/05/04:execve:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:exit:2:_exit:2:
-○:LDP man-pages:3.41:2008/11/27:exit_group:2:2005/02/14::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2012/05/04:faccessat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/10/09:fadvise64:2:posix_fadvise:2:
-@:LDP man-pages:3.41:2010/10/09:fadvise64_64:2:posix_fadvise:2:
-○:LDP man-pages:3.41:2012/04/23:fallocate:2:2012/05/26::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/11/25:fchdir:2:chdir:2:
-@:LDP man-pages:3.41:2010/09/26:fchmod:2:chmod:2:
-○:LDP man-pages:3.41:2012/05/22:fchmodat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/11/22:fchown:2:chown:2:
-@:LDP man-pages:3.41:2010/11/22:fchown32:2:fchown:2:
-○:LDP man-pages:3.41:2012/05/04:fchownat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/04/15:fcntl:2:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/04/15:fcntl64:2:fcntl:2:
-@:LDP man-pages:3.41:2012/02/27:fdatasync:2:fsync:2:
-@:LDP man-pages:3.41:2001/12/01:fgetxattr:2:getxattr:2:
-@:LDP man-pages:3.41:2001/12/01:flistxattr:2:listxattr:2:
-○:LDP man-pages:3.41:2009/07/25:flock:2:2005/09/06::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/01:fork:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2007/05/31:free_hugepages:2:alloc_hugepages:2:
-@:LDP man-pages:3.41:2001/12/01:fremovexattr:2:removexattr:2:
-@:LDP man-pages:3.41:2001/12/31:fsetxattr:2:setxattr:2:
-@:LDP man-pages:3.41:2012/05/07:fstat:2:stat:2:
-@:LDP man-pages:3.41:2011/10/04:fstat64:2:fstat:2:
-○:LDP man-pages:3.41:2012/05/04:fstatat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/05/04:fstatat64:2:fstatat:2:
-@:LDP man-pages:3.41:2010/11/21:fstatfs:2:statfs:2:
-@:LDP man-pages:3.41:2010/11/21:fstatfs64:2:fstatfs:2:
-@:LDP man-pages:3.41:2003/08/22:fstatvfs:2:statvfs:3:
-○:LDP man-pages:3.41:2012/02/27:fsync:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2011/09/08:ftruncate:2:truncate:2:
-@:LDP man-pages:3.41:2011/09/08:ftruncate64:2:ftruncate:2:
-○:LDP man-pages:3.41:2010/08/29:futex:2:2007/02/08::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2012/05/10:futimesat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:0000/00/00:get_kernel_syms:2:2006/07/31::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/08/15:get_mempolicy:2:2008/11/20::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-×:LDP man-pages:3.41:2012/05/03:get_robust_list:2:::::
-○:LDP man-pages:3.41:2008/11/27:get_thread_area:2:2003/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2009/03/15:getcontext:2:2001/12/15::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:2012/05/09:getcpu:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:getcwd:2:getcwd:3:
-○:LDP man-pages:3.41:2010/11/21:getdents:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/11/21:getdents64:2:getdents:2:
-○:LDP man-pages:3.41:2009/09/27:getdomainname:2:2009/01/15::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:getdtablesize:2:2007/01/14::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:2010/11/22:getegid:2:getgid:2:
-@:LDP man-pages:3.41:2010/11/22:getegid32:2:getegid:2:
-@:LDP man-pages:3.41:2010/11/22:geteuid:2:getuid:2:
-@:LDP man-pages:3.41:2010/11/22:geteuid32:2:geteuid:2:
-○:LDP man-pages:3.41:2010/11/22:getgid:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/11/22:getgid32:2:getgid:2:
-○:LDP man-pages:3.41:2010/11/22:getgroups:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/11/22:getgroups32:2:getgroups:2:
-@:LDP man-pages:3.41:2010/09/20:gethostid:2:gethostid:3:
-○:LDP man-pages:3.41:2010/09/26:gethostname:2:2009/01/15::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2009/03/15:getitimer:2:2007/10/14::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/11/16:getpagesize:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/12/03:getpeername:2:2005/02/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/26:getpgid:2:setpgid:2:
-@:LDP man-pages:3.41:2010/09/26:getpgrp:2:setpgid:2:
-○:LDP man-pages:3.41:2008/09/23:getpid:2:1997/06/27::suto@av.crl.sony.co.jp:SUTO, Mitsuaki:
-@:LDP man-pages:3.41:2007/07/05:getpmsg:2:unimplemented:2:
-@:LDP man-pages:3.41:2008/09/23:getppid:2:getpid:2:
-○:LDP man-pages:3.41:2008/05/29:getpriority:2:2005/10/08::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/11/22:getresgid:2:getresuid:2:
-@:LDP man-pages:3.41:2010/11/22:getresgid32:2:getresgid:2:
-○:LDP man-pages:3.41:2010/11/22:getresuid:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/11/22:getresuid32:2:getresuid:2:
-○:LDP man-pages:3.41:2011/09/10:getrlimit:2:2012/05/26::amotoki@gmail.com:Akihiro MOTOKI:
-×:LDP man-pages:3.41:2010/09/26:getrusage:2:::::
-○:LDP man-pages:3.41:2010/09/26:getsid:2:2002/02/03::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:2008/12/03:getsockname:2:2005/03/15::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2008/12/03:getsockopt:2:2008/07/24::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:2008/04/14:gettid:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/04/26:gettimeofday:2:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/11/22:getuid:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/11/22:getuid32:2:getuid:2:
-○:LDP man-pages:3.41:2001/12/01:getxattr:2:2003/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2007/07/05:gtty:2:unimplemented:2:
-○:LDP man-pages:3.41:1994/08/21:idle:2:2000/01/14::argrath@yo.rim.or.jp:Kentaro Shirakata:
-@:LDP man-pages:3.41:1995/11/29:inb:2:outb:2:
-@:LDP man-pages:3.41:1995/11/29:inb_p:2:outb:2:
-○:LDP man-pages:3.41:0000/00/00:init_module:2:2006/07/30::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:1995/11/29:inl:2:outb:2:
-@:LDP man-pages:3.41:1995/11/29:inl_p:2:outb:2:
-○:LDP man-pages:3.41:2010/10/20:inotify_add_watch:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/04:inotify_init:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/05/04:inotify_init1:2:inotify_init:2:
-○:LDP man-pages:3.41:2010/10/15:inotify_rm_watch:2:2006/08/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:1995/11/29:insb:2:outb:2:
-@:LDP man-pages:3.41:1995/11/29:insl:2:outb:2:
-@:LDP man-pages:3.41:1995/11/29:insw:2:outb:2:
-○:LDP man-pages:3.41:2010/11/11:intro:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:1995/11/29:inw:2:outb:2:
-@:LDP man-pages:3.41:1995/11/29:inw_p:2:outb:2:
-○:LDP man-pages:3.41:2012/05/08:io_cancel:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/08:io_destroy:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/08:io_getevents:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/08:io_setup:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/08:io_submit:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2000/09/21:ioctl:2:2011/09/15::tati@kc5.so-net.ne.jp:TACHIBANA Akira:
-○:LDP man-pages:3.41:2007/12/29:ioctl_list:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2007/06/15:ioperm:2:2007/01/07::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2004/12/26:iopl:2:2005/02/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/07/09:ioprio_get:2:ioprio_set:2:
-○:LDP man-pages:3.41:2008/07/09:ioprio_set:2:2007/01/08::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2007/06/28:ipc:2:1997/02/23::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
-○:LDP man-pages:3.41:2010/11/04:kexec_load:2:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-×:LDP man-pages:3.41:2010/02/25:keyctl:2:::::
-○:LDP man-pages:3.41:2009/09/15:kill:2:2005/12/05::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:killpg:2:2005/03/15::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2010/11/22:lchown:2:chown:2:
-@:LDP man-pages:3.41:2010/11/22:lchown32:2:lchown:2:
-@:LDP man-pages:3.41:2001/12/01:lgetxattr:2:getxattr:2:
-○:LDP man-pages:3.41:2008/08/21:link:2:2005/05/12::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2012/05/04:linkat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/11/20:listen:2:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:2001/12/01:listxattr:2:2003/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2001/12/01:llistxattr:2:listxattr:2:
-○:LDP man-pages:3.41:1995/06/10:llseek:2:2005/01/14::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2007/07/05:lock:2:unimplemented:2:
-○:LDP man-pages:3.41:2004/06/17:lookup_dcookie:2:2005/02/26::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2001/12/01:lremovexattr:2:removexattr:2:
-○:LDP man-pages:3.41:2011/09/25:lseek:2:2012/05/26::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2001/12/31:lsetxattr:2:setxattr:2:
-@:LDP man-pages:3.41:2012/05/07:lstat:2:stat:2:
-@:LDP man-pages:3.41:2011/10/04:lstat64:2:lstat:2:
-☆:LDP man-pages:3.40=>3.41:2012/04/28:madvise:2:2012/05/26::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2007/07/05:madvise1:2:unimplemented:2:
-○:LDP man-pages:3.41:2008/08/15:mbind:2:2008/11/20::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/11/01:migrate_pages:2:2012/05/26::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/04/22:mincore:2:2007/05/04::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/06/26:mkdir:2:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/04:mkdirat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:mknod:2:2005/09/06::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/04:mknodat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2011/09/14:mlock:2:2012/05/01::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2011/09/14:mlockall:2:mlock:2:
-○:LDP man-pages:3.41:2012/04/16:mmap:2:2012/05/01::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/04/16:mmap2:2:2012/05/01::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2007/06/01:modify_ldt:2:2007/06/18::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/10:mount:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/06/11:move_pages:2:2008/11/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2011/09/08:mprotect:2:2007/06/13::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2007/07/05:mpx:2:unimplemented:2:
-○:LDP man-pages:3.41:2010/08/29:mq_getsetattr:2:2006/07/30::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/10/04:mq_notify:2:mq_notify:3:
-@:LDP man-pages:3.41:2009/02/20:mq_open:2:mq_open:3:
-@:LDP man-pages:3.41:2010/09/20:mq_timedreceive:2:mq_receive:3:
-@:LDP man-pages:3.41:2010/09/20:mq_timedsend:2:mq_send:3:
-@:LDP man-pages:3.41:2010/08/29:mq_unlink:2:mq_unlink:3:
-○:LDP man-pages:3.41:2010/06/10:mremap:2:2012/05/01::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/08/06:msgctl:2:2005/10/11::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2004/05/27:msgget:2:2005/03/04::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/04/23:msgop:2:2006/03/06::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/04/23:msgrcv:2:msgop:2:
-@:LDP man-pages:3.41:2008/04/23:msgsnd:2:msgop:2:
-○:LDP man-pages:3.41:2008/04/22:msync:2:2008/07/24::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:2011/09/14:munlock:2:mlock:2:
-@:LDP man-pages:3.41:2011/09/14:munlockall:2:mlock:2:
-@:LDP man-pages:3.41:2012/04/16:munmap:2:mmap:2:
-○:LDP man-pages:3.41:2009/01/19:nanosleep:2:2008/08/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/03/05:nfsservctl:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2007/07/26:nice:2:2005/10/08::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/05/07:oldfstat:2:stat:2:
-@:LDP man-pages:3.41:2012/05/07:oldlstat:2:stat:2:
-@:LDP man-pages:3.41:2008/12/03:oldolduname:2:uname:2:
-@:LDP man-pages:3.41:2012/05/07:oldstat:2:stat:2:
-@:LDP man-pages:3.41:2008/12/03:olduname:2:uname:2:
-○:LDP man-pages:3.41:2012/05/01:open:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/04:openat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:1995/11/29:outb:2:2005/10/30::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:1995/11/29:outb_p:2:outb:2:
-@:LDP man-pages:3.41:1995/11/29:outl:2:outb:2:
-@:LDP man-pages:3.41:1995/11/29:outl_p:2:outb:2:
-@:LDP man-pages:3.41:1995/11/29:outsb:2:outb:2:
-@:LDP man-pages:3.41:1995/11/29:outsl:2:outb:2:
-@:LDP man-pages:3.41:1995/11/29:outsw:2:outb:2:
-@:LDP man-pages:3.41:1995/11/29:outw:2:outb:2:
-@:LDP man-pages:3.41:1995/11/29:outw_p:2:outb:2:
-@:LDP man-pages:3.41:2009/12/05:path_resolution:2:path_resolution:7:
-○:LDP man-pages:3.41:2008/10/06:pause:2:1997/06/27::suto@av.crl.sony.co.jp:SUTO, Mitsuaki:
-@:LDP man-pages:3.41:2003/07/14:pciconfig_iobase:2:pciconfig_read:2:
-○:LDP man-pages:3.41:2003/07/14:pciconfig_read:2:2004/07/18::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2003/07/14:pciconfig_write:2:pciconfig_read:2:
-○:LDP man-pages:3.41:2003/01/01:personality:2:2003/09/14::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:2012/02/14:pipe:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/02/14:pipe2:2:pipe:2:
-○:LDP man-pages:3.41:2007/06/01:pivot_root:2:2000/06/14::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:2012/05/05:poll:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/10/09:posix_fadvise:2:2012/05/26::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/05/05:ppoll:2:poll:2:
-☆:LDP man-pages:3.40=>3.41:2012/04/23:prctl:2:2012/05/26::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/04/30:pread:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/04/30:pread64:2:pread:2:
-@:LDP man-pages:3.41:2010/11/17:preadv:2:readv:2:
-@:LDP man-pages:3.41:2011/09/10:prlimit:2:getrlimit:2:
-×:LDP man-pages:3.41:2012/04/25:process_vm_readv:2:::::
-※:LDP man-pages:3.41:2012/04/25:process_vm_writev:2:process_vm_readv:2:
-@:LDP man-pages:3.41:2007/07/05:prof:2:unimplemented:2:
-@:LDP man-pages:3.41:2012/05/02:pselect:2:select:2:
-@:LDP man-pages:3.41:2012/05/02:pselect6:2:select:2:
-×:LDP man-pages:3.41:2012/04/26:ptrace:2:::::
-@:LDP man-pages:3.41:2007/07/05:putpmsg:2:unimplemented:2:
-@:LDP man-pages:3.41:2012/04/30:pwrite:2:pread:2:
-@:LDP man-pages:3.41:2012/04/30:pwrite64:2:pwrite:2:
-@:LDP man-pages:3.41:2010/11/17:pwritev:2:readv:2:
-○:LDP man-pages:3.41:2007/06/03:query_module:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-×:LDP man-pages:3.41:2010/06/16:quotactl:2:::::
-○:LDP man-pages:3.41:2009/02/23:read:2:2005/10/15::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/10:readahead:2:2005/02/27::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/10/02:readdir:2:1997/02/23::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
-○:LDP man-pages:3.41:2011/09/20:readlink:2:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/04:readlinkat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/11/17:readv:2:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/10/31:reboot:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2011/09/16:recv:2:2008/12/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2011/09/16:recvfrom:2:recv:2:
-×:LDP man-pages:3.41:2012/05/02:recvmmsg:2:::::
-@:LDP man-pages:3.41:2011/09/16:recvmsg:2:recv:2:
-○:LDP man-pages:3.41:2008/04/22:remap_file_pages:2:2005/10/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2001/12/01:removexattr:2:2003/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2009/03/30:rename:2:2007/05/04::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/04:renameat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-×:LDP man-pages:3.41:2010/02/25:request_key:2:::::
-○:LDP man-pages:3.41:2008/05/08:rmdir:2:2006/07/26::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/04/26:rt_sigaction:2:sigaction:2:
-@:LDP man-pages:3.41:2008/10/04:rt_sigpending:2:sigpending:2:
-@:LDP man-pages:3.41:2012/04/15:rt_sigprocmask:2:sigprocmask:2:
-×:LDP man-pages:3.41:2011/09/18:rt_sigqueueinfo:2:::::
-@:LDP man-pages:3.41:2008/06/26:rt_sigreturn:2:sigreturn:2:
-@:LDP man-pages:3.41:2005/09/15:rt_sigsuspend:2:sigsuspend:2:
-@:LDP man-pages:3.41:2011/10/03:rt_sigtimedwait:2:sigtimedwait:2:
-※:LDP man-pages:3.41:2011/09/18:rt_tgsigqueueinfo:2:rt_sigqueueinfo:2:
-@:LDP man-pages:3.41:2010/09/20:sbrk:2:brk:2:
-○:LDP man-pages:3.41:2006/03/23:sched_get_priority_max:2:2006/04/14::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2006/03/23:sched_get_priority_min:2:sched_get_priority_max:2:
-@:LDP man-pages:3.41:2010/11/06:sched_getaffinity:2:sched_setaffinity:2:
-@:LDP man-pages:3.41:2006/03/23:sched_getparam:2:sched_setparam:2:
-@:LDP man-pages:3.41:2011/09/19:sched_getscheduler:2:sched_setscheduler:2:
-○:LDP man-pages:3.41:2011/10/16:sched_rr_get_interval:2:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/11/06:sched_setaffinity:2:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2006/03/23:sched_setparam:2:2006/04/14::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2011/09/19:sched_setscheduler:2:2012/06/04::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/10/18:sched_yield:2:1997/02/23::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
-@:LDP man-pages:3.41:2007/07/05:security:2:unimplemented:2:
-○:LDP man-pages:3.41:2012/05/02:select:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/06/10:select_tut:2:2009/03/09::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2009/09/27:semctl:2:2005/10/11::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2004/05/27:semget:2:2006/07/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/10:semop:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/05/10:semtimedop:2:semop:2:
-○:LDP man-pages:3.41:2012/04/23:send:2:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2011/09/14:sendfile:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2011/09/14:sendfile64:2:sendfile:2:
-×:LDP man-pages:3.41:2012/02/27:sendmmsg:2:::::
-@:LDP man-pages:3.41:2012/04/23:sendmsg:2:send:2:
-@:LDP man-pages:3.41:2012/04/23:sendto:2:send:2:
-○:LDP man-pages:3.41:2008/08/15:set_mempolicy:2:2008/11/20::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-※:LDP man-pages:3.41:2012/05/03:set_robust_list:2:get_robust_list:2:
-○:LDP man-pages:3.41:2008/11/27:set_thread_area:2:2003/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2004/09/10:set_tid_address:2:2005/02/14::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2009/03/15:setcontext:2:getcontext:2:
-@:LDP man-pages:3.41:2009/09/27:setdomainname:2:getdomainname:2:
-@:LDP man-pages:3.41:2009/10/17:setegid:2:seteuid:2:
-○:LDP man-pages:3.41:2009/10/17:seteuid:2:2010/04/25::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/11/22:setfsgid:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/11/22:setfsgid32:2:setfsgid:2:
-○:LDP man-pages:3.41:2010/11/22:setfsuid:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/11/22:setfsuid32:2:setfsuid:2:
-○:LDP man-pages:3.41:2010/11/22:setgid:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/11/22:setgid32:2:setgid:2:
-@:LDP man-pages:3.41:2010/11/22:setgroups:2:getgroups:2:
-@:LDP man-pages:3.41:2010/11/22:setgroups32:2:setgroups:2:
-@:LDP man-pages:3.41:2010/09/20:sethostid:2:gethostid:3:
-@:LDP man-pages:3.41:2010/09/26:sethostname:2:gethostname:2:
-@:LDP man-pages:3.41:2009/03/15:setitimer:2:getitimer:2:
-○:LDP man-pages:3.41:2012/05/04:setns:2:2012/06/04::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/26:setpgid:2:2010/04/25::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/26:setpgrp:2:setpgid:2:
-@:LDP man-pages:3.41:2008/05/29:setpriority:2:getpriority:2:
-@:LDP man-pages:3.41:2010/11/22:setregid:2:setreuid:2:
-@:LDP man-pages:3.41:2010/11/22:setregid32:2:setregid:2:
-@:LDP man-pages:3.41:2010/11/22:setresgid:2:setresuid:2:
-@:LDP man-pages:3.41:2010/11/22:setresgid32:2:setresgid:2:
-○:LDP man-pages:3.41:2010/11/22:setresuid:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/11/22:setresuid32:2:setresuid:2:
-○:LDP man-pages:3.41:2010/11/22:setreuid:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/11/22:setreuid32:2:setreuid:2:
-@:LDP man-pages:3.41:2011/09/10:setrlimit:2:getrlimit:2:
-○:LDP man-pages:3.41:2008/12/03:setsid:2:2005/03/15::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2008/12/03:setsockopt:2:getsockopt:2:
-@:LDP man-pages:3.41:2012/04/26:settimeofday:2:gettimeofday:2:
-○:LDP man-pages:3.41:2010/11/22:setuid:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/11/22:setuid32:2:setuid:2:
-○:LDP man-pages:3.41:2008/12/03:setup:2:2008/07/24::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:2001/12/31:setxattr:2:2003/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2007/07/05:sgetmask:2:2007/10/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/06/03:shmat:2:shmop:2:
-○:LDP man-pages:3.41:2008/08/07:shmctl:2:2006/07/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/06/03:shmdt:2:shmop:2:
-○:LDP man-pages:3.41:2006/05/02:shmget:2:2006/07/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/06/03:shmop:2:2006/04/14::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/12/03:shutdown:2:2001/11/09::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:2012/04/26:sigaction:2:2012/05/26::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/26:sigaltstack:2:2006/01/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/05:signal:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2009/01/13:signalfd:2:2009/03/09::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2009/01/13:signalfd4:2:signalfd:2:
-○:LDP man-pages:3.41:2008/10/04:sigpending:2:2005/12/05::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/04/15:sigprocmask:2:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/03/25:sigqueue:2:sigqueue:3:
-○:LDP man-pages:3.41:2008/06/26:sigreturn:2:2005/09/06::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2005/09/15:sigsuspend:2:2005/10/05::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/05/02:sigtimedwait:2:sigwaitinfo:2:
-○:LDP man-pages:3.41:2012/05/02:sigwaitinfo:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2009/01/19:socket:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2007/06/28:socketcall:2:1997/03/03::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
-○:LDP man-pages:3.41:2008/10/11:socketpair:2:2002/09/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/04:splice:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-×:LDP man-pages:3.41:2007/12/20:spu_create:2:::::
-○:LDP man-pages:3.41:2007/11/25:spu_run:2:2007/10/23::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2007/07/05:ssetmask:2:sgetmask:2:
-○:LDP man-pages:3.41:2012/05/07:stat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/05/07:stat64:2:stat:2:
-○:LDP man-pages:3.41:2010/11/21:statfs:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/11/21:statfs64:2:statfs:2:
-@:LDP man-pages:3.41:2003/08/22:statvfs:2:statvfs:3:
-○:LDP man-pages:3.41:2010/02/25:stime:2:2003/09/14::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:2007/07/05:stty:2:unimplemented:2:
-×:LDP man-pages:3.41:2010/10/30:subpage_prot:2:::::
-@:LDP man-pages:3.41:2010/11/15:swapoff:2:swapon:2:
-○:LDP man-pages:3.41:2010/11/15:swapon:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:symlink:2:2005/03/15::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2012/05/04:symlinkat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/04:sync:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/10/09:sync_file_range:2:2012/05/26::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/10/09:sync_file_range2:2:sync_file_range:2:
-@:LDP man-pages:3.41:2012/05/04:syncfs:2:sync:2:
-○:LDP man-pages:3.41:2007/07/26:syscall:2:2002/08/20::ysato@h4.dion.ne.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2012/03/23:syscalls:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/11/20:sysctl:2:1999/12/03::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
-○:LDP man-pages:3.41:2010/06/27:sysfs:2:2001/06/02::ysato@h4.dion.ne.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2012/05/05:sysinfo:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/05:syslog:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/04:tee:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2011/09/18:tgkill:2:tkill:2:
-○:LDP man-pages:3.41:2011/09/09:time:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-×:LDP man-pages:3.41:2010/09/27:timer_create:2:::::
-×:LDP man-pages:3.41:2009/02/20:timer_delete:2:::::
-×:LDP man-pages:3.41:2009/02/20:timer_getoverrun:2:::::
-※:LDP man-pages:3.41:2009/02/20:timer_gettime:2:timer_settime:2:
-×:LDP man-pages:3.41:2009/02/20:timer_settime:2:::::
-○:LDP man-pages:3.41:2011/09/14:timerfd_create:2:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2011/09/14:timerfd_gettime:2:timerfd_create:2:
-@:LDP man-pages:3.41:2011/09/14:timerfd_settime:2:timerfd_create:2:
-○:LDP man-pages:3.41:2012/04/16:times:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2011/09/18:tkill:2:2005/03/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2011/09/08:truncate:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2011/09/08:truncate64:2:truncate:2:
-@:LDP man-pages:3.41:2007/07/05:tuxcall:2:unimplemented:2:
-@:LDP man-pages:3.41:2011/09/10:ugetrlimit:2:getrlimit:2:
-○:LDP man-pages:3.41:2008/01/09:umask:2:2008/02/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/06/19:umount:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/06/19:umount2:2:umount:2:
-○:LDP man-pages:3.41:2008/12/03:uname:2:2002/02/14::ysato@h4.dion.ne.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2007/07/05:unimplemented:2:2003/03/06::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
-○:LDP man-pages:3.41:2011/09/15:unlink:2:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/04:unlinkat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/10/30:unshare:2:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2005/01/09:uselib:2:2005/04/21::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2003/08/04:ustat:2:2004/06/13::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2008/08/06:utime:2:2006/10/14::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-×:LDP man-pages:3.41:2012/03/25:utimensat:2:::::
-@:LDP man-pages:3.41:2008/08/06:utimes:2:utime:2:
-○:LDP man-pages:3.41:2012/02/08:vfork:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2007/07/26:vhangup:2:2005/03/15::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2009/02/20:vm86:2:2004/06/13::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2009/02/20:vm86old:2:vm86:2:
-○:LDP man-pages:3.41:2012/05/04:vmsplice:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2007/07/05:vserver:2:unimplemented:2:
-○:LDP man-pages:3.41:2010/09/26:wait:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:wait3:2:wait4:2:
-○:LDP man-pages:3.41:2010/09/20:wait4:2:2005/03/04::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/26:waitid:2:wait:2:
-@:LDP man-pages:3.41:2010/09/26:waitpid:2:wait:2:
-○:LDP man-pages:3.41:2010/08/29:write:2:2007/05/03::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/11/17:writev:2:readv:2:
-@:LDP man-pages:3.41:2007/12/28:CIRCLEQ_ENTRY:3:queue:3:
-@:LDP man-pages:3.41:2007/12/28:CIRCLEQ_HEAD:3:queue:3:
-@:LDP man-pages:3.41:2007/12/28:CIRCLEQ_INIT:3:queue:3:
-@:LDP man-pages:3.41:2007/12/28:CIRCLEQ_INSERT_AFTER:3:queue:3:
-@:LDP man-pages:3.41:2007/12/28:CIRCLEQ_INSERT_BEFORE:3:queue:3:
-@:LDP man-pages:3.41:2007/12/28:CIRCLEQ_INSERT_HEAD:3:queue:3:
-@:LDP man-pages:3.41:2007/12/28:CIRCLEQ_INSERT_TAIL:3:queue:3:
-@:LDP man-pages:3.41:2007/12/28:CIRCLEQ_REMOVE:3:queue:3:
-@:LDP man-pages:3.41:2008/11/20:CMSG_ALIGN:3:cmsg:3:
-@:LDP man-pages:3.41:2008/11/20:CMSG_FIRSTHDR:3:cmsg:3:
-@:LDP man-pages:3.41:2008/11/20:CMSG_NXTHDR:3:cmsg:3:
-@:LDP man-pages:3.41:2008/11/20:CMSG_SPACE:3:cmsg:3:
-@:LDP man-pages:3.41:2012/03/15:CPU_ALLOC:3:CPU_SET:3:
-@:LDP man-pages:3.41:2012/03/15:CPU_ALLOC_SIZE:3:CPU_SET:3:
-@:LDP man-pages:3.41:2012/03/15:CPU_AND:3:CPU_SET:3:
-@:LDP man-pages:3.41:2012/03/15:CPU_AND_S:3:CPU_SET:3:
-@:LDP man-pages:3.41:2012/03/15:CPU_CLR:3:CPU_SET:3:
-@:LDP man-pages:3.41:2012/03/15:CPU_CLR_S:3:CPU_SET:3:
-@:LDP man-pages:3.41:2012/03/15:CPU_COUNT:3:CPU_SET:3:
-@:LDP man-pages:3.41:2012/03/15:CPU_COUNT_S:3:CPU_SET:3:
-@:LDP man-pages:3.41:2012/03/15:CPU_EQUAL:3:CPU_SET:3:
-@:LDP man-pages:3.41:2012/03/15:CPU_EQUAL_S:3:CPU_SET:3:
-@:LDP man-pages:3.41:2012/03/15:CPU_FREE:3:CPU_SET:3:
-@:LDP man-pages:3.41:2012/03/15:CPU_ISSET:3:CPU_SET:3:
-@:LDP man-pages:3.41:2012/03/15:CPU_ISSET_S:3:CPU_SET:3:
-@:LDP man-pages:3.41:2012/03/15:CPU_OR:3:CPU_SET:3:
-@:LDP man-pages:3.41:2012/03/15:CPU_OR_S:3:CPU_SET:3:
-○:LDP man-pages:3.41:2012/03/15:CPU_SET:3:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/03/15:CPU_SET_S:3:CPU_SET:3:
-@:LDP man-pages:3.41:2012/03/15:CPU_XOR:3:CPU_SET:3:
-@:LDP man-pages:3.41:2012/03/15:CPU_XOR_S:3:CPU_SET:3:
-@:LDP man-pages:3.41:2012/03/15:CPU_ZERO:3:CPU_SET:3:
-@:LDP man-pages:3.41:2012/03/15:CPU_ZERO_S:3:CPU_SET:3:
-@:LDP man-pages:3.41:2007/05/18:DES_FAILED:3:des_crypt:3:
-@:LDP man-pages:3.41:2012/05/02:FD_CLR:3:select:2:
-@:LDP man-pages:3.41:2012/05/02:FD_ISSET:3:select:2:
-@:LDP man-pages:3.41:2012/05/02:FD_SET:3:select:2:
-@:LDP man-pages:3.41:2012/05/02:FD_ZERO:3:select:2:
-@:LDP man-pages:3.41:2007/07/26:HUGE_VAL:3:INFINITY:3:
-@:LDP man-pages:3.41:2007/07/26:HUGE_VALF:3:INFINITY:3:
-@:LDP man-pages:3.41:2007/07/26:HUGE_VALL:3:INFINITY:3:
-○:LDP man-pages:3.41:2007/07/26:INFINITY:3:2005/02/14::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2007/12/28:LIST_ENTRY:3:queue:3:
-@:LDP man-pages:3.41:2007/12/28:LIST_HEAD:3:queue:3:
-@:LDP man-pages:3.41:2007/12/28:LIST_INIT:3:queue:3:
-@:LDP man-pages:3.41:2007/12/28:LIST_INSERT_AFTER:3:queue:3:
-@:LDP man-pages:3.41:2007/12/28:LIST_INSERT_HEAD:3:queue:3:
-@:LDP man-pages:3.41:2007/12/28:LIST_REMOVE:3:queue:3:
-○:LDP man-pages:3.41:1999/07/04:MB_CUR_MAX:3:1999/09/11::cz8cb01@linux.or.jp:HAYAKAWA Hitoshi:
-○:LDP man-pages:3.41:1999/07/04:MB_LEN_MAX:3:1999/09/11::cz8cb01@linux.or.jp:HAYAKAWA Hitoshi:
-@:LDP man-pages:3.41:2007/07/26:NAN:3:INFINITY:3:
-@:LDP man-pages:3.41:2007/12/28:TAILQ_ENTRY:3:queue:3:
-@:LDP man-pages:3.41:2007/12/28:TAILQ_HEAD:3:queue:3:
-@:LDP man-pages:3.41:2007/12/28:TAILQ_INIT:3:queue:3:
-@:LDP man-pages:3.41:2007/12/28:TAILQ_INSERT_AFTER:3:queue:3:
-@:LDP man-pages:3.41:2007/12/28:TAILQ_INSERT_HEAD:3:queue:3:
-@:LDP man-pages:3.41:2007/12/28:TAILQ_INSERT_TAIL:3:queue:3:
-@:LDP man-pages:3.41:2007/12/28:TAILQ_REMOVE:3:queue:3:
-@:LDP man-pages:3.41:2001/12/16:__fbufsize:3:stdio_ext:3:
-@:LDP man-pages:3.41:2001/12/16:__flbf:3:stdio_ext:3:
-@:LDP man-pages:3.41:2001/12/16:__fpending:3:stdio_ext:3:
-@:LDP man-pages:3.41:2001/12/15:__fpurge:3:fpurge:3:
-@:LDP man-pages:3.41:2001/12/16:__freadable:3:stdio_ext:3:
-@:LDP man-pages:3.41:2001/12/16:__freading:3:stdio_ext:3:
-@:LDP man-pages:3.41:2001/12/16:__fsetlocking:3:stdio_ext:3:
-@:LDP man-pages:3.41:2001/12/16:__fwritable:3:stdio_ext:3:
-@:LDP man-pages:3.41:2001/12/16:__fwriting:3:stdio_ext:3:
-@:LDP man-pages:3.41:2010/10/13:__malloc_hook:3:malloc_hook:3:
-○:LDP man-pages:3.41:1997/03/08:__setfpucw:3:2000/09/20::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-@:LDP man-pages:3.41:2001/12/16:_flushlbf:3:stdio_ext:3:
-○:LDP man-pages:3.41:2010/09/20:a64l:3:2004/01/17::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2007/12/15:abort:3:1998/02/18::tyoshino@eng.toyo.ac.jp:Takashi Yoshino:
-○:LDP man-pages:3.41:2010/09/20:abs:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:acos:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:acosf:3:acos:3:
-○:LDP man-pages:3.41:2010/09/20:acosh:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:acoshf:3:acosh:3:
-@:LDP man-pages:3.41:2010/09/20:acoshl:3:acosh:3:
-@:LDP man-pages:3.41:2010/09/20:acosl:3:acos:3:
-@:LDP man-pages:3.41:2009/09/15:addmntent:3:getmntent:3:
-○:LDP man-pages:3.41:2008/06/14:addseverity:3:2004/07/18::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2008/06/22:adjtime:3:2006/07/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/08:aio_cancel:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/08:aio_error:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/08:aio_fsync:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/04/26:aio_init:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/08:aio_read:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/08:aio_return:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/08:aio_suspend:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/08:aio_write:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/03/23:aligned_alloc:3:posix_memalign:3:
-○:LDP man-pages:3.41:2008/01/24:alloca:3:2002/09/19::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2012/04/26:alphasort:3:scandir:3:
-@:LDP man-pages:3.41:2007/05/18:argz:3:argz_add:3:
-○:LDP man-pages:3.41:2007/05/18:argz_add:3:2003/03/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2007/05/18:argz_add_sep:3:argz_add:3:
-@:LDP man-pages:3.41:2007/05/18:argz_append:3:argz_add:3:
-@:LDP man-pages:3.41:2007/05/18:argz_count:3:argz_add:3:
-@:LDP man-pages:3.41:2007/05/18:argz_create:3:argz_add:3:
-@:LDP man-pages:3.41:2007/05/18:argz_create_sep:3:argz_add:3:
-@:LDP man-pages:3.41:2007/05/18:argz_delete:3:argz_add:3:
-@:LDP man-pages:3.41:2007/05/18:argz_extract:3:argz_add:3:
-@:LDP man-pages:3.41:2007/05/18:argz_insert:3:argz_add:3:
-@:LDP man-pages:3.41:2007/05/18:argz_next:3:argz_add:3:
-@:LDP man-pages:3.41:2007/05/18:argz_replace:3:argz_add:3:
-@:LDP man-pages:3.41:2007/05/18:argz_stringify:3:argz_add:3:
-@:LDP man-pages:3.41:2010/02/25:asctime:3:ctime:3:
-@:LDP man-pages:3.41:2010/02/25:asctime_r:3:ctime:3:
-○:LDP man-pages:3.41:2010/09/20:asin:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:asinf:3:asin:3:
-○:LDP man-pages:3.41:2010/09/20:asinh:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:asinhf:3:asinh:3:
-@:LDP man-pages:3.41:2010/09/20:asinhl:3:asinh:3:
-@:LDP man-pages:3.41:2010/09/20:asinl:3:asin:3:
-○:LDP man-pages:3.41:2001/12/18:asprintf:3:2002/01/14::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:2002/08/25:assert:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:2002/08/25:assert_perror:3:2003/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:atan:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:atan2:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:atan2f:3:atan2:3:
-@:LDP man-pages:3.41:2010/09/20:atan2l:3:atan2:3:
-@:LDP man-pages:3.41:2010/09/20:atanf:3:atan:3:
-○:LDP man-pages:3.41:2010/09/11:atanh:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/11:atanhf:3:atanh:3:
-@:LDP man-pages:3.41:2010/09/11:atanhl:3:atanh:3:
-@:LDP man-pages:3.41:2010/09/20:atanl:3:atan:3:
-○:LDP man-pages:3.41:2008/12/05:atexit:3:2009/01/15::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:1993/03/29:atof:3:1998/02/18::tyoshino@eng.toyo.ac.jp:Takashi Yoshino:
-○:LDP man-pages:3.41:2010/09/20:atoi:3:2001/02/09::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:2010/09/20:atol:3:atoi:3:
-@:LDP man-pages:3.41:2010/09/20:atoll:3:atoi:3:
-@:LDP man-pages:3.41:2010/09/20:atoq:3:atoi:3:
-@:LDP man-pages:3.41:2008/07/17:auth_destroy:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:authnone_create:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:authunix_create:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:authunix_create_default:3:rpc:3:
-○:LDP man-pages:3.41:2008/06/14:backtrace:3:2007/10/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/06/14:backtrace_symbols:3:backtrace:3:
-@:LDP man-pages:3.41:2008/06/14:backtrace_symbols_fd:3:backtrace:3:
-○:LDP man-pages:3.41:2009/03/30:basename:3:2007/05/03::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/08/06:bcmp:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:2009/03/15:bcopy:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:2010/09/10:be16toh:3:endian:3:
-@:LDP man-pages:3.41:2010/09/10:be32toh:3:endian:3:
-@:LDP man-pages:3.41:2010/09/10:be64toh:3:endian:3:
-○:LDP man-pages:3.41:2008/12/03:bindresvport:3:2007/06/13::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2009/03/15:bsd_signal:3:2007/06/03::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2003/11/01:bsearch:3:2005/02/26::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2004/12/26:bstring:3:2003/11/13::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:2011/09/22:btowc:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/04/23:btree:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2009/01/15:byteorder:3:2005/11/04::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/08/06:bzero:3:2003/03/14::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2007/12/26:cabs:3:2003/07/23::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2007/12/26:cabsf:3:cabs:3:
-@:LDP man-pages:3.41:2007/12/26:cabsl:3:cabs:3:
-○:LDP man-pages:3.41:2011/09/15:cacos:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2011/09/15:cacosf:3:cacos:3:
-○:LDP man-pages:3.41:2011/09/15:cacosh:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2011/09/15:cacoshf:3:cacosh:3:
-@:LDP man-pages:3.41:2011/09/15:cacoshl:3:cacosh:3:
-@:LDP man-pages:3.41:2011/09/15:cacosl:3:cacos:3:
-@:LDP man-pages:3.41:2012/05/10:calloc:3:malloc:3:
-@:LDP man-pages:3.41:2008/07/17:callrpc:3:rpc:3:
-○:LDP man-pages:3.41:2005/07/14:canonicalize_file_name:3:2005/09/06::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/08/11:carg:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/08/11:cargf:3:carg:3:
-@:LDP man-pages:3.41:2008/08/11:cargl:3:carg:3:
-○:LDP man-pages:3.41:2008/08/11:casin:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/08/11:casinf:3:casin:3:
-○:LDP man-pages:3.41:2008/08/11:casinh:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/08/11:casinhf:3:casinh:3:
-@:LDP man-pages:3.41:2008/08/11:casinhl:3:casinh:3:
-@:LDP man-pages:3.41:2008/08/11:casinl:3:casin:3:
-○:LDP man-pages:3.41:2011/09/15:catan:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2011/09/15:catanf:3:catan:3:
-○:LDP man-pages:3.41:2011/09/15:catanh:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2011/09/15:catanhf:3:catanh:3:
-@:LDP man-pages:3.41:2011/09/15:catanhl:3:catanh:3:
-@:LDP man-pages:3.41:2011/09/15:catanl:3:catan:3:
-@:LDP man-pages:3.41:2001/12/14:catclose:3:catopen:3:
-○:LDP man-pages:3.41:1998/08/09:catgets:3:1999/03/01::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:2001/12/14:catopen:3:2002/01/14::ysato@h4.dion.ne.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2007/05/18:cbc_crypt:3:des_crypt:3:
-○:LDP man-pages:3.41:2010/09/20:cbrt:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:cbrtf:3:cbrt:3:
-@:LDP man-pages:3.41:2010/09/20:cbrtl:3:cbrt:3:
-○:LDP man-pages:3.41:2008/08/11:ccos:3:2003/07/28::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/08/11:ccosf:3:ccos:3:
-○:LDP man-pages:3.41:2008/08/11:ccosh:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/08/11:ccoshf:3:ccosh:3:
-@:LDP man-pages:3.41:2008/08/11:ccoshl:3:ccosh:3:
-@:LDP man-pages:3.41:2008/08/11:ccosl:3:ccos:3:
-○:LDP man-pages:3.41:2010/09/20:ceil:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:ceilf:3:ceil:3:
-@:LDP man-pages:3.41:2010/09/20:ceill:3:ceil:3:
-○:LDP man-pages:3.41:2010/09/12:cerf:3:2005/02/26::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/12:cerfc:3:cerf:3:
-@:LDP man-pages:3.41:2010/09/12:cerfcf:3:cerf:3:
-@:LDP man-pages:3.41:2010/09/12:cerfcl:3:cerf:3:
-@:LDP man-pages:3.41:2010/09/12:cerff:3:cerf:3:
-@:LDP man-pages:3.41:2010/09/12:cerfl:3:cerf:3:
-○:LDP man-pages:3.41:2008/08/11:cexp:3:2003/08/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2002/07/28:cexp2:3:2005/03/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2002/07/28:cexp2f:3:cexp2:3:
-@:LDP man-pages:3.41:2002/07/28:cexp2l:3:cexp2:3:
-@:LDP man-pages:3.41:2008/08/11:cexpf:3:cexp:3:
-@:LDP man-pages:3.41:2008/08/11:cexpl:3:cexp:3:
-@:LDP man-pages:3.41:2011/09/08:cfgetispeed:3:termios:3:
-@:LDP man-pages:3.41:2011/09/08:cfgetospeed:3:termios:3:
-@:LDP man-pages:3.41:2011/09/08:cfmakeraw:3:termios:3:
-○:LDP man-pages:3.41:2007/07/26:cfree:3:2004/08/14::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2011/09/08:cfsetispeed:3:termios:3:
-@:LDP man-pages:3.41:2011/09/08:cfsetospeed:3:termios:3:
-@:LDP man-pages:3.41:2011/09/08:cfsetspeed:3:termios:3:
-○:LDP man-pages:3.41:2007/12/23:cimag:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2007/12/23:cimagf:3:cimag:3:
-@:LDP man-pages:3.41:2007/12/23:cimagl:3:cimag:3:
-○:LDP man-pages:3.41:2010/10/04:clearenv:3:2002/08/20::ysato@h4.dion.ne.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2008/08/29:clearerr:3:ferror:3:
-@:LDP man-pages:3.41:2008/08/29:clearerr_unlocked:3:unlocked_stdio:3:
-@:LDP man-pages:3.41:2008/07/17:clnt_broadcast:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:clnt_call:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:clnt_control:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:clnt_create:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:clnt_destroy:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:clnt_freeres:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:clnt_geterr:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:clnt_pcreateerror:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:clnt_perrno:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:clnt_perror:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:clnt_spcreateerror:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:clnt_sperrno:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:clnt_sperror:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:clntraw_create:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:clnttcp_create:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:clntudp_bufcreate:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:clntudp_create:3:rpc:3:
-○:LDP man-pages:3.41:2008/08/28:clock:3:2007/06/01::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-×:LDP man-pages:3.41:2010/09/10:clock_getcpuclockid:3:::::
-@:LDP man-pages:3.41:2012/04/30:clock_getres:3:clock_getres:2:
-@:LDP man-pages:3.41:2012/04/30:clock_gettime:3:clock_getres:2:
-@:LDP man-pages:3.41:2012/04/30:clock_settime:3:clock_getres:2:
-○:LDP man-pages:3.41:2008/08/11:clog:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/08/11:clog10:3:2007/01/07::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/08/11:clog10f:3:clog10:3:
-@:LDP man-pages:3.41:2008/08/11:clog10l:3:clog10:3:
-○:LDP man-pages:3.41:2002/07/28:clog2:3:2007/01/07::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2002/07/28:clog2f:3:clog2:3:
-@:LDP man-pages:3.41:2002/07/28:clog2l:3:clog2:3:
-@:LDP man-pages:3.41:2008/08/11:clogf:3:clog:3:
-@:LDP man-pages:3.41:2008/08/11:clogl:3:clog:3:
-○:LDP man-pages:3.41:2008/09/23:closedir:3:2005/03/15::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2012/04/30:closelog:3:syslog:3:
-○:LDP man-pages:3.41:2008/11/20:cmsg:3:1999/08/17::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:2012/05/10:confstr:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/08/11:conj:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/08/11:conjf:3:conj:3:
-@:LDP man-pages:3.41:2008/08/11:conjl:3:conj:3:
-○:LDP man-pages:3.41:2012/03/25:copysign:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/03/25:copysignf:3:copysign:3:
-@:LDP man-pages:3.41:2012/03/25:copysignl:3:copysign:3:
-○:LDP man-pages:3.41:2010/09/11:cos:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/11:cosf:3:cos:3:
-○:LDP man-pages:3.41:2010/09/20:cosh:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:coshf:3:cosh:3:
-@:LDP man-pages:3.41:2010/09/20:coshl:3:cosh:3:
-@:LDP man-pages:3.41:2010/09/11:cosl:3:cos:3:
-○:LDP man-pages:3.41:2002/07/28:cpow:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2002/07/28:cpowf:3:cpow:3:
-@:LDP man-pages:3.41:2002/07/28:cpowl:3:cpow:3:
-○:LDP man-pages:3.41:2010/06/10:cproj:3:2005/03/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/06/10:cprojf:3:cproj:3:
-@:LDP man-pages:3.41:2010/06/10:cprojl:3:cproj:3:
-○:LDP man-pages:3.41:2007/12/26:creal:3:2003/07/28::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2007/12/26:crealf:3:creal:3:
-@:LDP man-pages:3.41:2007/12/26:creall:3:creal:3:
-○:LDP man-pages:3.41:2011/09/15:crypt:3:2008/10/08::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:2011/09/15:crypt_r:3:crypt:3:
-○:LDP man-pages:3.41:2008/08/11:csin:3:2003/07/28::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/08/11:csinf:3:csin:3:
-○:LDP man-pages:3.41:2008/08/11:csinh:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/08/11:csinhf:3:csinh:3:
-@:LDP man-pages:3.41:2008/08/11:csinhl:3:csinh:3:
-@:LDP man-pages:3.41:2008/08/11:csinl:3:csin:3:
-○:LDP man-pages:3.41:2008/08/11:csqrt:3:2003/08/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/08/11:csqrtf:3:csqrt:3:
-@:LDP man-pages:3.41:2008/08/11:csqrtl:3:csqrt:3:
-○:LDP man-pages:3.41:2008/08/11:ctan:3:2005/02/21::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/08/11:ctanf:3:ctan:3:
-○:LDP man-pages:3.41:2008/08/11:ctanh:3:2005/02/21::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/08/11:ctanhf:3:ctanh:3:
-@:LDP man-pages:3.41:2008/08/11:ctanhl:3:ctanh:3:
-@:LDP man-pages:3.41:2008/08/11:ctanl:3:ctan:3:
-○:LDP man-pages:3.41:2007/07/26:ctermid:3:1997/2/10::nagoya@cc.hit-u.ac.jp:NAGOYA Hiroaki:
-○:LDP man-pages:3.41:2010/02/25:ctime:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/02/25:ctime_r:3:ctime:3:
-@:LDP man-pages:3.41:2008/06/29:cuserid:3:getlogin:3:
-○:LDP man-pages:3.41:2009/12/05:daemon:3:2002/01/14::ysato@h4.dion.ne.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2012/03/25:daylight:3:tzset:3:
-@:LDP man-pages:3.41:2012/05/04:db:3:dbopen:3:
-○:LDP man-pages:3.41:2012/05/04:dbopen:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2007/05/18:des_crypt:3:2004/08/14::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2007/05/18:des_setparity:3:des_crypt:3:
-○:LDP man-pages:3.41:2010/02/25:difftime:3:2006/07/20::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/26:dirfd:3:2003/10/15::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2009/03/30:dirname:3:basename:3:
-○:LDP man-pages:3.41:2012/04/17:div:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2007/05/18:dl_iterate_phdr:3:2005/02/14::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2008/12/06:dladdr:3:dlopen:3:
-@:LDP man-pages:3.41:2008/12/06:dlclose:3:dlopen:3:
-@:LDP man-pages:3.41:2008/12/06:dlerror:3:dlopen:3:
-○:LDP man-pages:3.41:2008/12/06:dlopen:3:2009/03/09::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/12/06:dlsym:3:dlopen:3:
-@:LDP man-pages:3.41:2008/12/06:dlvsym:3:dlopen:3:
-@:LDP man-pages:3.41:2012/04/23:dn_comp:3:resolver:3:
-@:LDP man-pages:3.41:2012/04/23:dn_expand:3:resolver:3:
-○:LDP man-pages:3.41:2010/09/15:dprintf:3:2002/01/14::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:2007/07/26:drand48:3:1997/01/20::tyoshino@eng.toyo.ac.jp:YOSHINO Takashi:
-○:LDP man-pages:3.41:2007/07/26:drand48_r:3:2005/02/14::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2010/09/20:drem:3:remainder:3:
-@:LDP man-pages:3.41:2010/09/20:dremf:3:remainder:3:
-@:LDP man-pages:3.41:2010/09/20:dreml:3:remainder:3:
-○:LDP man-pages:3.41:2010/09/22:dysize:3:2002/01/06::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-@:LDP man-pages:3.41:2010/11/01:eaccess:3:euidaccess:3:
-@:LDP man-pages:3.41:2007/05/18:ecb_crypt:3:des_crypt:3:
-○:LDP man-pages:3.41:2010/09/20:ecvt:3:2009/05/14::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:2007/07/26:ecvt_r:3:2002/09/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/07/17:edata:3:end:3:
-○:LDP man-pages:3.41:2003/04/04:encrypt:3:2004/02/06::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2003/04/04:encrypt_r:3:encrypt:3:
-○:LDP man-pages:3.41:2008/07/17:end:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2003/09/09:endaliasent:3:setaliasent:3:
-@:LDP man-pages:3.41:2002/02/28:endfsent:3:getfsent:3:
-@:LDP man-pages:3.41:2010/10/21:endgrent:3:getgrent:3:
-@:LDP man-pages:3.41:2010/10/04:endhostent:3:gethostbyname:3:
-○:LDP man-pages:3.41:2010/09/10:endian:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2009/09/15:endmntent:3:getmntent:3:
-@:LDP man-pages:3.41:2008/08/19:endnetent:3:getnetent:3:
-@:LDP man-pages:3.41:2007/07/26:endnetgrent:3:setnetgrent:3:
-@:LDP man-pages:3.41:2008/08/19:endprotoent:3:getprotoent:3:
-@:LDP man-pages:3.41:2010/10/21:endpwent:3:getpwent:3:
-@:LDP man-pages:3.41:2008/08/19:endrpcent:3:getrpcent:3:
-@:LDP man-pages:3.41:2008/08/19:endservent:3:getservent:3:
-@:LDP man-pages:3.41:2010/02/25:endspent:3:getspnam:3:
-@:LDP man-pages:3.41:2002/07/18:endttyent:3:getttyent:3:
-@:LDP man-pages:3.41:2007/07/26:endusershell:3:getusershell:3:
-@:LDP man-pages:3.41:2008/06/29:endutent:3:getutent:3:
-@:LDP man-pages:3.41:2008/06/29:endutxent:3:getutent:3:
-@:LDP man-pages:3.41:2007/05/18:envz:3:envz_add:3:
-○:LDP man-pages:3.41:2007/05/18:envz_add:3:2003/03/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2007/05/18:envz_entry:3:envz_add:3:
-@:LDP man-pages:3.41:2007/05/18:envz_get:3:envz_add:3:
-@:LDP man-pages:3.41:2007/05/18:envz_merge:3:envz_add:3:
-@:LDP man-pages:3.41:2007/05/18:envz_remove:3:envz_add:3:
-@:LDP man-pages:3.41:2007/05/18:envz_strip:3:envz_add:3:
-@:LDP man-pages:3.41:2007/07/26:erand48:3:drand48:3:
-@:LDP man-pages:3.41:2007/07/26:erand48_r:3:drand48_r:3:
-○:LDP man-pages:3.41:2010/09/20:erf:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:erfc:3:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:erfcf:3:erfc:3:
-@:LDP man-pages:3.41:2010/09/20:erfcl:3:erfc:3:
-@:LDP man-pages:3.41:2010/09/20:erff:3:erf:3:
-@:LDP man-pages:3.41:2010/09/20:erfl:3:erf:3:
-○:LDP man-pages:3.41:2012/03/15:err:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/07/09:errno:3:2006/07/26::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/08/29:error:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/08/29:error_at_line:3:error:3:
-@:LDP man-pages:3.41:2010/08/29:error_message_count:3:error:3:
-@:LDP man-pages:3.41:2010/08/29:error_one_per_line:3:error:3:
-@:LDP man-pages:3.41:2010/08/29:error_print_progname:3:error:3:
-@:LDP man-pages:3.41:2012/03/15:errx:3:err:3:
-@:LDP man-pages:3.41:2008/07/17:etext:3:end:3:
-○:LDP man-pages:3.41:2002/07/20:ether_aton:3:2002/09/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2002/07/20:ether_aton_r:3:ether_aton:3:
-@:LDP man-pages:3.41:2002/07/20:ether_hostton:3:ether_aton:3:
-@:LDP man-pages:3.41:2002/07/20:ether_line:3:ether_aton:3:
-@:LDP man-pages:3.41:2002/07/20:ether_ntoa:3:ether_aton:3:
-@:LDP man-pages:3.41:2002/07/20:ether_ntoa_r:3:ether_aton:3:
-@:LDP man-pages:3.41:2002/07/20:ether_ntohost:3:ether_aton:3:
-○:LDP man-pages:3.41:2010/11/01:euidaccess:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/08/30:eventfd_read:3:eventfd:2:
-@:LDP man-pages:3.41:2010/08/30:eventfd_write:3:eventfd:2:
-○:LDP man-pages:3.41:2010/09/25:exec:3:2005/03/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/25:execl:3:exec:3:
-@:LDP man-pages:3.41:2010/09/25:execle:3:exec:3:
-@:LDP man-pages:3.41:2010/09/25:execlp:3:exec:3:
-@:LDP man-pages:3.41:2010/09/25:execv:3:exec:3:
-@:LDP man-pages:3.41:2010/09/25:execvp:3:exec:3:
-@:LDP man-pages:3.41:2010/09/25:execvpe:3:exec:3:
-○:LDP man-pages:3.41:2009/09/20:exit:3:2007/06/18::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:exp:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/08/11:exp10:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/08/11:exp10f:3:exp10:3:
-@:LDP man-pages:3.41:2008/08/11:exp10l:3:exp10:3:
-○:LDP man-pages:3.41:2010/09/20:exp2:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:exp2f:3:exp2:3:
-@:LDP man-pages:3.41:2010/09/20:exp2l:3:exp2:3:
-@:LDP man-pages:3.41:2010/09/20:expf:3:exp:3:
-@:LDP man-pages:3.41:2010/09/20:expl:3:exp:3:
-○:LDP man-pages:3.41:2010/09/12:expm1:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/12:expm1f:3:expm1:3:
-@:LDP man-pages:3.41:2010/09/12:expm1l:3:expm1:3:
-○:LDP man-pages:3.41:2010/09/20:fabs:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:fabsf:3:fabs:3:
-@:LDP man-pages:3.41:2010/09/20:fabsl:3:fabs:3:
-○:LDP man-pages:3.41:2009/02/23:fclose:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2006/12/27:fcloseall:3:2007/05/04::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:fcvt:3:ecvt:3:
-@:LDP man-pages:3.41:2007/07/26:fcvt_r:3:ecvt_r:3:
-○:LDP man-pages:3.41:2010/09/20:fdim:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:fdimf:3:fdim:3:
-@:LDP man-pages:3.41:2010/09/20:fdiml:3:fdim:3:
-@:LDP man-pages:3.41:2012/04/22:fdopen:3:fopen:3:
-@:LDP man-pages:3.41:2010/06/20:fdopendir:3:opendir:3:
-@:LDP man-pages:3.41:2010/10/31:feclearexcept:3:fenv:3:
-@:LDP man-pages:3.41:2010/10/31:fedisableexcept:3:fenv:3:
-@:LDP man-pages:3.41:2010/10/31:feenableexcept:3:fenv:3:
-@:LDP man-pages:3.41:2010/10/31:fegetenv:3:fenv:3:
-@:LDP man-pages:3.41:2010/10/31:fegetexcept:3:fenv:3:
-@:LDP man-pages:3.41:2010/10/31:fegetexceptflag:3:fenv:3:
-@:LDP man-pages:3.41:2010/10/31:fegetround:3:fenv:3:
-@:LDP man-pages:3.41:2010/10/31:feholdexcept:3:fenv:3:
-○:LDP man-pages:3.41:2010/10/31:fenv:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/08/29:feof:3:ferror:3:
-@:LDP man-pages:3.41:2008/08/29:feof_unlocked:3:unlocked_stdio:3:
-@:LDP man-pages:3.41:2010/10/31:feraiseexcept:3:fenv:3:
-○:LDP man-pages:3.41:2008/08/29:ferror:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:2008/08/29:ferror_unlocked:3:unlocked_stdio:3:
-@:LDP man-pages:3.41:2010/10/31:fesetenv:3:fenv:3:
-@:LDP man-pages:3.41:2010/10/31:fesetexceptflag:3:fenv:3:
-@:LDP man-pages:3.41:2010/10/31:fesetround:3:fenv:3:
-@:LDP man-pages:3.41:2010/10/31:fetestexcept:3:fenv:3:
-@:LDP man-pages:3.41:2010/10/31:feupdateenv:3:fenv:3:
-○:LDP man-pages:3.41:2010/09/15:fexecve:3:2009/03/09::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2009/09/06:fflush:3:2001/11/09::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:2008/08/29:fflush_unlocked:3:unlocked_stdio:3:
-○:LDP man-pages:3.41:2010/09/20:ffs:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:2010/09/20:ffsl:3:ffs:3:
-@:LDP man-pages:3.41:2010/09/20:ffsll:3:ffs:3:
-@:LDP man-pages:3.41:2012/01/18:fgetc:3:gets:3:
-@:LDP man-pages:3.41:2008/08/29:fgetc_unlocked:3:unlocked_stdio:3:
-○:LDP man-pages:3.41:2008/07/10:fgetgrent:3:1997/12/19::nishi@rpts.cl.nec.co.jp:HIROFUMI Nishizuka:
-@:LDP man-pages:3.41:2010/10/21:fgetgrent_r:3:getgrent_r:3:
-@:LDP man-pages:3.41:1993/11/29:fgetpos:3:fseek:3:
-○:LDP man-pages:3.41:2008/07/10:fgetpwent:3:1997/12/18::nishi@rpts.cl.nec.co.jp:HIROFUMI Nishizuka:
-@:LDP man-pages:3.41:2010/10/21:fgetpwent_r:3:getpwent_r:3:
-@:LDP man-pages:3.41:2012/01/18:fgets:3:gets:3:
-@:LDP man-pages:3.41:2008/08/29:fgets_unlocked:3:unlocked_stdio:3:
-@:LDP man-pages:3.41:2010/02/25:fgetspent:3:getspnam:3:
-@:LDP man-pages:3.41:2010/02/25:fgetspent_r:3:getspnam:3:
-○:LDP man-pages:3.41:1999/07/25:fgetwc:3:2001/11/09::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:2008/08/29:fgetwc_unlocked:3:unlocked_stdio:3:
-○:LDP man-pages:3.41:2011/09/28:fgetws:3:2001/11/09::ysato@h4.dion.ne.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2008/08/29:fgetws_unlocked:3:unlocked_stdio:3:
-@:LDP man-pages:3.41:2008/08/29:fileno:3:ferror:3:
-@:LDP man-pages:3.41:2008/08/29:fileno_unlocked:3:unlocked_stdio:3:
-○:LDP man-pages:3.41:2008/08/05:finite:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/08/05:finitef:3:finite:3:
-@:LDP man-pages:3.41:2008/08/05:finitel:3:finite:3:
-○:LDP man-pages:3.41:2008/08/29:flockfile:3:2001/11/05::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:floor:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:floorf:3:floor:3:
-@:LDP man-pages:3.41:2010/09/20:floorl:3:floor:3:
-○:LDP man-pages:3.41:2010/09/20:fma:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:fmaf:3:fma:3:
-@:LDP man-pages:3.41:2010/09/20:fmal:3:fma:3:
-○:LDP man-pages:3.41:2010/09/20:fmax:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:fmaxf:3:fmax:3:
-@:LDP man-pages:3.41:2010/09/20:fmaxl:3:fmax:3:
-○:LDP man-pages:3.41:2012/04/28:fmemopen:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:fmin:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:fminf:3:fmin:3:
-@:LDP man-pages:3.41:2010/09/20:fminl:3:fmin:3:
-○:LDP man-pages:3.41:2012/03/15:fmod:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/03/15:fmodf:3:fmod:3:
-@:LDP man-pages:3.41:2012/03/15:fmodl:3:fmod:3:
-○:LDP man-pages:3.41:2008/06/14:fmtmsg:3:2004/08/14::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2000/10/15:fnmatch:3:2006/03/06::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/04/22:fopen:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-×:LDP man-pages:3.41:2012/04/30:fopencookie:3:::::
-@:LDP man-pages:3.41:2010/06/13:forkpty:3:openpty:3:
-○:LDP man-pages:3.41:1993/04/04:fpathconf:3:1998/03/20::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:2010/09/20:fpclassify:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2011/09/28:fprintf:3:printf:3:
-○:LDP man-pages:3.41:2001/12/15:fpurge:3:2002/01/14::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-@:LDP man-pages:3.41:2011/09/28:fputc:3:puts:3:
-@:LDP man-pages:3.41:2008/08/29:fputc_unlocked:3:unlocked_stdio:3:
-@:LDP man-pages:3.41:2011/09/28:fputs:3:puts:3:
-@:LDP man-pages:3.41:2008/08/29:fputs_unlocked:3:unlocked_stdio:3:
-○:LDP man-pages:3.41:1999/07/25:fputwc:3:2001/11/09::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:2008/08/29:fputwc_unlocked:3:unlocked_stdio:3:
-○:LDP man-pages:3.41:2011/09/28:fputws:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:2008/08/29:fputws_unlocked:3:unlocked_stdio:3:
-○:LDP man-pages:3.41:2012/03/30:fread:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/08/29:fread_unlocked:3:unlocked_stdio:3:
-@:LDP man-pages:3.41:2012/05/10:free:3:malloc:3:
-@:LDP man-pages:3.41:2012/04/29:freeaddrinfo:3:getaddrinfo:3:
-@:LDP man-pages:3.41:2010/09/04:freehostent:3:getipnodebyname:3:
-※:LDP man-pages:3.41:2010/10/06:freeifaddrs:3:getifaddrs:3:
-@:LDP man-pages:3.41:2012/04/22:freopen:3:fopen:3:
-○:LDP man-pages:3.41:2010/09/20:frexp:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:frexpf:3:frexp:3:
-@:LDP man-pages:3.41:2010/09/20:frexpl:3:frexp:3:
-@:LDP man-pages:3.41:2011/09/28:fscanf:3:scanf:3:
-○:LDP man-pages:3.41:1993/11/29:fseek:3:1998/04/27::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:2001/11/05:fseeko:3:2006/01/18::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:1993/11/29:fsetpos:3:fseek:3:
-@:LDP man-pages:3.41:2003/08/22:fstatvfs:3:statvfs:3:
-@:LDP man-pages:3.41:1993/11/29:ftell:3:fseek:3:
-@:LDP man-pages:3.41:2001/11/05:ftello:3:fseeko:3:
-○:LDP man-pages:3.41:2010/02/25:ftime:3:2008/10/08::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:2001/11/28:ftok:3:2002/01/06::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-@:LDP man-pages:3.41:2008/08/29:ftrylockfile:3:flockfile:3:
-○:LDP man-pages:3.41:2007/12/28:fts:3:2000/09/05::sato@complex.eng.hokudai.ac.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2007/12/28:fts_children:3:fts:3:
-@:LDP man-pages:3.41:2007/12/28:fts_close:3:fts:3:
-@:LDP man-pages:3.41:2007/12/28:fts_open:3:fts:3:
-@:LDP man-pages:3.41:2007/12/28:fts_read:3:fts:3:
-@:LDP man-pages:3.41:2007/12/28:fts_set:3:fts:3:
-○:LDP man-pages:3.41:2010/09/20:ftw:3:2006/07/30::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/08/29:funlockfile:3:flockfile:3:
-※:LDP man-pages:3.41:2012/03/25:futimens:3:utimensat:2:
-○:LDP man-pages:3.41:2008/04/07:futimes:3:2006/07/31::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2011/09/17:fwide:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
-@:LDP man-pages:3.41:2011/09/17:fwprintf:3:wprintf:3:
-@:LDP man-pages:3.41:2012/03/30:fwrite:3:fread:3:
-@:LDP man-pages:3.41:2008/08/29:fwrite_unlocked:3:unlocked_stdio:3:
-※:LDP man-pages:3.41:2010/09/27:gai_cancel:3:getaddrinfo_a:3:
-※:LDP man-pages:3.41:2010/09/27:gai_error:3:getaddrinfo_a:3:
-@:LDP man-pages:3.41:2012/04/29:gai_strerror:3:getaddrinfo:3:
-※:LDP man-pages:3.41:2010/09/27:gai_suspend:3:getaddrinfo_a:3:
-○:LDP man-pages:3.41:2008/08/05:gamma:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/08/05:gammaf:3:gamma:3:
-@:LDP man-pages:3.41:2008/08/05:gammal:3:gamma:3:
-○:LDP man-pages:3.41:2010/09/20:gcvt:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:get_current_dir_name:3:getcwd:3:
-@:LDP man-pages:3.41:2008/07/17:get_myaddress:3:rpc:3:
-@:LDP man-pages:3.41:2012/03/20:get_nprocs:3:get_nprocs_conf:3:
-○:LDP man-pages:3.41:2012/03/20:get_nprocs_conf:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/04/29:getaddrinfo:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-×:LDP man-pages:3.41:2010/09/27:getaddrinfo_a:3:::::
-@:LDP man-pages:3.41:2003/09/09:getaliasbyname:3:setaliasent:3:
-@:LDP man-pages:3.41:2003/09/09:getaliasbyname_r:3:setaliasent:3:
-@:LDP man-pages:3.41:2003/09/09:getaliasent:3:setaliasent:3:
-@:LDP man-pages:3.41:2003/09/09:getaliasent_r:3:setaliasent:3:
-@:LDP man-pages:3.41:2012/01/18:getc:3:gets:3:
-@:LDP man-pages:3.41:2008/08/29:getc_unlocked:3:unlocked_stdio:3:
-@:LDP man-pages:3.41:2012/01/18:getchar:3:gets:3:
-@:LDP man-pages:3.41:2008/08/29:getchar_unlocked:3:unlocked_stdio:3:
-○:LDP man-pages:3.41:2010/09/20:getcwd:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:2010/09/20:getdate:3:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:getdate_err:3:getdate:3:
-@:LDP man-pages:3.41:2010/09/20:getdate_r:3:getdate:3:
-@:LDP man-pages:3.41:2010/06/12:getdelim:3:getline:3:
-○:LDP man-pages:3.41:2007/07/26:getdirentries:3:1998/04/30::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:2008/03/17:getenv:3:2003/09/28::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:2002/02/28:getfsent:3:2002/08/07::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-@:LDP man-pages:3.41:2002/02/28:getfsfile:3:getfsent:3:
-@:LDP man-pages:3.41:2002/02/28:getfsspec:3:getfsent:3:
-○:LDP man-pages:3.41:2010/10/21:getgrent:3:2005/09/06::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/10/21:getgrent_r:3:2004/08/14::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2012/04/23:getgrgid:3:getgrnam:3:
-@:LDP man-pages:3.41:2012/04/23:getgrgid_r:3:getgrnam:3:
-○:LDP man-pages:3.41:2012/04/23:getgrnam:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/04/23:getgrnam_r:3:getgrnam:3:
-○:LDP man-pages:3.41:2008/07/03:getgrouplist:3:2008/08/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/10/04:gethostbyaddr:3:gethostbyname:3:
-@:LDP man-pages:3.41:2010/10/04:gethostbyaddr_r:3:gethostbyname:3:
-○:LDP man-pages:3.41:2010/10/04:gethostbyname:3:2007/06/13::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/10/04:gethostbyname2:3:gethostbyname:3:
-@:LDP man-pages:3.41:2010/10/04:gethostbyname2_r:3:gethostbyname:3:
-@:LDP man-pages:3.41:2010/10/04:gethostbyname_r:3:gethostbyname:3:
-@:LDP man-pages:3.41:2010/10/04:gethostent:3:gethostbyname:3:
-@:LDP man-pages:3.41:2010/10/04:gethostent_r:3:gethostbyname:3:
-○:LDP man-pages:3.41:2010/09/20:gethostid:3:2009/01/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-×:LDP man-pages:3.41:2010/10/06:getifaddrs:3:::::
-@:LDP man-pages:3.41:2010/09/04:getipnodebyaddr:3:getipnodebyname:3:
-○:LDP man-pages:3.41:2010/09/04:getipnodebyname:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:2010/06/12:getline:3:2010/04/25::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2007/12/08:getloadavg:3:2002/01/21::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:2008/06/29:getlogin:3:2005/03/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/06/29:getlogin_r:3:getlogin:3:
-○:LDP man-pages:3.41:2009/09/15:getmntent:3:2005/03/18::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2009/09/15:getmntent_r:3:getmntent:3:
-○:LDP man-pages:3.41:2009/12/03:getnameinfo:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/08/19:getnetbyaddr:3:getnetent:3:
-@:LDP man-pages:3.41:2010/09/10:getnetbyaddr_r:3:getnetent_r:3:
-@:LDP man-pages:3.41:2008/08/19:getnetbyname:3:getnetent:3:
-@:LDP man-pages:3.41:2010/09/10:getnetbyname_r:3:getnetent_r:3:
-○:LDP man-pages:3.41:2008/08/19:getnetent:3:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/10:getnetent_r:3:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2007/07/26:getnetgrent:3:setnetgrent:3:
-@:LDP man-pages:3.41:2007/07/26:getnetgrent_r:3:setnetgrent:3:
-○:LDP man-pages:3.41:2010/11/01:getopt:3:2008/08/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/11/01:getopt_long:3:getopt:3:
-@:LDP man-pages:3.41:2010/11/01:getopt_long_only:3:getopt:3:
-○:LDP man-pages:3.41:2010/09/20:getpass:3:2001/02/14::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-@:LDP man-pages:3.41:2008/08/19:getprotobyname:3:getprotoent:3:
-@:LDP man-pages:3.41:2010/09/10:getprotobyname_r:3:getprotoent_r:3:
-@:LDP man-pages:3.41:2008/08/19:getprotobynumber:3:getprotoent:3:
-@:LDP man-pages:3.41:2010/09/10:getprotobynumber_r:3:getprotoent_r:3:
-○:LDP man-pages:3.41:2008/08/19:getprotoent:3:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/10:getprotoent_r:3:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/10:getpt:3:2003/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/10/21:getpw:3:2008/10/08::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:2010/10/21:getpwent:3:2005/09/06::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/10/21:getpwent_r:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/04/23:getpwnam:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/04/23:getpwnam_r:3:getpwnam:3:
-@:LDP man-pages:3.41:2012/04/23:getpwuid:3:getpwnam:3:
-@:LDP man-pages:3.41:2012/04/23:getpwuid_r:3:getpwnam:3:
-@:LDP man-pages:3.41:2008/08/19:getrpcbyname:3:getrpcent:3:
-@:LDP man-pages:3.41:2010/09/10:getrpcbyname_r:3:getrpcent_r:3:
-@:LDP man-pages:3.41:2008/08/19:getrpcbynumber:3:getrpcent:3:
-@:LDP man-pages:3.41:2010/09/10:getrpcbynumber_r:3:getrpcent_r:3:
-○:LDP man-pages:3.41:2008/08/19:getrpcent:3:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/10:getrpcent_r:3:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:1987/10/06:getrpcport:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
-○:LDP man-pages:3.41:2012/01/18:gets:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/08/19:getservbyname:3:getservent:3:
-@:LDP man-pages:3.41:2010/09/10:getservbyname_r:3:getservent_r:3:
-@:LDP man-pages:3.41:2008/08/19:getservbyport:3:getservent:3:
-@:LDP man-pages:3.41:2010/09/10:getservbyport_r:3:getservent_r:3:
-○:LDP man-pages:3.41:2008/08/19:getservent:3:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/10:getservent_r:3:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/02/25:getspent:3:getspnam:3:
-@:LDP man-pages:3.41:2010/02/25:getspent_r:3:getspnam:3:
-○:LDP man-pages:3.41:2010/02/25:getspnam:3:2005/09/06::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/02/25:getspnam_r:3:getspnam:3:
-○:LDP man-pages:3.41:2010/09/26:getsubopt:3:2007/06/03::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2002/07/18:getttyent:3:2004/09/14::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2002/07/18:getttynam:3:getttyent:3:
-○:LDP man-pages:3.41:2010/09/10:getumask:3:2003/02/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2007/07/26:getusershell:3:1998/02/05::ishioka@dad.eec.toshiba.co.jp:ISHIOKA Takashi:
-○:LDP man-pages:3.41:2008/06/29:getutent:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/06/29:getutent_r:3:getutent:3:
-@:LDP man-pages:3.41:2008/06/29:getutid:3:getutent:3:
-@:LDP man-pages:3.41:2008/06/29:getutid_r:3:getutent:3:
-@:LDP man-pages:3.41:2008/06/29:getutline:3:getutent:3:
-@:LDP man-pages:3.41:2008/06/29:getutline_r:3:getutent:3:
-○:LDP man-pages:3.41:2010/09/10:getutmp:3:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/10:getutmpx:3:getutmp:3:
-@:LDP man-pages:3.41:2008/06/29:getutxent:3:getutent:3:
-@:LDP man-pages:3.41:2008/06/29:getutxid:3:getutent:3:
-@:LDP man-pages:3.41:2008/06/29:getutxline:3:getutent:3:
-○:LDP man-pages:3.41:2010/09/26:getw:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:1999/07/25:getwc:3:fgetwc:3:
-@:LDP man-pages:3.41:2008/08/29:getwc_unlocked:3:unlocked_stdio:3:
-○:LDP man-pages:3.41:1999/07/25:getwchar:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:2008/08/29:getwchar_unlocked:3:unlocked_stdio:3:
-@:LDP man-pages:3.41:2010/09/20:getwd:3:getcwd:3:
-○:LDP man-pages:3.41:2007/10/10:glob:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:2007/10/10:globfree:3:glob:3:
-@:LDP man-pages:3.41:2010/02/25:gmtime:3:ctime:3:
-@:LDP man-pages:3.41:2010/02/25:gmtime_r:3:ctime:3:
-@:LDP man-pages:3.41:2012/05/10:gnu_dev_major:3:makedev:3:
-@:LDP man-pages:3.41:2012/05/10:gnu_dev_makedev:3:makedev:3:
-@:LDP man-pages:3.41:2012/05/10:gnu_dev_minor:3:makedev:3:
-@:LDP man-pages:3.41:2010/09/10:gnu_get_libc_release:3:gnu_get_libc_version:3:
-○:LDP man-pages:3.41:2010/09/10:gnu_get_libc_version:3:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/06/14:grantpt:3:2003/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2007/07/26:gsignal:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/10/04:h_errno:3:gethostbyname:3:
-○:LDP man-pages:3.41:2012/04/23:hash:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2009/09/15:hasmntopt:3:getmntent:3:
-@:LDP man-pages:3.41:2011/09/10:hcreate:3:hsearch:3:
-@:LDP man-pages:3.41:2011/09/10:hcreate_r:3:hsearch:3:
-@:LDP man-pages:3.41:2011/09/10:hdestroy:3:hsearch:3:
-@:LDP man-pages:3.41:2011/09/10:hdestroy_r:3:hsearch:3:
-@:LDP man-pages:3.41:2010/10/04:herror:3:gethostbyname:3:
-○:LDP man-pages:3.41:2011/09/10:hsearch:3:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2011/09/10:hsearch_r:3:hsearch:3:
-@:LDP man-pages:3.41:2010/10/04:hstrerror:3:gethostbyname:3:
-@:LDP man-pages:3.41:2010/09/10:htobe16:3:endian:3:
-@:LDP man-pages:3.41:2010/09/10:htobe32:3:endian:3:
-@:LDP man-pages:3.41:2010/09/10:htobe64:3:endian:3:
-@:LDP man-pages:3.41:2010/09/10:htole16:3:endian:3:
-@:LDP man-pages:3.41:2010/09/10:htole32:3:endian:3:
-@:LDP man-pages:3.41:2010/09/10:htole64:3:endian:3:
-@:LDP man-pages:3.41:2009/01/15:htonl:3:byteorder:3:
-@:LDP man-pages:3.41:2009/01/15:htons:3:byteorder:3:
-○:LDP man-pages:3.41:2010/09/20:hypot:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:hypotf:3:hypot:3:
-@:LDP man-pages:3.41:2010/09/20:hypotl:3:hypot:3:
-○:LDP man-pages:3.41:2012/05/10:iconv:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/08/11:iconv_close:3:2000/07/11::sato@complex.eng.hokudai.ac.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2008/08/11:iconv_open:3:2007/06/01::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:ilogb:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:ilogbf:3:ilogb:3:
-@:LDP man-pages:3.41:2010/09/20:ilogbl:3:ilogb:3:
-@:LDP man-pages:3.41:2010/09/20:imaxabs:3:abs:3:
-@:LDP man-pages:3.41:2012/04/17:imaxdiv:3:div:3:
-○:LDP man-pages:3.41:2011/09/21:index:3:1997/12/12::nishi@rpts.cl.nec.co.jp:HIROFUMI Nishizuka:
-○:LDP man-pages:3.41:2008/06/19:inet:3:2008/08/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/06/19:inet_addr:3:inet:3:
-@:LDP man-pages:3.41:2008/06/19:inet_aton:3:inet:3:
-@:LDP man-pages:3.41:2008/06/19:inet_lnaof:3:inet:3:
-@:LDP man-pages:3.41:2008/06/19:inet_makeaddr:3:inet_addr:3:
-@:LDP man-pages:3.41:2008/06/19:inet_netof:3:inet:3:
-@:LDP man-pages:3.41:2008/06/19:inet_network:3:inet:3:
-@:LDP man-pages:3.41:2008/06/19:inet_ntoa:3:inet:3:
-○:LDP man-pages:3.41:2008/11/11:inet_ntop:3:2008/08/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/06/18:inet_pton:3:2008/08/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:1993/06/02:infnan:3:2005/03/15::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2007/07/26:initgroups:3:2005/02/26::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:initstate:3:random:3:
-@:LDP man-pages:3.41:2008/03/07:initstate_r:3:random_r:3:
-@:LDP man-pages:3.41:2007/07/26:innetgr:3:setnetgrent:3:
-○:LDP man-pages:3.41:2010/09/09:insque:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/11/11:intro:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/04/23:iruserok:3:rcmd:3:
-@:LDP man-pages:3.41:2012/04/23:iruserok_af:3:rcmd:3:
-@:LDP man-pages:3.41:2010/09/20:isalnum:3:isalpha:3:
-○:LDP man-pages:3.41:2010/09/20:isalpha:3:2007/05/03::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:isascii:3:isalpha:3:
-○:LDP man-pages:3.41:2008/12/03:isatty:3:1997/2/10::nagoya@cc.hit-u.ac.jp:NAGOYA Hiroaki:
-@:LDP man-pages:3.41:2010/09/20:isblank:3:isalpha:3:
-@:LDP man-pages:3.41:2010/09/20:iscntrl:3:isalpha:3:
-@:LDP man-pages:3.41:2010/09/20:isdigit:3:isalpha:3:
-@:LDP man-pages:3.41:2010/09/20:isfinite:3:fpclassify:3:
-@:LDP man-pages:3.41:2010/09/20:isgraph:3:isalpha:3:
-○:LDP man-pages:3.41:2012/05/06:isgreater:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/05/06:isgreaterequal:3:isgreater:3:
-@:LDP man-pages:3.41:2010/09/20:isinf:3:fpclassify:3:
-@:LDP man-pages:3.41:2008/08/05:isinff:3:finite:3:
-@:LDP man-pages:3.41:2008/08/05:isinfl:3:finite:3:
-@:LDP man-pages:3.41:2012/05/06:isless:3:isgreater:3:
-@:LDP man-pages:3.41:2012/05/06:islessequal:3:isgreater:3:
-@:LDP man-pages:3.41:2012/05/06:islessgreater:3:isgreater:3:
-@:LDP man-pages:3.41:2010/09/20:islower:3:isalpha:3:
-@:LDP man-pages:3.41:2010/09/20:isnan:3:fpclassify:3:
-@:LDP man-pages:3.41:2008/08/05:isnanf:3:finite:3:
-@:LDP man-pages:3.41:2008/08/05:isnanl:3:finite:3:
-@:LDP man-pages:3.41:2010/09/20:isnormal:3:fpclassify:3:
-@:LDP man-pages:3.41:2010/09/20:isprint:3:isalpha:3:
-@:LDP man-pages:3.41:2010/09/20:ispunct:3:isalpha:3:
-@:LDP man-pages:3.41:2010/09/20:isspace:3:isalpha:3:
-@:LDP man-pages:3.41:2012/05/06:isunordered:3:isgreater:3:
-@:LDP man-pages:3.41:2010/09/20:isupper:3:isalpha:3:
-○:LDP man-pages:3.41:1999/07/25:iswalnum:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:1999/07/25:iswalpha:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:2010/09/20:iswblank:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:1999/07/25:iswcntrl:3:1999/09/12::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:1999/07/25:iswctype:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:1999/07/25:iswdigit:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:1999/07/25:iswgraph:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:1999/07/25:iswlower:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:1999/07/25:iswprint:3:1999/09/12::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:1999/07/25:iswpunct:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:1999/07/25:iswspace:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:1999/07/25:iswupper:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:1999/07/25:iswxdigit:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:2010/09/20:isxdigit:3:isalpha:3:
-○:LDP man-pages:3.41:2010/09/20:j0:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:j0f:3:j0:3:
-@:LDP man-pages:3.41:2010/09/20:j0l:3:j0:3:
-@:LDP man-pages:3.41:2010/09/20:j1:3:j0:3:
-@:LDP man-pages:3.41:2010/09/20:j1f:3:j0:3:
-@:LDP man-pages:3.41:2010/09/20:j1l:3:j0:3:
-@:LDP man-pages:3.41:2010/09/20:jn:3:j0:3:
-@:LDP man-pages:3.41:2010/09/20:jnf:3:j0:3:
-@:LDP man-pages:3.41:2010/09/20:jnl:3:j0:3:
-@:LDP man-pages:3.41:2007/07/26:jrand48:3:drand48:3:
-@:LDP man-pages:3.41:2007/07/26:jrand48_r:3:drand48_r:3:
-@:LDP man-pages:3.41:2002/07/18:key_decryptsession:3:key_setsecret:3:
-@:LDP man-pages:3.41:2002/07/18:key_encryptsession:3:key_setsecret:3:
-@:LDP man-pages:3.41:2002/07/18:key_gendes:3:key_setsecret:3:
-@:LDP man-pages:3.41:2002/07/18:key_secretkey_is_set:3:key_setsecret:3:
-○:LDP man-pages:3.41:2002/07/18:key_setsecret:3:2003/02/01::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/05/05:klogctl:3:syslog:2:
-@:LDP man-pages:3.41:2010/09/20:l64a:3:a64l:3:
-@:LDP man-pages:3.41:2010/09/20:labs:3:abs:3:
-@:LDP man-pages:3.41:2010/02/25:lckpwdf:3:getspnam:3:
-@:LDP man-pages:3.41:2007/07/26:lcong48:3:drand48:3:
-@:LDP man-pages:3.41:2007/07/26:lcong48_r:3:drand48_r:3:
-○:LDP man-pages:3.41:2010/09/20:ldexp:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:ldexpf:3:ldexp:3:
-@:LDP man-pages:3.41:2010/09/20:ldexpl:3:ldexp:3:
-@:LDP man-pages:3.41:2012/04/17:ldiv:3:div:3:
-@:LDP man-pages:3.41:2010/09/10:le16toh:3:endian:3:
-@:LDP man-pages:3.41:2010/09/10:le32toh:3:endian:3:
-@:LDP man-pages:3.41:2010/09/10:le64toh:3:endian:3:
-@:LDP man-pages:3.41:1999/09/27:lfind:3:lsearch:3:
-○:LDP man-pages:3.41:2010/09/11:lgamma:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/11:lgamma_r:3:lgamma:3:
-@:LDP man-pages:3.41:2010/09/11:lgammaf:3:lgamma:3:
-@:LDP man-pages:3.41:2010/09/11:lgammaf_r:3:lgamma:3:
-@:LDP man-pages:3.41:2010/09/11:lgammal:3:lgamma:3:
-@:LDP man-pages:3.41:2010/09/11:lgammal_r:3:lgamma:3:
-○:LDP man-pages:3.41:2012/05/08:lio_listio:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:llabs:3:abs:3:
-@:LDP man-pages:3.41:2012/04/17:lldiv:3:div:3:
-@:LDP man-pages:3.41:2010/09/20:llrint:3:lrint:3:
-@:LDP man-pages:3.41:2010/09/20:llrintf:3:lrint:3:
-@:LDP man-pages:3.41:2010/09/20:llrintl:3:lrint:3:
-@:LDP man-pages:3.41:2010/09/20:llround:3:lround:3:
-@:LDP man-pages:3.41:2010/09/20:llroundf:3:lround:3:
-@:LDP man-pages:3.41:2010/09/20:llroundl:3:lround:3:
-○:LDP man-pages:3.41:1993/04/25:localeconv:3:1998/05/25::tyoshino@eng.toyo.ac.jp:Takashi Yoshino:
-@:LDP man-pages:3.41:2010/02/25:localtime:3:ctime:3:
-@:LDP man-pages:3.41:2010/02/25:localtime_r:3:ctime:3:
-○:LDP man-pages:3.41:2011/09/11:lockf:3:2010/04/25::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:log:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:log10:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:log10f:3:log10:3:
-@:LDP man-pages:3.41:2010/09/20:log10l:3:log10:3:
-○:LDP man-pages:3.41:2010/09/20:log1p:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:log1pf:3:log1p:3:
-@:LDP man-pages:3.41:2010/09/20:log1pl:3:log1p:3:
-○:LDP man-pages:3.41:2010/09/12:log2:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/12:log2f:3:log2:3:
-@:LDP man-pages:3.41:2010/09/12:log2l:3:log2:3:
-○:LDP man-pages:3.41:2010/09/20:logb:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:logbf:3:logb:3:
-@:LDP man-pages:3.41:2010/09/20:logbl:3:logb:3:
-@:LDP man-pages:3.41:2010/09/20:logf:3:log:3:
-○:LDP man-pages:3.41:2004/05/06:login:3:2005/02/14::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2010/06/13:login_tty:3:openpty:3:
-@:LDP man-pages:3.41:2010/09/20:logl:3:log:3:
-@:LDP man-pages:3.41:2004/05/06:logout:3:login:3:
-@:LDP man-pages:3.41:2008/07/02:logwtmp:3:updwtmp:3:
-○:LDP man-pages:3.41:2009/01/13:longjmp:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2007/07/26:lrand48:3:drand48:3:
-@:LDP man-pages:3.41:2007/07/26:lrand48_r:3:drand48_r:3:
-○:LDP man-pages:3.41:2010/09/20:lrint:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:lrintf:3:lrint:3:
-@:LDP man-pages:3.41:2010/09/20:lrintl:3:lrint:3:
-○:LDP man-pages:3.41:2010/09/20:lround:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:lroundf:3:lround:3:
-@:LDP man-pages:3.41:2010/09/20:lroundl:3:lround:3:
-○:LDP man-pages:3.41:1999/09/27:lsearch:3:2005/03/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2004/12/11:lseek64:3:2005/02/14::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2008/04/07:lutimes:3:futimes:3:
-@:LDP man-pages:3.41:2012/05/10:major:3:makedev:3:
-○:LDP man-pages:3.41:2009/03/31:makecontext:3:2008/12/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/10:makedev:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-×:LDP man-pages:3.41:2012/05/06:mallinfo:3:::::
-○:LDP man-pages:3.41:2012/05/10:malloc:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-×:LDP man-pages:3.41:2012/05/04:malloc_get_state:3:::::
-○:LDP man-pages:3.41:2010/10/13:malloc_hook:3:2012/05/26::amotoki@gmail.com:Akihiro MOTOKI:
-×:LDP man-pages:3.41:2012/04/28:malloc_info:3:::::
-※:LDP man-pages:3.41:2012/05/04:malloc_set_state:3:malloc_get_state:3:
-×:LDP man-pages:3.41:2012/05/06:malloc_stats:3:::::
-×:LDP man-pages:3.41:2012/03/29:malloc_trim:3:::::
-×:LDP man-pages:3.41:2012/03/29:malloc_usable_size:3:::::
-×:LDP man-pages:3.41:2012/04/30:mallopt:3:::::
-○:LDP man-pages:3.41:2010/09/10:matherr:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:1999/07/25:mblen:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
-○:LDP man-pages:3.41:1999/07/25:mbrlen:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
-○:LDP man-pages:3.41:2011/09/28:mbrtowc:3:2008/07/24::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:2000/11/20:mbsinit:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
-○:LDP man-pages:3.41:2011/10/01:mbsnrtowcs:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
-○:LDP man-pages:3.41:2011/09/28:mbsrtowcs:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
-○:LDP man-pages:3.41:2011/09/28:mbstowcs:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
-○:LDP man-pages:3.41:2011/09/28:mbtowc:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
-×:LDP man-pages:3.41:2012/04/18:mcheck:3:::::
-※:LDP man-pages:3.41:2012/04/18:mcheck_check_all:3:mcheck:3:
-※:LDP man-pages:3.41:2012/04/18:mcheck_pedantic:3:mcheck:3:
-@:LDP man-pages:3.41:2012/03/23:memalign:3:posix_memalign:3:
-○:LDP man-pages:3.41:2009/01/13:memccpy:3:1997/07/26::tyoshino@eng.toyo.ac.jp:Takashi Yoshino:
-○:LDP man-pages:3.41:2012/04/23:memchr:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2011/09/14:memcmp:3:1997/12/17::nishi@rpts.cl.nec.co.jp:HIROFUMI Nishizuka:
-○:LDP man-pages:3.41:2010/11/15:memcpy:3:1997/02/21::tyoshino@eng.toyo.ac.jp:Takashi Yoshino:
-○:LDP man-pages:3.41:2010/09/10:memfrob:3:1998/05/34::ishikawa@linux.or.jp:ISHIKAWA Mutsumi:
-○:LDP man-pages:3.41:2008/12/05:memmem:3:1997/12/17::tyoshino@eng.toyo.ac.jp:Takashi Yoshino:
-○:LDP man-pages:3.41:1993/04/10:memmove:3:2007/06/15::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/08/12:mempcpy:3:2004/09/14::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2012/04/23:memrchr:3:memchr:3:
-○:LDP man-pages:3.41:1993/04/11:memset:3:1997/02/21::tyoshino@eng.toyo.ac.jp:Takashi Yoshino:
-@:LDP man-pages:3.41:2012/05/10:minor:3:makedev:3:
-○:LDP man-pages:3.41:2010/09/26:mkdtemp:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/06/12:mkfifo:3:2008/10/08::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:2009/12/13:mkfifoat:3:2006/08/19::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2012/04/21:mkostemp:3:mkstemp:3:
-@:LDP man-pages:3.41:2012/04/21:mkostemps:3:mkstemp:3:
-○:LDP man-pages:3.41:2012/04/21:mkstemp:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/04/21:mkstemps:3:mkstemp:3:
-○:LDP man-pages:3.41:2010/09/20:mktemp:3:1999/04/10::tanisako@osa.dec.com:Kazuyuki Tanisako:
-@:LDP man-pages:3.41:2010/02/25:mktime:3:ctime:3:
-@:LDP man-pages:3.41:2012/04/16:mmap64:3:mmap:2:
-○:LDP man-pages:3.41:2010/09/20:modf:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:modff:3:modf:3:
-@:LDP man-pages:3.41:2010/09/20:modfl:3:modf:3:
-○:LDP man-pages:3.41:2012/04/26:mpool:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-※:LDP man-pages:3.41:2012/04/18:mprobe:3:mcheck:3:
-○:LDP man-pages:3.41:2010/08/29:mq_close:3:2006/04/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/08/29:mq_getattr:3:2006/04/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/10/04:mq_notify:3:2010/04/25::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2009/02/20:mq_open:3:2006/04/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:mq_receive:3:2006/04/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:mq_send:3:2006/04/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/08/29:mq_setattr:3:mq_getattr:3:
-@:LDP man-pages:3.41:2010/09/20:mq_timedreceive:3:mq_receive:3:
-@:LDP man-pages:3.41:2010/09/20:mq_timedsend:3:mq_send:3:
-○:LDP man-pages:3.41:2010/08/29:mq_unlink:3:2006/04/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2007/07/26:mrand48:3:drand48:3:
-@:LDP man-pages:3.41:2007/07/26:mrand48_r:3:drand48_r:3:
-×:LDP man-pages:3.41:2012/04/18:mtrace:3:::::
-※:LDP man-pages:3.41:2012/04/18:muntrace:3:mtrace:3:
-○:LDP man-pages:3.41:2010/09/20:nan:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:nanf:3:nan:3:
-@:LDP man-pages:3.41:2010/09/20:nanl:3:nan:3:
-@:LDP man-pages:3.41:2010/09/20:nearbyint:3:rint:3:
-@:LDP man-pages:3.41:2010/09/20:nearbyintf:3:rint:3:
-@:LDP man-pages:3.41:2010/09/20:nearbyintl:3:rint:3:
-○:LDP man-pages:3.41:1999/05/14:netlink:3:1999/08/20::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:2010/09/20:nextafter:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:nextafterf:3:nextafter:3:
-@:LDP man-pages:3.41:2010/09/20:nextafterl:3:nextafter:3:
-@:LDP man-pages:3.41:2010/09/20:nexttoward:3:nextafter:3:
-@:LDP man-pages:3.41:2010/09/20:nexttowardf:3:nextafter:3:
-@:LDP man-pages:3.41:2010/09/20:nexttowardl:3:nextafter:3:
-@:LDP man-pages:3.41:2010/09/20:nftw:3:ftw:3:
-○:LDP man-pages:3.41:2010/10/03:nl_langinfo:3:2001/07/15::KY4N-UCD@asahi-net.or.jp:UCHIDA Norihiro:
-@:LDP man-pages:3.41:2007/07/26:nrand48:3:drand48:3:
-@:LDP man-pages:3.41:2007/07/26:nrand48_r:3:drand48_r:3:
-@:LDP man-pages:3.41:2009/01/15:ntohl:3:byteorder:3:
-@:LDP man-pages:3.41:2009/01/15:ntohs:3:byteorder:3:
-○:LDP man-pages:3.41:2008/07/12:offsetof:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/12/05:on_exit:3:2009/01/15:o:amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/04/28:open_memstream:3:fmemopen:3:
-@:LDP man-pages:3.41:2012/04/28:open_wmemstream:3:fmemopen:3:
-○:LDP man-pages:3.41:2010/06/20:opendir:3:2007/10/14:o:amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/04/30:openlog:3:syslog:3:
-○:LDP man-pages:3.41:2010/06/13:openpty:3:2006/02/13::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/11/01:optarg:3:getopt:3:
-@:LDP man-pages:3.41:2010/11/01:opterr:3:getopt:3:
-@:LDP man-pages:3.41:2010/11/01:optind:3:getopt:3:
-@:LDP man-pages:3.41:2010/11/01:optopt:3:getopt:3:
-@:LDP man-pages:3.41:2003/04/04:passwd2des:3:xcrypt:3:
-@:LDP man-pages:3.41:1993/04/04:pathconf:3:fpathconf:3:
-@:LDP man-pages:3.41:2010/02/03:pclose:3:popen:3:
-○:LDP man-pages:3.41:2012/04/17:perror:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/07/17:pmap_getmaps:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:pmap_getport:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:pmap_rmtcall:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:pmap_set:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:pmap_unset:3:rpc:3:
-○:LDP man-pages:3.41:2010/02/03:popen:3:2008/11/09::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:posix_fallocate:3:2006/08/19::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2012/03/23:posix_memalign:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/04/20:posix_openpt:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/12:pow:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/08/11:pow10:3:2005/02/14::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2008/08/11:pow10f:3:pow10:3:
-@:LDP man-pages:3.41:2008/08/11:pow10l:3:pow10:3:
-@:LDP man-pages:3.41:2010/09/12:powf:3:pow:3:
-@:LDP man-pages:3.41:2010/09/12:powl:3:pow:3:
-○:LDP man-pages:3.41:2011/09/28:printf:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2007/07/26:profil:3:2005/03/15::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2006/04/29:program_invocation_name:3:2006/07/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2006/04/29:program_invocation_short_name:3:program_invocation_name:3:
-@:LDP man-pages:3.41:2010/10/06:psiginfo:3:psignal:3:
-○:LDP man-pages:3.41:2010/10/06:psignal:3:2012/05/26::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/11/11:pthread_attr_destroy:3:pthread_attr_init:3:
-@:LDP man-pages:3.41:2010/09/10:pthread_attr_getaffinity_np:3:pthread_attr_setaffinity_np:3:
-@:LDP man-pages:3.41:2010/02/03:pthread_attr_getdetachstate:3:pthread_attr_setdetachstate:3:
-@:LDP man-pages:3.41:2008/10/24:pthread_attr_getguardsize:3:pthread_attr_setguardsize:3:
-@:LDP man-pages:3.41:2012/03/15:pthread_attr_getinheritsched:3:pthread_attr_setinheritsched:3:
-@:LDP man-pages:3.41:2012/03/15:pthread_attr_getschedparam:3:pthread_attr_setschedparam:3:
-@:LDP man-pages:3.41:2010/02/03:pthread_attr_getschedpolicy:3:pthread_attr_setschedpolicy:3:
-@:LDP man-pages:3.41:2008/10/24:pthread_attr_getscope:3:pthread_attr_setscope:3:
-@:LDP man-pages:3.41:2008/10/24:pthread_attr_getstack:3:pthread_attr_setstack:3:
-@:LDP man-pages:3.41:2008/10/24:pthread_attr_getstackaddr:3:pthread_attr_setstackaddr:3:
-@:LDP man-pages:3.41:2012/03/15:pthread_attr_getstacksize:3:pthread_attr_setstacksize:3:
-○:LDP man-pages:3.41:2008/11/11:pthread_attr_init:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/10:pthread_attr_setaffinity_np:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/02/03:pthread_attr_setdetachstate:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/10/24:pthread_attr_setguardsize:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/03/15:pthread_attr_setinheritsched:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/03/15:pthread_attr_setschedparam:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/02/03:pthread_attr_setschedpolicy:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/10/24:pthread_attr_setscope:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/10/24:pthread_attr_setstack:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/10/24:pthread_attr_setstackaddr:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/03/15:pthread_attr_setstacksize:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/11/17:pthread_cancel:3:2012/05/01::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/11/24:pthread_cleanup_pop:3:pthread_cleanup_push:3:
-@:LDP man-pages:3.41:2008/12/04:pthread_cleanup_pop_restore_np:3:pthread_cleanup_push_defer_np:3:
-○:LDP man-pages:3.41:2008/11/24:pthread_cleanup_push:3:2012/06/04::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/12/04:pthread_cleanup_push_defer_np:3:2012/06/04::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/03/15:pthread_create:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/11/27:pthread_detach:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2009/03/30:pthread_equal:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2009/03/30:pthread_exit:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/10:pthread_getaffinity_np:3:pthread_setaffinity_np:3:
-○:LDP man-pages:3.41:2010/09/10:pthread_getattr_np:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2009/04/10:pthread_getconcurrency:3:pthread_setconcurrency:3:
-○:LDP man-pages:3.41:2009/02/08:pthread_getcpuclockid:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/11/17:pthread_getschedparam:3:pthread_setschedparam:3:
-○:LDP man-pages:3.41:2008/11/27:pthread_join:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2009/01/28:pthread_kill:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/09:pthread_kill_other_threads_np:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/10/24:pthread_self:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/10:pthread_setaffinity_np:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/11/24:pthread_setcancelstate:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/11/24:pthread_setcanceltype:3:pthread_setcancelstate:3:
-○:LDP man-pages:3.41:2009/04/10:pthread_setconcurrency:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/11/17:pthread_setschedparam:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/11/06:pthread_setschedprio:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2011/10/16:pthread_sigmask:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2011/09/23:pthread_sigqueue:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/04/14:pthread_testcancel:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/10:pthread_timedjoin_np:3:pthread_tryjoin_np:3:
-○:LDP man-pages:3.41:2010/09/10:pthread_tryjoin_np:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2009/04/10:pthread_yield:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/09/03:ptsname:3:2005/03/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/09/03:ptsname_r:3:ptsname:3:
-@:LDP man-pages:3.41:2011/09/28:putc:3:puts:3:
-@:LDP man-pages:3.41:2008/08/29:putc_unlocked:3:unlocked_stdio:3:
-@:LDP man-pages:3.41:2011/09/28:putchar:3:puts:3:
-@:LDP man-pages:3.41:2008/08/29:putchar_unlocked:3:unlocked_stdio:3:
-○:LDP man-pages:3.41:2007/07/26:putenv:3:2008/07/24::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:2003/09/09:putgrent:3:2004/09/14::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2007/07/26:putpwent:3:1997/12/18::nishi@rpts.cl.nec.co.jp:HIROFUMI Nishizuka:
-○:LDP man-pages:3.41:2011/09/28:puts:3:2008/07/24::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:2010/02/25:putspent:3:getspnam:3:
-@:LDP man-pages:3.41:2008/06/29:pututline:3:getutent:3:
-@:LDP man-pages:3.41:2008/06/29:pututxline:3:getutent:3:
-@:LDP man-pages:3.41:2010/09/26:putw:3:getw:3:
-@:LDP man-pages:3.41:1999/07/25:putwc:3:fputwc:3:
-@:LDP man-pages:3.41:2008/08/29:putwc_unlocked:3:unlocked_stdio:3:
-○:LDP man-pages:3.41:1999/07/25:putwchar:3:2001/11/09::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:2008/08/29:putwchar_unlocked:3:unlocked_stdio:3:
-@:LDP man-pages:3.41:2012/03/23:pvalloc:3:posix_memalign:3:
-○:LDP man-pages:3.41:2010/09/20:qecvt:3:2002/09/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2007/07/26:qecvt_r:3:ecvt_r:3:
-@:LDP man-pages:3.41:2010/09/20:qfcvt:3:qecvt:3:
-@:LDP man-pages:3.41:2007/07/26:qfcvt_r:3:ecvt_r:3:
-@:LDP man-pages:3.41:2010/09/20:qgcvt:3:qecvt:3:
-○:LDP man-pages:3.41:2012/03/08:qsort:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/03/08:qsort_r:3:qsort:3:
-○:LDP man-pages:3.41:2007/12/28:queue:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/04/20:raise:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/10/01:rand:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/10/01:rand_r:3:rand:3:
-○:LDP man-pages:3.41:2010/09/20:random:3:1997/01/21::tyoshino@eng.toyo.ac.jp:YOSHINO Takashi:
-○:LDP man-pages:3.41:2008/03/07:random_r:3:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/04/23:rawmemchr:3:memchr:3:
-○:LDP man-pages:3.41:2012/04/23:rcmd:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/04/23:rcmd_af:3:rcmd:3:
-○:LDP man-pages:3.41:1995/07/14:re_comp:3:1997/12/18::nishi@rpts.cl.nec.co.jp:HIROFUMI Nishizuka:
-@:LDP man-pages:3.41:1995/07/14:re_exec:3:re_comp:3:
-○:LDP man-pages:3.41:2010/09/10:readdir:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/10:readdir_r:3:readdir:3:
-@:LDP man-pages:3.41:2012/05/10:realloc:3:malloc:3:
-○:LDP man-pages:3.41:2012/05/05:realpath:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/04/23:recno:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2011/09/27:regcomp:3:regex:3:
-@:LDP man-pages:3.41:2011/09/27:regerror:3:regex:3:
-○:LDP man-pages:3.41:2011/09/27:regex:3:2005/03/15::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2011/09/27:regexec:3:regex:3:
-@:LDP man-pages:3.41:2011/09/27:regfree:3:regex:3:
-@:LDP man-pages:3.41:2008/07/17:registerrpc:3:rpc:3:
-○:LDP man-pages:3.41:2010/09/20:remainder:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:remainderf:3:remainder:3:
-@:LDP man-pages:3.41:2010/09/20:remainderl:3:remainder:3:
-○:LDP man-pages:3.41:2008/12/03:remove:3:2008/07/24::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:2010/09/09:remque:3:insque:3:
-○:LDP man-pages:3.41:2010/09/20:remquo:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:remquof:3:remquo:3:
-@:LDP man-pages:3.41:2010/09/20:remquol:3:remquo:3:
-@:LDP man-pages:3.41:2012/04/23:res_init:3:resolver:3:
-@:LDP man-pages:3.41:2012/04/23:res_mkquery:3:resolver:3:
-@:LDP man-pages:3.41:2012/04/23:res_query:3:resolver:3:
-@:LDP man-pages:3.41:2012/04/23:res_querydomain:3:resolver:3:
-@:LDP man-pages:3.41:2012/04/23:res_search:3:resolver:3:
-@:LDP man-pages:3.41:2012/04/23:res_send:3:resolver:3:
-○:LDP man-pages:3.41:2012/04/23:resolver:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:1993/11/29:rewind:3:fseek:3:
-○:LDP man-pages:3.41:1995/06/11:rewinddir:3:1997/12/24::nishi@rpts.cl.nec.co.jp:HIROFUMI Nishizuka:
-○:LDP man-pages:3.41:2012/04/23:rexec:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/04/23:rexec_af:3:rexec:3:
-@:LDP man-pages:3.41:2011/09/21:rindex:3:index:3:
-○:LDP man-pages:3.41:2010/09/20:rint:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:rintf:3:rint:3:
-@:LDP man-pages:3.41:2010/09/20:rintl:3:rint:3:
-○:LDP man-pages:3.41:2010/09/20:round:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:roundf:3:round:3:
-@:LDP man-pages:3.41:2010/09/20:roundl:3:round:3:
-○:LDP man-pages:3.41:2008/07/17:rpc:3:2001/11/09::ysato@h4.dion.ne.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2007/07/26:rpmatch:3:2006/07/31::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/04/23:rresvport:3:rcmd:3:
-@:LDP man-pages:3.41:2012/04/23:rresvport_af:3:rcmd:3:
-○:LDP man-pages:3.41:2010/02/25:rtime:3:2004/09/14::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2012/03/24:rtnetlink:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/04/23:ruserok:3:rcmd:3:
-@:LDP man-pages:3.41:2012/04/23:ruserok_af:3:rcmd:3:
-○:LDP man-pages:3.41:2010/09/20:scalb:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:scalbf:3:scalb:3:
-@:LDP man-pages:3.41:2010/09/20:scalbl:3:scalb:3:
-○:LDP man-pages:3.41:2010/09/20:scalbln:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:scalblnf:3:scalbln:3:
-@:LDP man-pages:3.41:2010/09/20:scalblnl:3:scalbln:3:
-@:LDP man-pages:3.41:2010/09/20:scalbn:3:scalbln:3:
-@:LDP man-pages:3.41:2010/09/20:scalbnf:3:scalbln:3:
-@:LDP man-pages:3.41:2010/09/20:scalbnl:3:scalbln:3:
-○:LDP man-pages:3.41:2012/04/26:scandir:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/03/17:scandirat:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2011/09/28:scanf:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/10/31:sched_getcpu:3:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2007/07/26:seed48:3:drand48:3:
-@:LDP man-pages:3.41:2007/07/26:seed48_r:3:drand48_r:3:
-○:LDP man-pages:3.41:2009/03/11:seekdir:3:1997/12/24::nishi@rpts.cl.nec.co.jp:HIROFUMI Nishizuka:
-○:LDP man-pages:3.41:2006/03/25:sem_close:3:2006/04/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2006/03/25:sem_destroy:3:2006/04/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2006/03/25:sem_getvalue:3:2006/04/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/07/27:sem_init:3:2006/04/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2009/02/20:sem_open:3:2009/03/09::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2009/03/30:sem_post:3:2006/04/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/02/12:sem_timedwait:3:sem_wait:3:
-@:LDP man-pages:3.41:2012/02/12:sem_trywait:3:sem_wait:3:
-○:LDP man-pages:3.41:2006/03/25:sem_unlink:3:2006/04/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/02/12:sem_wait:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2003/09/09:setaliasent:3:2004/09/14::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2008/06/26:setbuf:3:2001/07/14::ysato@h4.dion.ne.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2008/06/26:setbuffer:3:setbuf:3:
-○:LDP man-pages:3.41:2009/09/20:setenv:3:2005/03/15::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2002/02/28:setfsent:3:getfsent:3:
-@:LDP man-pages:3.41:2010/10/21:setgrent:3:getgrent:3:
-@:LDP man-pages:3.41:2010/10/04:sethostent:3:gethostbyname:3:
-@:LDP man-pages:3.41:2010/09/20:sethostid:3:gethostid:3:
-○:LDP man-pages:3.41:2009/06/26:setjmp:3:2009/03/05::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:2003/04/04:setkey:3:encrypt:3:
-@:LDP man-pages:3.41:2003/04/04:setkey_r:3:encrypt:3:
-@:LDP man-pages:3.41:2008/06/26:setlinebuf:3:setbuf:3:
-○:LDP man-pages:3.41:2008/12/05:setlocale:3:2002/10/12::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:2001/10/05:setlogmask:3:2001/11/03::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2009/09/15:setmntent:3:getmntent:3:
-@:LDP man-pages:3.41:2008/08/19:setnetent:3:getnetent:3:
-○:LDP man-pages:3.41:2007/07/26:setnetgrent:3:2005/03/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/08/19:setprotoent:3:getprotoent:3:
-@:LDP man-pages:3.41:2010/10/21:setpwent:3:getpwent:3:
-@:LDP man-pages:3.41:2008/08/19:setrpcent:3:getrpcent:3:
-@:LDP man-pages:3.41:2008/08/19:setservent:3:getservent:3:
-@:LDP man-pages:3.41:2010/02/25:setspent:3:getspnam:3:
-@:LDP man-pages:3.41:2010/09/20:setstate:3:random:3:
-@:LDP man-pages:3.41:2008/03/07:setstate_r:3:random_r:3:
-@:LDP man-pages:3.41:2002/07/18:setttyent:3:getttyent:3:
-@:LDP man-pages:3.41:2007/07/26:setusershell:3:getusershell:3:
-@:LDP man-pages:3.41:2008/06/29:setutent:3:getutent:3:
-@:LDP man-pages:3.41:2008/06/29:setutxent:3:getutent:3:
-@:LDP man-pages:3.41:2008/06/26:setvbuf:3:setbuf:3:
-@:LDP man-pages:3.41:2010/02/25:sgetspent:3:getspnam:3:
-@:LDP man-pages:3.41:2010/02/25:sgetspent_r:3:getspnam:3:
-○:LDP man-pages:3.41:2009/02/25:shm_open:3:2009/03/09::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2009/02/25:shm_unlink:3:shm_open:3:
-@:LDP man-pages:3.41:2008/09/01:sigaddset:3:sigsetops:3:
-@:LDP man-pages:3.41:2008/09/01:sigandset:3:sigsetops:3:
-@:LDP man-pages:3.41:2007/07/26:sigblock:3:sigvec:3:
-@:LDP man-pages:3.41:2008/09/01:sigdelset:3:sigsetops:3:
-@:LDP man-pages:3.41:2008/09/01:sigemptyset:3:sigsetops:3:
-@:LDP man-pages:3.41:2008/09/01:sigfillset:3:sigsetops:3:
-@:LDP man-pages:3.41:2007/07/26:siggetmask:3:sigvec:3:
-@:LDP man-pages:3.41:2010/09/20:sighold:3:sigset:3:
-@:LDP man-pages:3.41:2010/09/20:sigignore:3:sigset:3:
-○:LDP man-pages:3.41:2011/09/09:siginterrupt:3:1998/05/24::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
-@:LDP man-pages:3.41:2008/09/01:sigisemptyset:3:sigsetops:3:
-@:LDP man-pages:3.41:2008/09/01:sigismember:3:sigsetops:3:
-@:LDP man-pages:3.41:2009/01/13:siglongjmp:3:longjmp:3:
-@:LDP man-pages:3.41:2007/07/26:sigmask:3:sigvec:3:
-○:LDP man-pages:3.41:2010/09/20:signbit:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/11:signgam:3:lgamma:3:
-○:LDP man-pages:3.41:2009/02/04:significand:3:2005/02/14::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2009/02/04:significandf:3:significand:3:
-@:LDP man-pages:3.41:2009/02/04:significandl:3:significand:3:
-@:LDP man-pages:3.41:2008/09/01:sigorset:3:sigsetops:3:
-○:LDP man-pages:3.41:2010/09/12:sigpause:3:2005/12/05::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/03/25:sigqueue:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:sigrelse:3:sigset:3:
-○:LDP man-pages:3.41:2010/09/20:sigset:3:2005/12/08::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2009/06/26:sigsetjmp:3:setjmp:3:
-@:LDP man-pages:3.41:2007/07/26:sigsetmask:3:sigvec:3:
-○:LDP man-pages:3.41:2008/09/01:sigsetops:3:2005/12/05::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/26:sigstack:3:sigaltstack:2:
-○:LDP man-pages:3.41:2007/07/26:sigvec:3:2005/12/13::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/10:sigwait:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/11:sin:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/08/11:sincos:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/08/11:sincosf:3:sincos:3:
-@:LDP man-pages:3.41:2008/08/11:sincosl:3:sincos:3:
-@:LDP man-pages:3.41:2010/09/11:sinf:3:sin:3:
-○:LDP man-pages:3.41:2010/09/20:sinh:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:sinhf:3:sinh:3:
-@:LDP man-pages:3.41:2010/09/20:sinhl:3:sinh:3:
-@:LDP man-pages:3.41:2010/09/11:sinl:3:sin:3:
-○:LDP man-pages:3.41:2010/02/03:sleep:3:1997/01/21::tyoshino@eng.toyo.ac.jp:YOSHINO Takashi:
-@:LDP man-pages:3.41:2011/09/28:snprintf:3:printf:3:
-○:LDP man-pages:3.41:2008/12/03:sockatmark:3:2006/08/19::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2011/09/28:sprintf:3:printf:3:
-○:LDP man-pages:3.41:2010/09/20:sqrt:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:sqrtf:3:sqrt:3:
-@:LDP man-pages:3.41:2010/09/20:sqrtl:3:sqrt:3:
-@:LDP man-pages:3.41:2010/10/01:srand:3:rand:3:
-@:LDP man-pages:3.41:2007/07/26:srand48:3:drand48:3:
-@:LDP man-pages:3.41:2007/07/26:srand48_r:3:drand48_r:3:
-@:LDP man-pages:3.41:2010/09/20:srandom:3:random:3:
-@:LDP man-pages:3.41:2008/03/07:srandom_r:3:random_r:3:
-@:LDP man-pages:3.41:2011/09/28:sscanf:3:scanf:3:
-@:LDP man-pages:3.41:2007/07/26:ssignal:3:gsignal:3:
-○:LDP man-pages:3.41:2003/08/22:statvfs:3:2005/02/14::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2001/10/14:stdarg:3:2008/07/24::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:2008/07/14:stderr:3:stdin:3:
-○:LDP man-pages:3.41:2008/07/14:stdin:3:2005/09/05::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2001/12/26:stdio:3:2004/02/06::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2001/12/16:stdio_ext:3:2002/08/14::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/07/14:stdout:3:stdin:3:
-○:LDP man-pages:3.41:2012/03/15:stpcpy:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2011/09/28:stpncpy:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
-○:LDP man-pages:3.41:2012/05/10:strcasecmp:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2011/09/28:strcasestr:3:strstr:3:
-○:LDP man-pages:3.41:2012/05/10:strcat:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/04/24:strchr:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/04/24:strchrnul:3:strchr:3:
-○:LDP man-pages:3.41:2012/05/10:strcmp:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:strcoll:3:2007/06/01::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/10:strcpy:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/05/10:strcspn:3:strspn:3:
-○:LDP man-pages:3.41:2012/05/10:strdup:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/05/10:strdupa:3:strdup:3:
-○:LDP man-pages:3.41:2012/04/22:strerror:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/04/22:strerror_r:3:strerror:3:
-○:LDP man-pages:3.41:2000/12/05:strfmon:3:2001/02/14::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:2010/09/20:strfry:3:1998/05/25::motoki@hal.t.u-tokyo.ac.jp:Akihiro Motoki:
-○:LDP man-pages:3.41:2012/05/10:strftime:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/02/25:string:3:1997/01/20::yoshino@civil.jcn.nihon-u.ac.jp:YOSHINO Takashi:
-○:LDP man-pages:3.41:2012/05/04:strlen:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/05/10:strncasecmp:3:strcasecmp:3:
-@:LDP man-pages:3.41:2012/05/10:strncat:3:strcat:3:
-@:LDP man-pages:3.41:2012/05/10:strncmp:3:strcmp:3:
-@:LDP man-pages:3.41:2012/05/10:strncpy:3:strcpy:3:
-@:LDP man-pages:3.41:2012/05/10:strndup:3:strdup:3:
-@:LDP man-pages:3.41:2012/05/10:strndupa:3:strdup:3:
-○:LDP man-pages:3.41:2012/05/10:strnlen:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/10:strpbrk:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2009/12/05:strptime:3:2002/01/14::ysato@h4.dion.ne.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2012/04/24:strrchr:3:strchr:3:
-○:LDP man-pages:3.41:2011/09/28:strsep:3:2009/03/05::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:2010/09/15:strsignal:3:1999/12/25::argrath@yo.rim.or.jp:Kentaro Shirakata:
-○:LDP man-pages:3.41:2012/05/10:strspn:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2011/09/28:strstr:3:2008/07/24::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:2010/09/20:strtod:3:2006/07/20::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:strtof:3:strtod:3:
-○:LDP man-pages:3.41:2003/11/28:strtoimax:3:2004/09/14::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2012/05/10:strtok:3:2012/05/31:o:amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/05/10:strtok_r:3:strtok:3:
-○:LDP man-pages:3.41:2010/09/20:strtol:3:2006/07/20::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:strtold:3:strtod:3:
-@:LDP man-pages:3.41:2010/09/20:strtoll:3:strtol:3:
-@:LDP man-pages:3.41:2010/09/20:strtoq:3:strtol:3:
-○:LDP man-pages:3.41:2011/09/15:strtoul:3:2006/07/20::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2011/09/15:strtoull:3:strtoul:3:
-@:LDP man-pages:3.41:2003/11/28:strtoumax:3:strtoimax:3:
-@:LDP man-pages:3.41:2011/09/15:strtouq:3:strtoul:3:
-○:LDP man-pages:3.41:2001/12/19:strverscmp:3:2002/09/22::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/10:strxfrm:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/07/17:svc_destroy:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:svc_freeargs:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:svc_getargs:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:svc_getcaller:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:svc_getreq:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:svc_getreqset:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:svc_register:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:svc_run:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:svc_sendreply:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:svc_unregister:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:svcerr_auth:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:svcerr_decode:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:svcerr_noproc:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:svcerr_noprog:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:svcerr_progvers:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:svcerr_systemerr:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:svcerr_weakauth:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:svcfd_create:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:svcraw_create:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:svctcp_create:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:svcudp_bufcreate:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:svcudp_create:3:rpc:3:
-○:LDP man-pages:3.41:2001/12/15:swab:3:2008/07/24::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:2009/03/31:swapcontext:3:makecontext:3:
-@:LDP man-pages:3.41:2011/09/17:swprintf:3:wprintf:3:
-@:LDP man-pages:3.41:2012/04/17:sys_errlist:3:perror:3:
-@:LDP man-pages:3.41:2012/04/17:sys_nerr:3:perror:3:
-○:LDP man-pages:3.41:2012/04/15:sysconf:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/04/30:syslog:3:2012/05/31:o:amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/10:system:3:2012/05/31:o:amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2007/05/04:sysv_signal:3:2007/06/03::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/11:tan:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/11:tanf:3:tan:3:
-○:LDP man-pages:3.41:2010/09/20:tanh:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:tanhf:3:tanh:3:
-@:LDP man-pages:3.41:2010/09/20:tanhl:3:tanh:3:
-@:LDP man-pages:3.41:2010/09/11:tanl:3:tan:3:
-@:LDP man-pages:3.41:2011/09/08:tcdrain:3:termios:3:
-@:LDP man-pages:3.41:2011/09/08:tcflow:3:termios:3:
-@:LDP man-pages:3.41:2011/09/08:tcflush:3:termios:3:
-@:LDP man-pages:3.41:2011/09/08:tcgetattr:3:termios:3:
-○:LDP man-pages:3.41:2003/01/28:tcgetpgrp:3:2003/08/30::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/10:tcgetsid:3:2003/08/30::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2011/09/08:tcsendbreak:3:termios:3:
-@:LDP man-pages:3.41:2011/09/08:tcsetattr:3:termios:3:
-@:LDP man-pages:3.41:2003/01/28:tcsetpgrp:3:tcgetpgrp:3:
-@:LDP man-pages:3.41:2008/09/23:tdelete:3:tsearch:3:
-@:LDP man-pages:3.41:2008/09/23:tdestroy:3:tsearch:3:
-○:LDP man-pages:3.41:2009/03/11:telldir:3:2010/04/25::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2007/07/26:tempnam:3:2006/07/26::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2011/09/08:termios:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/09/23:tfind:3:tsearch:3:
-○:LDP man-pages:3.41:2010/09/20:tgamma:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:tgammaf:3:tgamma:3:
-@:LDP man-pages:3.41:2010/09/20:tgammal:3:tgamma:3:
-○:LDP man-pages:3.41:2007/07/26:timegm:3:2002/01/14::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-@:LDP man-pages:3.41:2007/07/26:timelocal:3:timegm:3:
-○:LDP man-pages:3.41:2010/02/25:timeradd:3:2007/10/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/02/25:timerclear:3:timeradd:3:
-@:LDP man-pages:3.41:2010/02/25:timercmp:3:timeradd:3:
-@:LDP man-pages:3.41:2010/02/25:timerisset:3:timeradd:3:
-@:LDP man-pages:3.41:2010/02/25:timersub:3:timeradd:3:
-@:LDP man-pages:3.41:2012/03/25:timezone:3:tzset:3:
-○:LDP man-pages:3.41:2008/07/14:tmpfile:3:2001/12/14:o:ysato@h4.dion.ne.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2010/09/10:tmpnam:3:2006/07/26:o:amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/10:tmpnam_r:3:tmpnam:3:
-○:LDP man-pages:3.41:2009/03/15:toascii:3:1997/12/16::nishi@rpts.cl.nec.co.jp:HIROFUMI Nishizuka:
-@:LDP man-pages:3.41:1993/04/04:tolower:3:toupper:3:
-○:LDP man-pages:3.41:1993/04/04:toupper:3:1997/04/29::rui@linux.or.jp:Ueyama Rui:
-○:LDP man-pages:3.41:1999/07/25:towctrans:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:1999/07/25:towlower:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:1999/07/25:towupper:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:2010/09/20:trunc:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:truncf:3:trunc:3:
-@:LDP man-pages:3.41:2010/09/20:truncl:3:trunc:3:
-○:LDP man-pages:3.41:2008/09/23:tsearch:3:2002/02/14::ysato@h4.dion.ne.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2008/07/14:ttyname:3:2008/07/24::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:2008/07/14:ttyname_r:3:ttyname:3:
-○:LDP man-pages:3.41:2010/09/20:ttyslot:3:2004/09/14::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2008/09/23:twalk:3:tsearch:3:
-@:LDP man-pages:3.41:2012/03/25:tzname:3:tzset:3:
-○:LDP man-pages:3.41:2012/03/25:tzset:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:ualarm:3:2007/05/04::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/02/25:ulckpwdf:3:getspnam:3:
-○:LDP man-pages:3.41:2008/08/06:ulimit:3:1998/12/06::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:2012/05/04:undocumented:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/01/18:ungetc:3:gets:3:
-○:LDP man-pages:3.41:1999/09/19:ungetwc:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
-○:LDP man-pages:3.41:2008/08/29:unlocked_stdio:3:2001/11/03::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/06/14:unlockpt:3:2003/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2009/09/20:unsetenv:3:setenv:3:
-○:LDP man-pages:3.41:2008/07/02:updwtmp:3:2008/10/08::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:2008/07/02:updwtmpx:3:updwtmp:3:
-○:LDP man-pages:3.41:2010/12/03:usleep:3:2007/05/04::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/06/29:utmpname:3:getutent:3:
-@:LDP man-pages:3.41:2008/06/29:utmpxname:3:getutent:3:
-@:LDP man-pages:3.41:2001/10/14:va_arg:3:stdarg:3:
-@:LDP man-pages:3.41:2001/10/14:va_copy:3:stdarg:3:
-@:LDP man-pages:3.41:2001/10/14:va_end:3:stdarg:3:
-@:LDP man-pages:3.41:2001/10/14:va_start:3:stdarg:3:
-@:LDP man-pages:3.41:2012/03/23:valloc:3:posix_memalign:3:
-@:LDP man-pages:3.41:2001/12/18:vasprintf:3:asprintf:3:
-@:LDP man-pages:3.41:2010/09/15:vdprintf:3:dprintf:3:
-@:LDP man-pages:3.41:2012/03/15:verr:3:err:3:
-@:LDP man-pages:3.41:2012/03/15:verrx:3:err:3:
-@:LDP man-pages:3.41:2012/04/26:versionsort:3:scandir:3:
-@:LDP man-pages:3.41:2011/09/28:vfprintf:3:printf:3:
-@:LDP man-pages:3.41:2011/09/28:vfscanf:3:scanf:3:
-@:LDP man-pages:3.41:2011/09/17:vfwprintf:3:wprintf:3:
-@:LDP man-pages:3.41:2011/09/10:vlimit:3:getrlimit:2:
-@:LDP man-pages:3.41:2011/09/28:vprintf:3:printf:3:
-@:LDP man-pages:3.41:2011/09/28:vscanf:3:scanf:3:
-@:LDP man-pages:3.41:2011/09/28:vsnprintf:3:printf:3:
-@:LDP man-pages:3.41:2011/09/28:vsprintf:3:printf:3:
-@:LDP man-pages:3.41:2011/09/28:vsscanf:3:scanf:3:
-@:LDP man-pages:3.41:2011/09/17:vswprintf:3:wprintf:3:
-@:LDP man-pages:3.41:2012/04/30:vsyslog:3:syslog:3:
-※:LDP man-pages:3.41:2010/09/26:vtimes:3:getrusage:2:
-@:LDP man-pages:3.41:2012/03/15:vwarn:3:err:3:
-@:LDP man-pages:3.41:2012/03/15:vwarnx:3:err:3:
-@:LDP man-pages:3.41:2011/09/17:vwprintf:3:wprintf:3:
-@:LDP man-pages:3.41:2012/03/15:warn:3:err:3:
-@:LDP man-pages:3.41:2012/03/15:warnx:3:err:3:
-○:LDP man-pages:3.41:2011/10/01:wcpcpy:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2011/10/01:wcpncpy:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:2011/09/28:wcrtomb:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/15:wcscasecmp:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:2011/09/28:wcscat:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:1999/07/25:wcschr:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:1999/07/25:wcscmp:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:2011/09/28:wcscpy:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:1999/07/25:wcscspn:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:2010/09/15:wcsdup:3:2004/06/13::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2011/09/28:wcslen:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/15:wcsncasecmp:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:2011/09/28:wcsncat:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:2011/09/28:wcsncmp:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2011/09/28:wcsncpy:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:2011/10/01:wcsnlen:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:2011/10/16:wcsnrtombs:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:1999/07/25:wcspbrk:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:1999/07/25:wcsrchr:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:2011/10/16:wcsrtombs:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:1999/07/25:wcsspn:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:2011/09/28:wcsstr:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:2003/11/01:wcstoimax:3:2004/09/14::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2011/09/28:wcstok:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:2011/10/16:wcstombs:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2003/11/01:wcstoumax:3:wcstoimax:3:
-○:LDP man-pages:3.41:2010/09/10:wcswidth:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:2011/09/22:wctob:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:1999/07/25:wctomb:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
-○:LDP man-pages:3.41:1999/07/25:wctrans:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:1999/07/25:wctype:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:2011/09/28:wcwidth:3:2002/08/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:1999/07/25:wmemchr:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:1999/07/25:wmemcmp:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:1999/07/25:wmemcpy:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:1999/07/25:wmemmove:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-@:LDP man-pages:3.41:2008/08/12:wmempcpy:3:mempcpy:3:
-○:LDP man-pages:3.41:1999/07/25:wmemset:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
-○:LDP man-pages:3.41:2008/07/14:wordexp:3:2004/09/29::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2008/07/14:wordfree:3:wordexp:3:
-○:LDP man-pages:3.41:2011/09/17:wprintf:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
-○:LDP man-pages:3.41:2003/04/04:xcrypt:3:2004/10/16::ysato444@yahoo.co.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2003/04/04:xdecrypt:3:xcrypt:3:
-○:LDP man-pages:3.41:2007/12/30:xdr:3:2000/01/14::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
-@:LDP man-pages:3.41:2008/07/17:xdr_accepted_reply:3:rpc:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_array:3:xdr:3:
-@:LDP man-pages:3.41:2008/07/17:xdr_authunix_parms:3:rpc:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_bool:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_bytes:3:xdr:3:
-@:LDP man-pages:3.41:2008/07/17:xdr_callhdr:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:xdr_callmsg:3:rpc:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_char:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_destroy:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_double:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_enum:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_float:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_free:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_getpos:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_inline:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_int:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_long:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_opaque:3:xdr:3:
-@:LDP man-pages:3.41:2008/07/17:xdr_opaque_auth:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:xdr_pmap:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:xdr_pmaplist:3:rpc:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_pointer:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_reference:3:xdr:3:
-@:LDP man-pages:3.41:2008/07/17:xdr_rejected_reply:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:xdr_replymsg:3:rpc:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_setpos:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_short:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_string:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_u_char:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_u_int:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_u_long:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_u_short:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_union:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_vector:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_void:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdr_wrapstring:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdrmem_create:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdrrec_create:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdrrec_endofrecord:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdrrec_eof:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdrrec_skiprecord:3:xdr:3:
-@:LDP man-pages:3.41:2007/12/30:xdrstdio_create:3:xdr:3:
-@:LDP man-pages:3.41:2003/04/04:xencrypt:3:xcrypt:3:
-@:LDP man-pages:3.41:2008/07/17:xprt_register:3:rpc:3:
-@:LDP man-pages:3.41:2008/07/17:xprt_unregister:3:rpc:3:
-○:LDP man-pages:3.41:2008/08/10:y0:3:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2008/08/10:y0f:3:y0:3:
-@:LDP man-pages:3.41:2008/08/10:y0l:3:y0:3:
-@:LDP man-pages:3.41:2008/08/10:y1:3:y0:3:
-@:LDP man-pages:3.41:2008/08/10:y1f:3:y0:3:
-@:LDP man-pages:3.41:2008/08/10:y1l:3:y0:3:
-@:LDP man-pages:3.41:2008/08/10:yn:3:y0:3:
-@:LDP man-pages:3.41:2008/08/10:ynf:3:y0:3:
-@:LDP man-pages:3.41:2008/08/10:ynl:3:y0:3:
-×:LDP man-pages:3.41:2011/09/21:cciss:4:::::
-○:LDP man-pages:3.41:1994/10/31:console:4:2002/01/14:o:argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:2011/09/15:console_codes:4:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2009/02/28:console_ioctl:4:2008/07/22::argrath@ub32.org:Kentaro Shirakata:
-×:LDP man-pages:3.41:2009/03/31:cpuid:4:::::
-○:LDP man-pages:3.41:2000/03/01:dsp56k:4:2000/07/11::sato@complex.eng.hokudai.ac.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2012/04/17:epoll:4:epoll:7:
-○:LDP man-pages:3.41:2010/08/29:fd:4:1998/01/12:o:ishikawa@linux.or.jp:ISHIKAWA Mutsumi:
-@:LDP man-pages:3.41:2008/12/03:fifo:4:fifo:7:
-○:LDP man-pages:3.41:1997/08/02:full:4:2006/07/20::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2002/12/31:futex:4:futex:7:
-○:LDP man-pages:3.41:1992/12/17:hd:4:1998/02/05:o:ishikawa@linux.or.jp:ISHIKAWA Mutsumi:
-×:LDP man-pages:3.41:2011/09/21:hpsa:4:::::
-○:LDP man-pages:3.41:2010/09/04:initrd:4:2012/05/31:o:amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2007/10/23:intro:4:1998/02/05:o:ishikawa@linux.or.jp:ISHIKAWA Mutsumi:
-@:LDP man-pages:3.41:1992/11/21:kmem:4:mem:4:
-○:LDP man-pages:3.41:1995/01/15:lp:4:1998/02/05:o:ishikawa@linux.or.jp:ISHIKAWA Mutsumi:
-○:LDP man-pages:3.41:1992/11/21:mem:4:1998/02/05:o:ishikawa@linux.or.jp:ISHIKAWA Mutsumi:
-○:LDP man-pages:3.41:1996/02/10:mouse:4:1999/03/24:o:ss236rx@ymg.urban.ne.jp:Shouichi Saito:
-×:LDP man-pages:3.41:2009/03/31:msr:4:::::
-○:LDP man-pages:3.41:2009/02/23:null:4:1998/02/05:o:ishikawa@linux.or.jp:ISHIKAWA Mutsumi:
-@:LDP man-pages:3.41:1992/11/21:port:4:mem:4:
-@:LDP man-pages:3.41:2002/10/09:ptmx:4:pts:4:
-○:LDP man-pages:3.41:2002/10/09:pts:4:2003/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:1992/11/21:ram:4:1997/01/12:o:ishikawa@linux.or.jp:ISHIKAWA Mutsumi:
-○:LDP man-pages:3.41:2010/08/29:random:4:2008/08/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/02/25:rtc:4:2007/02/08::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2012/05/03:sd:4:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/10:sk98lin:4:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/04:st:4:2005/06/12::nakano@st.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:2003/04/07:tty:4:2003/09/14::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:1992/12/19:ttyS:4:1998/02/05::ishikawa@linux.or.jp:ISHIKAWA Mutsumi:
-○:LDP man-pages:3.41:2008/10/29:tty_ioctl:4:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/08/29:urandom:4:random:4:
-○:LDP man-pages:3.41:2007/12/17:vcs:4:2001/02/11::sato@complex.eng.hokudai.ac.jp:Yuichi SATO:
-@:LDP man-pages:3.41:2007/12/17:vcsa:4:vcs:4:
-○:LDP man-pages:3.41:1996/10/22:wavelan:4:1998/02/10::ishikawa@linux.or.jp:ISHIKAWA Mutsumi:
-@:LDP man-pages:3.41:2009/02/23:zero:4:null:4:
-○:LDP man-pages:3.41:2008/06/15:acct:5:2008/08/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:1994/11/28:charmap:5:2008/07/22::argrath@ub32.org:Kentaro Shirakata:
-@:LDP man-pages:3.41:2011/09/16:complex:5:complex:7:
-○:LDP man-pages:3.41:2012/01/17:core:5:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2001/12/26:dir_colors:5:2002/01/14::ysato@h4.dion.ne.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2010/06/19:elf:5:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2009/07/25:environ:5:environ:7:
-○:LDP man-pages:3.41:2010/05/24:filesystems:5:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/05/24:fs:5:filesystems:5:
-○:LDP man-pages:3.41:2000/08/27:ftpusers:5:2001/03/12::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:2010/10/21:group:5:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2003/08/23:host.conf:5:2003/10/15::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2002/06/16:hosts:5:2005/09/06::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2003/08/24:hosts.equiv:5:2005/03/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2007/10/23:intro:5:1998/10/13::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-@:LDP man-pages:3.41:2009/01/26:ipc:5:svipc:7:
-○:LDP man-pages:3.41:1993/07/24:issue:5:1998/07/25::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:2008/06/17:locale:5:2008/08/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:1992/12/29:motd:5:1998/2/4::nagoya@cc.hit-u.ac.jp:Hiroaki Nagoya:
-○:LDP man-pages:3.41:2008/09/04:networks:5:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/04/16:nologin:5:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:1999/10/01:nscd.conf:5:2006/07/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/04/14:nsswitch.conf:5:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-※:LDP man-pages:3.41:2008/08/15:numa_maps:5:numa:7:
-○:LDP man-pages:3.41:2012/05/03:passwd:5:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/03:proc:5:2012/06/04::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/09/23:protocols:5:2008/07/22::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:2012/05/04:resolv.conf:5:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/05/04:resolver:5:resolv.conf:5:
-○:LDP man-pages:3.41:1985/09/26:rpc:5:2008/07/22::argrath@ub32.org:Kentaro Shirakata:
-○:LDP man-pages:3.41:1992/12/29:securetty:5:2003/01/08::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/05/22:services:5:2002/08/14::amotoki@dd.iij4u.or.jp:Akihiro Motoki:
-○:LDP man-pages:3.41:1993/11/21:shells:5:2000/12/11::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:2001/06/19:slabinfo:5:2001/09/10::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:1996/10/21:termcap:5:2000/10/12::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:1993/07/24:ttytype:5:1998/02/10::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:2012/05/04:tzfile:5:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2011/09/28:utmp:5:2008/08/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2011/09/28:utmpx:5:utmp:5:
-@:LDP man-pages:3.41:2011/09/28:wtmp:5:utmp:5:
-○:LDP man-pages:3.41:2007/10/23:intro:6:1997/11/15::pessi@kmc.kyoto-u.ac.jp:II Ryouta:
-○:LDP man-pages:3.41:2010/10/02:aio:7:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:armscii-8:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/11/25:arp:7:2009/01/15::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2009/02/12:ascii:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/19:boot:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2007/12/16:bootparam:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/04/15:capabilities:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/06/03:charsets:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2011/09/16:complex:7:2006/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:cp1251:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-×:LDP man-pages:3.41:2008/11/12:cpuset:7:::::
-○:LDP man-pages:3.41:2008/06/03:credentials:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/11/20:ddp:7:1999/12/06::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:2009/07/25:environ:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/04/17:epoll:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/01/18:feature_test_macros:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/12/03:fifo:7:2006/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2002/12/31:futex:7:2006/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2009/01/13:glibc:7:libc:7:
-○:LDP man-pages:3.41:2003/08/24:glob:7:2003/09/28::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:2009/03/30:hier:7:2002/01/14::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:2010/11/07:hostname:7:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/10:icmp:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/04/26:inotify:7:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:1993/04/23:intro:7:2005/12/05::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2011/09/22:ip:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/10:ipv6:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/04/22:iso-8859-1:7:iso_8859-1:7:
-@:LDP man-pages:3.41:2010/09/20:iso-8859-10:7:iso_8859-10:7:
-@:LDP man-pages:3.41:2010/09/20:iso-8859-11:7:iso_8859-11:7:
-@:LDP man-pages:3.41:2010/09/20:iso-8859-13:7:iso_8859-13:7:
-@:LDP man-pages:3.41:2010/09/20:iso-8859-14:7:iso_8859-14:7:
-@:LDP man-pages:3.41:1999/05/31:iso-8859-15:7:iso_8859-15:7:
-@:LDP man-pages:3.41:2003/03/05:iso-8859-16:7:iso_8859-16:7:
-@:LDP man-pages:3.41:2007/11/25:iso-8859-2:7:iso_8859-2:7:
-@:LDP man-pages:3.41:2010/09/20:iso-8859-3:7:iso_8859-3:7:
-@:LDP man-pages:3.41:2009/01/24:iso-8859-4:7:iso_8859-4:7:
-@:LDP man-pages:3.41:2010/09/20:iso-8859-5:7:iso_8859-5:7:
-@:LDP man-pages:3.41:2010/09/20:iso-8859-6:7:iso_8859-6:7:
-@:LDP man-pages:3.41:2008/10/30:iso-8859-7:7:iso_8859-7:7:
-@:LDP man-pages:3.41:2010/09/20:iso-8859-8:7:iso_8859-8:7:
-@:LDP man-pages:3.41:2002/09/24:iso-8859-9:7:iso_8859-9:7:
-○:LDP man-pages:3.41:2012/04/22:iso_8859-1:7:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:iso_8859-10:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:iso_8859-11:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:iso_8859-13:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:iso_8859-14:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:1999/05/31:iso_8859-15:7:2002/09/28::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
-○:LDP man-pages:3.41:2003/03/05:iso_8859-16:7:2003/09/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2007/11/25:iso_8859-2:7:2002/09/28::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
-○:LDP man-pages:3.41:2010/09/20:iso_8859-3:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2009/01/24:iso_8859-4:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:iso_8859-5:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:iso_8859-6:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/10/30:iso_8859-7:7:2002/09/28::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
-○:LDP man-pages:3.41:2010/09/20:iso_8859-8:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2002/09/24:iso_8859-9:7:2003/01/20::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/04/22:iso_8859_1:7:iso_8859-1:7:
-@:LDP man-pages:3.41:2010/09/20:iso_8859_10:7:iso_8859-10:7:
-@:LDP man-pages:3.41:2010/09/20:iso_8859_11:7:iso_8859-11:7:
-@:LDP man-pages:3.41:2010/09/20:iso_8859_13:7:iso_8859-13:7:
-@:LDP man-pages:3.41:2010/09/20:iso_8859_14:7:iso_8859-14:7:
-@:LDP man-pages:3.41:1999/05/31:iso_8859_15:7:iso_8859-15:7:
-@:LDP man-pages:3.41:2003/03/05:iso_8859_16:7:iso_8859-16:7:
-@:LDP man-pages:3.41:2007/11/25:iso_8859_2:7:iso_8859-2:7:
-@:LDP man-pages:3.41:2010/09/20:iso_8859_3:7:iso_8859-3:7:
-@:LDP man-pages:3.41:2009/01/24:iso_8859_4:7:iso_8859-4:7:
-@:LDP man-pages:3.41:2010/09/20:iso_8859_5:7:iso_8859-5:7:
-@:LDP man-pages:3.41:2010/09/20:iso_8859_6:7:iso_8859-6:7:
-@:LDP man-pages:3.41:2008/10/30:iso_8859_7:7:iso_8859-7:7:
-@:LDP man-pages:3.41:2010/09/20:iso_8859_8:7:iso_8859-8:7:
-@:LDP man-pages:3.41:2002/09/24:iso_8859_9:7:iso_8859-9:7:
-○:LDP man-pages:3.41:2010/10/24:koi8-r:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/20:koi8-u:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/04/22:latin1:7:iso_8859-1:7:
-@:LDP man-pages:3.41:2003/03/05:latin10:7:iso_8859-16:7:
-@:LDP man-pages:3.41:2007/11/25:latin2:7:iso_8859-2:7:
-@:LDP man-pages:3.41:2010/09/20:latin3:7:iso_8859-3:7:
-@:LDP man-pages:3.41:2009/01/24:latin4:7:iso_8859-4:7:
-@:LDP man-pages:3.41:2002/09/24:latin5:7:iso_8859-9:7:
-@:LDP man-pages:3.41:2010/09/20:latin6:7:iso_8859-10:7:
-@:LDP man-pages:3.41:2010/09/20:latin7:7:iso_8859-13:7:
-@:LDP man-pages:3.41:2010/09/20:latin8:7:iso_8859-14:7:
-@:LDP man-pages:3.41:1999/05/31:latin9:7:iso_8859-15:7:
-○:LDP man-pages:3.41:2009/01/13:libc:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/12/05:locale:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2004/09/15:mailaddr:7:2005/03/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2011/10/05:man:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/10/28:man-pages:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/08/11:math_error:7:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:0000/00/00:mdoc:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:0000/00/00:mdoc.samples:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2009/09/27:mq_overview:7:2009/03/09::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/04/26:netdevice:7:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/04/14:netlink:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-×:LDP man-pages:3.41:2008/08/15:numa:7:::::
-○:LDP man-pages:3.41:2011/09/09:operator:7:2004/11/16::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2012/05/10:packet:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2009/12/05:path_resolution:7:2007/06/13::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2005/12/08:pipe:7:2005/12/27::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2007/12/21:posixoptions:7:2005/01/14::ysato444@yahoo.co.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2010/11/14:pthreads:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2005/10/10:pty:7:2005/10/14::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/10:raw:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2009/01/12:regex:7:1998/07/08::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-×:LDP man-pages:3.41:2010/09/10:rtld-audit:7:::::
-○:LDP man-pages:3.41:2012/05/10:rtnetlink:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/05/22:sem_overview:7:2009/03/09::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/09/10:shm_overview:7:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-×:LDP man-pages:3.41:2011/09/09:sigevent:7:::::
-○:LDP man-pages:3.41:2012/05/01:signal:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/04/23:socket:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-×:LDP man-pages:3.41:2007/12/20:spufs:7:::::
-○:LDP man-pages:3.41:2009/06/01:standards:7:2006/08/15::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2000/11/16:suffixes:7:2001/04/24::ysato@h4.dion.ne.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2009/01/26:svipc:7:2006/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-×:LDP man-pages:3.41:2008/06/18:symlink:7:::::
-○:LDP man-pages:3.41:2012/04/23:tcp:7:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2006/12/28:termio:7:2007/05/04::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2010/02/25:time:7:2008/08/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2010/09/20:tis-620:7:iso_8859-11:7:
-○:LDP man-pages:3.41:2010/06/13:udp:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2008/12/03:udplite:7:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2001/05/11:unicode:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2001/12/22:units:7:2002/01/14::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:2012/05/10:unix:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2000/03/14:uri:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2000/03/14:url:7:uri:7:
-@:LDP man-pages:3.41:2000/03/14:urn:7:uri:7:
-○:LDP man-pages:3.41:2012/04/30:utf-8:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/04/30:utf8:7:utf-8:7:
-○:LDP man-pages:3.41:2012/05/10:x25:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2007/10/23:intro:8:2008/02/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
-@:LDP man-pages:3.41:2012/04/17:ld-linux:8:ld.so:8:
-@:LDP man-pages:3.41:2012/04/17:ld-linux.so:8:ld.so:8:
-○:LDP man-pages:3.41:2012/04/17:ld.so:8:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/10:ldconfig:8:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:2012/05/10:nscd:8:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
-○:LDP man-pages:3.41:1998/11/01:sync:8:2000/06/13::sato@complex.eng.hokudai.ac.jp:Yuichi SATO:
-○:LDP man-pages:3.41:2007/05/18:tzselect:8:2002/01/14::ysato@h4.dion.ne.jp:Yuichi SATO:
-○:LDP man-pages:3.41:0000/00/00:zdump:8:1999/09/14::nakano@apm.seikei.ac.jp:NAKANO Takeo:
-○:LDP man-pages:3.41:2010/02/25:zic:8:2001/04/04::sato@complex.eng.hokudai.ac.jp:Yuichi SATO:
+×:LDP man-pages:3.50:2013/03/15:getent:1:::::
+☆:LDP man-pages:3.41=>3.50:2007/11/15:intro:1:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/07/16:ldd:1:2002/02/14::ysato@h4.dion.ne.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2008/11/14:time:1:2008/11/20::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:_Exit:2:_exit:2:
+@:LDP man-pages:3.50:2013/01/01:__clone2:2:clone:2:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:_exit:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/07/13:_llseek:2:llseek:2:
+@:LDP man-pages:3.50:2012/08/17:_newselect:2:select:2:
+☆:LDP man-pages:3.41=>3.50:2007/12/19:_syscall:2:2008/02/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/12/22:_sysctl:2:sysctl:2:
+☆:LDP man-pages:3.41=>3.50:2010/09/10:accept:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/10:accept4:2:accept:2:
+☆:LDP man-pages:3.41=>3.50:2013/02/28:access:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/06/16:acct:2:2005/02/14::ysato444@yahoo.co.jp:Yuichi SATO:
+×:LDP man-pages:3.50:2010/02/25:add_key:2:::::
+☆:LDP man-pages:3.41=>3.50:2004/05/27:adjtimex:2:2006/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/02/12:afs_syscall:2:unimplemented:2:
+☆:LDP man-pages:3.41=>3.50:2008/06/12:alarm:2:1997/02/22::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
+☆:LDP man-pages:3.41=>3.50:2007/05/31:alloc_hugepages:2:2007/06/13::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2007/12/26:arch_prctl:2:2005/11/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/10/09:arm_fadvise:2:posix_fadvise:2:
+@:LDP man-pages:3.50:2010/10/09:arm_fadvise64_64:2:posix_fadvise:2:
+@:LDP man-pages:3.50:2010/10/09:arm_sync_file_range:2:sync_file_range:2:
+☆:LDP man-pages:3.41=>3.50:2012/03/05:bdflush:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2007/12/28:bind:2:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/02/12:break:2:unimplemented:2:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:brk:2:2007/02/08::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2007/05/26:cacheflush:2:2005/10/05::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/03/11:capget:2:2009/03/09::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/03/11:capset:2:capget:2:
+☆:LDP man-pages:3.41=>3.50:2010/11/25:chdir:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/26:chmod:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/11/22:chown:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/11/22:chown32:2:chown:2:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:chroot:2:2005/01/14::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2013/02/25:clock_getres:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/02/25:clock_gettime:2:clock_getres:2:
+☆:LDP man-pages:3.41=>3.50:2012/11/07:clock_nanosleep:2:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/02/25:clock_settime:2:clock_getres:2:
+☆:LDP man-pages:3.41=>3.50:2013/01/01:clone:2:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/01/01:clone2:2:clone:2:
+☆:LDP man-pages:3.41=>3.50:2007/12/28:close:2:2007/10/14::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/12/03:connect:2:2005/10/05::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/02/18:creat:2:open:2:
+☆:LDP man-pages:3.41=>3.50:2012/10/18:create_module:2:2006/07/30::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/11/08:delete_module:2:2006/07/30::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/02/14:dup:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/02/14:dup2:2:dup:2:
+@:LDP man-pages:3.50:2012/02/14:dup3:2:dup:2:
+☆:LDP man-pages:3.41=>3.50:2012/04/15:epoll_create:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/04/15:epoll_create1:2:epoll_create:2:
+☆:LDP man-pages:3.41=>3.50:2012/04/15:epoll_ctl:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/08/17:epoll_pwait:2:epoll_wait:2:
+☆:LDP man-pages:3.41=>3.50:2012/08/17:epoll_wait:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/08/30:eventfd:2:2012/05/26::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/08/30:eventfd2:2:eventfd:2:
+☆:LDP man-pages:3.41=>3.50:2012/10/27:execve:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:exit:2:_exit:2:
+☆:LDP man-pages:3.41=>3.50:2008/11/27:exit_group:2:2005/02/14::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2012/05/04:faccessat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/10/09:fadvise64:2:posix_fadvise:2:
+@:LDP man-pages:3.50:2010/10/09:fadvise64_64:2:posix_fadvise:2:
+☆:LDP man-pages:3.41=>3.50:2013/02/12:fallocate:2:2012/05/26::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/02/12:fattach:2:unimplemented:2:
+@:LDP man-pages:3.50:2010/11/25:fchdir:2:chdir:2:
+@:LDP man-pages:3.50:2010/09/26:fchmod:2:chmod:2:
+☆:LDP man-pages:3.41=>3.50:2012/05/22:fchmodat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/11/22:fchown:2:chown:2:
+@:LDP man-pages:3.50:2010/11/22:fchown32:2:fchown:2:
+☆:LDP man-pages:3.41=>3.50:2012/05/04:fchownat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/04/15:fcntl:2:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/04/15:fcntl64:2:fcntl:2:
+@:LDP man-pages:3.50:2012/02/27:fdatasync:2:fsync:2:
+@:LDP man-pages:3.50:2013/02/12:fdetach:2:unimplemented:2:
+@:LDP man-pages:3.50:2013/01/19:fgetxattr:2:getxattr:2:
+@:LDP man-pages:3.50:2013/01/07:finit_module:2:init_module:2:
+@:LDP man-pages:3.50:2013/01/27:flistxattr:2:listxattr:2:
+☆:LDP man-pages:3.41=>3.50:2013/02/11:flock:2:2005/09/06::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/03/12:fork:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2007/05/31:free_hugepages:2:alloc_hugepages:2:
+@:LDP man-pages:3.50:2013/01/19:fremovexattr:2:removexattr:2:
+@:LDP man-pages:3.50:2013/01/19:fsetxattr:2:setxattr:2:
+@:LDP man-pages:3.50:2012/11/11:fstat:2:stat:2:
+@:LDP man-pages:3.50:2012/05/07:fstat64:2:fstat:2:
+☆:LDP man-pages:3.41=>3.50:2012/05/04:fstatat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/05/04:fstatat64:2:fstatat:2:
+@:LDP man-pages:3.50:2010/11/21:fstatfs:2:statfs:2:
+@:LDP man-pages:3.50:2010/11/21:fstatfs64:2:fstatfs:2:
+@:LDP man-pages:3.50:2003/08/22:fstatvfs:2:statvfs:3:
+☆:LDP man-pages:3.41=>3.50:2012/02/27:fsync:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2011/09/08:ftruncate:2:truncate:2:
+@:LDP man-pages:3.50:2011/09/08:ftruncate64:2:ftruncate:2:
+☆:LDP man-pages:3.41=>3.50:2013/03/15:futex:2:2007/02/08::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2012/05/10:futimesat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/10/18:get_kernel_syms:2:2006/07/31::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/08/15:get_mempolicy:2:2008/11/20::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+×:LDP man-pages:3.50:2012/07/13:get_robust_list:2:::::
+☆:LDP man-pages:3.41=>3.50:2012/07/13:get_thread_area:2:2003/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+※:LDP man-pages:3.50:2009/03/15:getcontext:2:getcontext:3:
+☆:LDP man-pages:3.41=>3.50:2012/07/13:getcpu:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:getcwd:2:getcwd:3:
+☆:LDP man-pages:3.41=>3.50:2012/08/03:getdents:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/08/03:getdents64:2:getdents:2:
+☆:LDP man-pages:3.41=>3.50:2012/10/25:getdomainname:2:2009/01/15::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:0000/00/00:getdtablesize:2:2007/01/14::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:2010/11/22:getegid:2:getgid:2:
+@:LDP man-pages:3.50:2010/11/22:getegid32:2:getegid:2:
+@:LDP man-pages:3.50:2010/11/22:geteuid:2:getuid:2:
+@:LDP man-pages:3.50:2010/11/22:geteuid32:2:geteuid:2:
+☆:LDP man-pages:3.41=>3.50:2010/11/22:getgid:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/11/22:getgid32:2:getgid:2:
+☆:LDP man-pages:3.41=>3.50:2010/11/22:getgroups:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/11/22:getgroups32:2:getgroups:2:
+@:LDP man-pages:3.50:2010/09/20:gethostid:2:gethostid:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/26:gethostname:2:2009/01/15::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/10/01:getitimer:2:2007/10/14::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/02/12:getmsg:2:unimplemented:2:
+☆:LDP man-pages:3.41=>3.50:2010/11/16:getpagesize:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/02/12:getpeername:2:2005/02/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/26:getpgid:2:setpgid:2:
+@:LDP man-pages:3.50:2010/09/26:getpgrp:2:setpgid:2:
+☆:LDP man-pages:3.41=>3.50:2008/09/23:getpid:2:1997/06/27::suto@av.crl.sony.co.jp:SUTO, Mitsuaki:
+@:LDP man-pages:3.50:2013/02/12:getpmsg:2:unimplemented:2:
+@:LDP man-pages:3.50:2008/09/23:getppid:2:getpid:2:
+☆:LDP man-pages:3.41=>3.50:2013/02/12:getpriority:2:2005/10/08::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/11/22:getresgid:2:getresuid:2:
+@:LDP man-pages:3.50:2010/11/22:getresgid32:2:getresgid:2:
+☆:LDP man-pages:3.41=>3.50:2010/11/22:getresuid:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/11/22:getresuid32:2:getresuid:2:
+☆:LDP man-pages:3.41=>3.50:2013/02/11:getrlimit:2:2012/05/26::amotoki@gmail.com:Akihiro MOTOKI:
+×:LDP man-pages:3.50:2010/09/26:getrusage:2:::::
+☆:LDP man-pages:3.41=>3.50:2010/09/26:getsid:2:2002/02/03::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:2008/12/03:getsockname:2:2005/03/15::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2008/12/03:getsockopt:2:2008/07/24::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:2013/02/04:gettid:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/04/26:gettimeofday:2:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/11/22:getuid:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/11/22:getuid32:2:getuid:2:
+×:LDP man-pages:3.50:2013/02/13:getunwind:2:::::
+☆:LDP man-pages:3.41=>3.50:2013/01/19:getxattr:2:2003/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/02/12:gtty:2:unimplemented:2:
+☆:LDP man-pages:3.41=>3.50:2012/12/31:idle:2:2000/01/14::argrath@yo.rim.or.jp:Kentaro Shirakata:
+@:LDP man-pages:3.50:2012/12/31:inb:2:outb:2:
+@:LDP man-pages:3.50:2012/12/31:inb_p:2:outb:2:
+☆:LDP man-pages:3.41=>3.50:2013/01/07:init_module:2:2006/07/30::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/12/31:inl:2:outb:2:
+@:LDP man-pages:3.50:2012/12/31:inl_p:2:outb:2:
+☆:LDP man-pages:3.41=>3.50:2010/10/20:inotify_add_watch:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/04:inotify_init:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/05/04:inotify_init1:2:inotify_init:2:
+☆:LDP man-pages:3.41=>3.50:2010/10/15:inotify_rm_watch:2:2006/08/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/12/31:insb:2:outb:2:
+@:LDP man-pages:3.50:2012/12/31:insl:2:outb:2:
+@:LDP man-pages:3.50:2012/12/31:insw:2:outb:2:
+☆:LDP man-pages:3.41=>3.50:2010/11/11:intro:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/12/31:inw:2:outb:2:
+@:LDP man-pages:3.50:2012/12/31:inw_p:2:outb:2:
+☆:LDP man-pages:3.41=>3.50:2012/07/13:io_cancel:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/07/13:io_destroy:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/11/11:io_getevents:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/07/13:io_setup:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/07/13:io_submit:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2000/09/21:ioctl:2:2011/09/15::tati@kc5.so-net.ne.jp:TACHIBANA Akira:
+☆:LDP man-pages:3.41=>3.50:2007/12/29:ioctl_list:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/03/12:ioperm:2:2007/01/07::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/03/15:iopl:2:2005/02/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/02/12:ioprio_get:2:ioprio_set:2:
+☆:LDP man-pages:3.41=>3.50:2013/02/12:ioprio_set:2:2007/01/08::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/10/16:ipc:2:1997/02/23::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
+@:LDP man-pages:3.50:2013/02/12:isastream:2:unimplemented:2:
+×:LDP man-pages:3.50:2013/01/27:kcmp:2:::::
+☆:LDP man-pages:3.41=>3.50:2012/07/13:kexec_load:2:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+×:LDP man-pages:3.50:2010/02/25:keyctl:2:::::
+☆:LDP man-pages:3.41=>3.50:2013/02/05:kill:2:2005/12/05::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:killpg:2:2005/03/15::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2010/11/22:lchown:2:chown:2:
+@:LDP man-pages:3.50:2010/11/22:lchown32:2:lchown:2:
+@:LDP man-pages:3.50:2013/01/19:lgetxattr:2:getxattr:2:
+☆:LDP man-pages:3.41=>3.50:2013/01/27:link:2:2005/05/12::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2012/05/04:linkat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/11/20:listen:2:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:2013/01/27:listxattr:2:2003/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/01/27:llistxattr:2:listxattr:2:
+☆:LDP man-pages:3.41=>3.50:2012/07/13:llseek:2:2005/01/14::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2013/02/12:lock:2:unimplemented:2:
+☆:LDP man-pages:3.41=>3.50:2004/06/17:lookup_dcookie:2:2005/02/26::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/01/19:lremovexattr:2:removexattr:2:
+☆:LDP man-pages:3.41=>3.50:2011/09/25:lseek:2:2012/05/26::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/01/19:lsetxattr:2:setxattr:2:
+@:LDP man-pages:3.50:2012/11/11:lstat:2:stat:2:
+@:LDP man-pages:3.50:2012/05/07:lstat64:2:lstat:2:
+☆:LDP man-pages:3.40=>3.50:2012/04/28:madvise:2:2012/05/26::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/02/12:madvise1:2:unimplemented:2:
+☆:LDP man-pages:3.41=>3.50:2008/08/15:mbind:2:2008/11/20::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/08/01:migrate_pages:2:2012/05/26::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/04/22:mincore:2:2007/05/04::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/01/27:mkdir:2:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/04:mkdirat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/01/27:mknod:2:2005/09/06::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/04:mknodat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2011/09/14:mlock:2:2012/05/01::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2011/09/14:mlockall:2:mlock:2:
+☆:LDP man-pages:3.41=>3.50:2013/02/25:mmap:2:2012/05/01::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/04/16:mmap2:2:2012/05/01::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/07/13:modify_ldt:2:2007/06/18::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/07/05:mount:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/06/11:move_pages:2:2008/11/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/08/14:mprotect:2:2007/06/13::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/02/12:mpx:2:unimplemented:2:
+☆:LDP man-pages:3.41=>3.50:2012/07/13:mq_getsetattr:2:2006/07/30::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/10/04:mq_notify:2:mq_notify:3:
+@:LDP man-pages:3.50:2009/02/20:mq_open:2:mq_open:3:
+@:LDP man-pages:3.50:2010/09/20:mq_timedreceive:2:mq_receive:3:
+@:LDP man-pages:3.50:2010/09/20:mq_timedsend:2:mq_send:3:
+@:LDP man-pages:3.50:2010/08/29:mq_unlink:2:mq_unlink:3:
+☆:LDP man-pages:3.41=>3.50:2010/06/10:mremap:2:2012/05/01::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/31:msgctl:2:2005/10/11::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/31:msgget:2:2005/03/04::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/31:msgop:2:2006/03/06::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/05/31:msgrcv:2:msgop:2:
+@:LDP man-pages:3.50:2012/05/31:msgsnd:2:msgop:2:
+☆:LDP man-pages:3.41=>3.50:2008/04/22:msync:2:2008/07/24::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:2011/09/14:munlock:2:mlock:2:
+@:LDP man-pages:3.50:2011/09/14:munlockall:2:mlock:2:
+@:LDP man-pages:3.50:2013/02/25:munmap:2:mmap:2:
+☆:LDP man-pages:3.41=>3.50:2009/01/19:nanosleep:2:2008/08/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/03/05:nfsservctl:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2007/07/26:nice:2:2005/10/08::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/11/11:oldfstat:2:stat:2:
+@:LDP man-pages:3.50:2012/11/11:oldlstat:2:stat:2:
+@:LDP man-pages:3.50:2008/12/03:oldolduname:2:uname:2:
+@:LDP man-pages:3.50:2012/11/11:oldstat:2:stat:2:
+@:LDP man-pages:3.50:2008/12/03:olduname:2:uname:2:
+☆:LDP man-pages:3.41=>3.50:2013/02/18:open:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/04:openat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/12/31:outb:2:2005/10/30::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:2012/12/31:outb_p:2:outb:2:
+@:LDP man-pages:3.50:2012/12/31:outl:2:outb:2:
+@:LDP man-pages:3.50:2012/12/31:outl_p:2:outb:2:
+@:LDP man-pages:3.50:2012/12/31:outsb:2:outb:2:
+@:LDP man-pages:3.50:2012/12/31:outsl:2:outb:2:
+@:LDP man-pages:3.50:2012/12/31:outsw:2:outb:2:
+@:LDP man-pages:3.50:2012/12/31:outw:2:outb:2:
+@:LDP man-pages:3.50:2012/12/31:outw_p:2:outb:2:
+☆:LDP man-pages:3.41=>3.50:2008/10/06:pause:2:1997/06/27::suto@av.crl.sony.co.jp:SUTO, Mitsuaki:
+@:LDP man-pages:3.50:2003/07/14:pciconfig_iobase:2:pciconfig_read:2:
+☆:LDP man-pages:3.41=>3.50:2003/07/14:pciconfig_read:2:2004/07/18::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2003/07/14:pciconfig_write:2:pciconfig_read:2:
+×:LDP man-pages:3.50:2013/02/04:perf_event_open:2:::::
+×:LDP man-pages:3.50:2013/02/13:perfmonctl:2:::::
+☆:LDP man-pages:3.41=>3.50:2003/01/01:personality:2:2003/09/14::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:2013/02/12:phys:2:unimplemented:2:
+☆:LDP man-pages:3.41=>3.50:2012/02/14:pipe:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/02/14:pipe2:2:pipe:2:
+☆:LDP man-pages:3.41=>3.50:2012/07/13:pivot_root:2:2000/06/14::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+☆:LDP man-pages:3.41=>3.50:2012/08/17:poll:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/10/09:posix_fadvise:2:2012/05/26::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/08/17:ppoll:2:poll:2:
+☆:LDP man-pages:3.40=>3.50:2013/02/25:prctl:2:2012/05/26::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/04/30:pread:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/04/30:pread64:2:pread:2:
+@:LDP man-pages:3.50:2010/11/17:preadv:2:readv:2:
+@:LDP man-pages:3.50:2013/02/11:prlimit:2:getrlimit:2:
+×:LDP man-pages:3.50:2012/04/25:process_vm_readv:2:::::
+※:LDP man-pages:3.50:2012/04/25:process_vm_writev:2:process_vm_readv:2:
+@:LDP man-pages:3.50:2013/02/12:prof:2:unimplemented:2:
+@:LDP man-pages:3.50:2012/08/17:pselect:2:select:2:
+@:LDP man-pages:3.50:2012/08/17:pselect6:2:select:2:
+×:LDP man-pages:3.50:2013/02/16:ptrace:2:::::
+@:LDP man-pages:3.50:2013/02/12:putmsg:2:unimplemented:2:
+@:LDP man-pages:3.50:2013/02/12:putpmsg:2:unimplemented:2:
+@:LDP man-pages:3.50:2012/04/30:pwrite:2:pread:2:
+@:LDP man-pages:3.50:2012/04/30:pwrite64:2:pwrite:2:
+@:LDP man-pages:3.50:2010/11/17:pwritev:2:readv:2:
+☆:LDP man-pages:3.41=>3.50:2013/01/27:query_module:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+×:LDP man-pages:3.50:2010/06/16:quotactl:2:::::
+☆:LDP man-pages:3.41=>3.50:2013/02/12:read:2:2005/10/15::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/10:readahead:2:2005/02/27::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/07/13:readdir:2:1997/02/23::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
+☆:LDP man-pages:3.41=>3.50:2011/09/20:readlink:2:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/04:readlinkat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/11/17:readv:2:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/10/31:reboot:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/12/21:recv:2:2008/12/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/12/21:recvfrom:2:recv:2:
+×:LDP man-pages:3.50:2012/12/24:recvmmsg:2:::::
+@:LDP man-pages:3.50:2012/12/21:recvmsg:2:recv:2:
+☆:LDP man-pages:3.41=>3.50:2008/04/22:remap_file_pages:2:2005/10/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/01/19:removexattr:2:2003/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/01/27:rename:2:2007/05/04::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/04:renameat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+×:LDP man-pages:3.50:2010/02/25:request_key:2:::::
+☆:LDP man-pages:3.41=>3.50:2008/05/08:rmdir:2:2006/07/26::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/02/12:rt_sigaction:2:sigaction:2:
+@:LDP man-pages:3.50:2008/10/04:rt_sigpending:2:sigpending:2:
+@:LDP man-pages:3.50:2012/04/15:rt_sigprocmask:2:sigprocmask:2:
+×:LDP man-pages:3.50:2012/07/13:rt_sigqueueinfo:2:::::
+@:LDP man-pages:3.50:2008/06/26:rt_sigreturn:2:sigreturn:2:
+@:LDP man-pages:3.50:2008/08/29:rt_sigsuspend:2:sigsuspend:2:
+@:LDP man-pages:3.50:2012/05/02:rt_sigtimedwait:2:sigtimedwait:2:
+※:LDP man-pages:3.50:2012/07/13:rt_tgsigqueueinfo:2:rt_sigqueueinfo:2:
+×:LDP man-pages:3.50:2012/12/17:s390_runtime_instr:2:::::
+@:LDP man-pages:3.50:2010/09/20:sbrk:2:brk:2:
+☆:LDP man-pages:3.41=>3.50:2006/03/23:sched_get_priority_max:2:2006/04/14::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2006/03/23:sched_get_priority_min:2:sched_get_priority_max:2:
+@:LDP man-pages:3.50:2013/02/11:sched_getaffinity:2:sched_setaffinity:2:
+@:LDP man-pages:3.50:2013/02/12:sched_getparam:2:sched_setparam:2:
+@:LDP man-pages:3.50:2013/02/12:sched_getscheduler:2:sched_setscheduler:2:
+☆:LDP man-pages:3.41=>3.50:2011/10/16:sched_rr_get_interval:2:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/02/11:sched_setaffinity:2:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/02/12:sched_setparam:2:2006/04/14::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/02/12:sched_setscheduler:2:2012/06/04::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/10/18:sched_yield:2:1997/02/23::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
+@:LDP man-pages:3.50:2013/02/12:security:2:unimplemented:2:
+☆:LDP man-pages:3.41=>3.50:2012/08/17:select:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/08/03:select_tut:2:2009/03/09::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/31:semctl:2:2005/10/11::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/31:semget:2:2006/07/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/08/27:semop:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/08/27:semtimedop:2:semop:2:
+☆:LDP man-pages:3.41=>3.50:2012/04/23:send:2:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2011/09/14:sendfile:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2011/09/14:sendfile64:2:sendfile:2:
+×:LDP man-pages:3.50:2012/12/16:sendmmsg:2:::::
+@:LDP man-pages:3.50:2012/04/23:sendmsg:2:send:2:
+@:LDP man-pages:3.50:2012/04/23:sendto:2:send:2:
+☆:LDP man-pages:3.41=>3.50:2008/08/15:set_mempolicy:2:2008/11/20::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+※:LDP man-pages:3.50:2012/07/13:set_robust_list:2:get_robust_list:2:
+☆:LDP man-pages:3.41=>3.50:2012/07/13:set_thread_area:2:2003/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/07/19:set_tid_address:2:2005/02/14::ysato444@yahoo.co.jp:Yuichi SATO:
+※:LDP man-pages:3.50:2009/03/15:setcontext:2:getcontext:3:
+@:LDP man-pages:3.50:2012/10/25:setdomainname:2:getdomainname:2:
+@:LDP man-pages:3.50:2012/07/02:setegid:2:seteuid:2:
+☆:LDP man-pages:3.41=>3.50:2012/07/02:seteuid:2:2010/04/25::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/11/22:setfsgid:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/11/22:setfsgid32:2:setfsgid:2:
+☆:LDP man-pages:3.41=>3.50:2010/11/22:setfsuid:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/11/22:setfsuid32:2:setfsuid:2:
+☆:LDP man-pages:3.41=>3.50:2010/11/22:setgid:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/11/22:setgid32:2:setgid:2:
+@:LDP man-pages:3.50:2010/11/22:setgroups:2:getgroups:2:
+@:LDP man-pages:3.50:2010/11/22:setgroups32:2:setgroups:2:
+@:LDP man-pages:3.50:2010/09/20:sethostid:2:gethostid:3:
+@:LDP man-pages:3.50:2010/09/26:sethostname:2:gethostname:2:
+@:LDP man-pages:3.50:2012/10/01:setitimer:2:getitimer:2:
+☆:LDP man-pages:3.41=>3.50:2013/01/01:setns:2:2012/06/04::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/26:setpgid:2:2010/04/25::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/26:setpgrp:2:setpgid:2:
+@:LDP man-pages:3.50:2013/02/12:setpriority:2:getpriority:2:
+@:LDP man-pages:3.50:2010/11/22:setregid:2:setreuid:2:
+@:LDP man-pages:3.50:2010/11/22:setregid32:2:setregid:2:
+@:LDP man-pages:3.50:2010/11/22:setresgid:2:setresuid:2:
+@:LDP man-pages:3.50:2010/11/22:setresgid32:2:setresgid:2:
+☆:LDP man-pages:3.41=>3.50:2010/11/22:setresuid:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/11/22:setresuid32:2:setresuid:2:
+☆:LDP man-pages:3.41=>3.50:2010/11/22:setreuid:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/11/22:setreuid32:2:setreuid:2:
+@:LDP man-pages:3.50:2013/02/11:setrlimit:2:getrlimit:2:
+☆:LDP man-pages:3.41=>3.50:2013/02/11:setsid:2:2005/03/15::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2008/12/03:setsockopt:2:getsockopt:2:
+@:LDP man-pages:3.50:2012/04/26:settimeofday:2:gettimeofday:2:
+☆:LDP man-pages:3.41=>3.50:2010/11/22:setuid:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/11/22:setuid32:2:setuid:2:
+☆:LDP man-pages:3.41=>3.50:2008/12/03:setup:2:2008/07/24::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:2013/01/19:setxattr:2:2003/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/07/13:sgetmask:2:2007/10/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/02/12:shmat:2:shmop:2:
+☆:LDP man-pages:3.41=>3.50:2012/05/31:shmctl:2:2006/07/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/02/12:shmdt:2:shmop:2:
+☆:LDP man-pages:3.41=>3.50:2012/05/31:shmget:2:2006/07/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/02/12:shmop:2:2006/04/14::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/09/06:shutdown:2:2001/11/09::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:2013/02/12:sigaction:2:2012/05/26::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/26:sigaltstack:2:2006/01/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/02/09:signal:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2009/01/13:signalfd:2:2009/03/09::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2009/01/13:signalfd4:2:signalfd:2:
+☆:LDP man-pages:3.41=>3.50:2008/10/04:sigpending:2:2005/12/05::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/04/15:sigprocmask:2:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/03/25:sigqueue:2:sigqueue:3:
+☆:LDP man-pages:3.41=>3.50:2008/06/26:sigreturn:2:2005/09/06::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/08/29:sigsuspend:2:2005/10/05::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/07/21:sigtimedwait:2:sigwaitinfo:2:
+☆:LDP man-pages:3.41=>3.50:2012/07/21:sigwaitinfo:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2009/01/19:socket:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/10/16:socketcall:2:1997/03/03::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
+☆:LDP man-pages:3.41=>3.50:2008/10/11:socketpair:2:2002/09/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/04:splice:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+×:LDP man-pages:3.50:2012/08/05:spu_create:2:::::
+☆:LDP man-pages:3.41=>3.50:2012/08/05:spu_run:2:2007/10/23::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/07/13:ssetmask:2:sgetmask:2:
+☆:LDP man-pages:3.41=>3.50:2012/11/11:stat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/11/11:stat64:2:stat:2:
+☆:LDP man-pages:3.41=>3.50:2010/11/21:statfs:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/11/21:statfs64:2:statfs:2:
+@:LDP man-pages:3.50:2003/08/22:statvfs:2:statvfs:3:
+☆:LDP man-pages:3.41=>3.50:2010/02/25:stime:2:2003/09/14::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:2013/02/12:stty:2:unimplemented:2:
+×:LDP man-pages:3.50:2012/07/13:subpage_prot:2:::::
+@:LDP man-pages:3.50:2010/11/15:swapoff:2:swapon:2:
+☆:LDP man-pages:3.41=>3.50:2010/11/15:swapon:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/01/27:symlink:2:2005/03/15::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2012/05/04:symlinkat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/04:sync:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/10/09:sync_file_range:2:2012/05/26::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/10/09:sync_file_range2:2:sync_file_range:2:
+@:LDP man-pages:3.50:2012/05/04:syncfs:2:sync:2:
+☆:LDP man-pages:3.41=>3.50:2012/08/14:syscall:2:2002/08/20::ysato@h4.dion.ne.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2013/03/10:syscalls:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/12/22:sysctl:2:1999/12/03::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
+☆:LDP man-pages:3.41=>3.50:2010/06/27:sysfs:2:2001/06/02::ysato@h4.dion.ne.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2012/05/05:sysinfo:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/11/29:syslog:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/04:tee:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/07/13:tgkill:2:tkill:2:
+☆:LDP man-pages:3.41=>3.50:2011/09/09:time:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+×:LDP man-pages:3.50:2010/09/27:timer_create:2:::::
+×:LDP man-pages:3.50:2009/02/20:timer_delete:2:::::
+×:LDP man-pages:3.50:2009/02/20:timer_getoverrun:2:::::
+※:LDP man-pages:3.50:2012/10/15:timer_gettime:2:timer_settime:2:
+×:LDP man-pages:3.50:2012/10/15:timer_settime:2:::::
+☆:LDP man-pages:3.41=>3.50:2011/09/14:timerfd_create:2:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2011/09/14:timerfd_gettime:2:timerfd_create:2:
+@:LDP man-pages:3.50:2011/09/14:timerfd_settime:2:timerfd_create:2:
+☆:LDP man-pages:3.41=>3.50:2012/10/22:times:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/07/13:tkill:2:2005/03/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2011/09/08:truncate:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2011/09/08:truncate64:2:truncate:2:
+@:LDP man-pages:3.50:2013/02/12:tuxcall:2:unimplemented:2:
+@:LDP man-pages:3.50:2013/02/11:ugetrlimit:2:getrlimit:2:
+☆:LDP man-pages:3.41=>3.50:2008/01/09:umask:2:2008/02/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/06/19:umount:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/06/19:umount2:2:umount:2:
+☆:LDP man-pages:3.41=>3.50:2008/12/03:uname:2:2002/02/14::ysato@h4.dion.ne.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2013/02/12:unimplemented:2:2003/03/06::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
+☆:LDP man-pages:3.41=>3.50:2011/09/15:unlink:2:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/04:unlinkat:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/12/31:unshare:2:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2005/01/09:uselib:2:2005/04/21::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2003/08/04:ustat:2:2004/06/13::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2008/08/06:utime:2:2006/10/14::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+×:LDP man-pages:3.50:2012/03/25:utimensat:2:::::
+@:LDP man-pages:3.50:2008/08/06:utimes:2:utime:2:
+☆:LDP man-pages:3.41=>3.50:2012/08/05:vfork:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2007/07/26:vhangup:2:2005/03/15::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2009/02/20:vm86:2:2004/06/13::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2009/02/20:vm86old:2:vm86:2:
+☆:LDP man-pages:3.41=>3.50:2012/05/04:vmsplice:2:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/02/12:vserver:2:unimplemented:2:
+☆:LDP man-pages:3.41=>3.50:2012/12/21:wait:2:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/09/23:wait3:2:wait4:2:
+☆:LDP man-pages:3.41=>3.50:2012/09/23:wait4:2:2005/03/04::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/12/21:waitid:2:wait:2:
+@:LDP man-pages:3.50:2012/12/21:waitpid:2:wait:2:
+☆:LDP man-pages:3.41=>3.50:2013/01/27:write:2:2007/05/03::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/11/17:writev:2:readv:2:
+@:LDP man-pages:3.50:2007/12/28:CIRCLEQ_ENTRY:3:queue:3:
+@:LDP man-pages:3.50:2007/12/28:CIRCLEQ_HEAD:3:queue:3:
+@:LDP man-pages:3.50:2007/12/28:CIRCLEQ_INIT:3:queue:3:
+@:LDP man-pages:3.50:2007/12/28:CIRCLEQ_INSERT_AFTER:3:queue:3:
+@:LDP man-pages:3.50:2007/12/28:CIRCLEQ_INSERT_BEFORE:3:queue:3:
+@:LDP man-pages:3.50:2007/12/28:CIRCLEQ_INSERT_HEAD:3:queue:3:
+@:LDP man-pages:3.50:2007/12/28:CIRCLEQ_INSERT_TAIL:3:queue:3:
+@:LDP man-pages:3.50:2007/12/28:CIRCLEQ_REMOVE:3:queue:3:
+@:LDP man-pages:3.50:2008/11/20:CMSG_ALIGN:3:cmsg:3:
+@:LDP man-pages:3.50:2008/11/20:CMSG_FIRSTHDR:3:cmsg:3:
+@:LDP man-pages:3.50:2008/11/20:CMSG_NXTHDR:3:cmsg:3:
+@:LDP man-pages:3.50:2008/11/20:CMSG_SPACE:3:cmsg:3:
+@:LDP man-pages:3.50:2012/03/15:CPU_ALLOC:3:CPU_SET:3:
+@:LDP man-pages:3.50:2012/03/15:CPU_ALLOC_SIZE:3:CPU_SET:3:
+@:LDP man-pages:3.50:2012/03/15:CPU_AND:3:CPU_SET:3:
+@:LDP man-pages:3.50:2012/03/15:CPU_AND_S:3:CPU_SET:3:
+@:LDP man-pages:3.50:2012/03/15:CPU_CLR:3:CPU_SET:3:
+@:LDP man-pages:3.50:2012/03/15:CPU_CLR_S:3:CPU_SET:3:
+@:LDP man-pages:3.50:2012/03/15:CPU_COUNT:3:CPU_SET:3:
+@:LDP man-pages:3.50:2012/03/15:CPU_COUNT_S:3:CPU_SET:3:
+@:LDP man-pages:3.50:2012/03/15:CPU_EQUAL:3:CPU_SET:3:
+@:LDP man-pages:3.50:2012/03/15:CPU_EQUAL_S:3:CPU_SET:3:
+@:LDP man-pages:3.50:2012/03/15:CPU_FREE:3:CPU_SET:3:
+@:LDP man-pages:3.50:2012/03/15:CPU_ISSET:3:CPU_SET:3:
+@:LDP man-pages:3.50:2012/03/15:CPU_ISSET_S:3:CPU_SET:3:
+@:LDP man-pages:3.50:2012/03/15:CPU_OR:3:CPU_SET:3:
+@:LDP man-pages:3.50:2012/03/15:CPU_OR_S:3:CPU_SET:3:
+☆:LDP man-pages:3.41=>3.50:2012/03/15:CPU_SET:3:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/03/15:CPU_SET_S:3:CPU_SET:3:
+@:LDP man-pages:3.50:2012/03/15:CPU_XOR:3:CPU_SET:3:
+@:LDP man-pages:3.50:2012/03/15:CPU_XOR_S:3:CPU_SET:3:
+@:LDP man-pages:3.50:2012/03/15:CPU_ZERO:3:CPU_SET:3:
+@:LDP man-pages:3.50:2012/03/15:CPU_ZERO_S:3:CPU_SET:3:
+@:LDP man-pages:3.50:2007/05/18:DES_FAILED:3:des_crypt:3:
+@:LDP man-pages:3.50:2012/08/17:FD_CLR:3:select:2:
+@:LDP man-pages:3.50:2012/08/17:FD_ISSET:3:select:2:
+@:LDP man-pages:3.50:2012/08/17:FD_SET:3:select:2:
+@:LDP man-pages:3.50:2012/08/17:FD_ZERO:3:select:2:
+@:LDP man-pages:3.50:2007/07/26:HUGE_VAL:3:INFINITY:3:
+@:LDP man-pages:3.50:2007/07/26:HUGE_VALF:3:INFINITY:3:
+@:LDP man-pages:3.50:2007/07/26:HUGE_VALL:3:INFINITY:3:
+☆:LDP man-pages:3.41=>3.50:2007/07/26:INFINITY:3:2005/02/14::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2007/12/28:LIST_ENTRY:3:queue:3:
+@:LDP man-pages:3.50:2007/12/28:LIST_HEAD:3:queue:3:
+@:LDP man-pages:3.50:2007/12/28:LIST_INIT:3:queue:3:
+@:LDP man-pages:3.50:2007/12/28:LIST_INSERT_AFTER:3:queue:3:
+@:LDP man-pages:3.50:2007/12/28:LIST_INSERT_HEAD:3:queue:3:
+@:LDP man-pages:3.50:2007/12/28:LIST_REMOVE:3:queue:3:
+☆:LDP man-pages:3.41=>3.50:1999/07/04:MB_CUR_MAX:3:1999/09/11::cz8cb01@linux.or.jp:HAYAKAWA Hitoshi:
+☆:LDP man-pages:3.41=>3.50:1999/07/04:MB_LEN_MAX:3:1999/09/11::cz8cb01@linux.or.jp:HAYAKAWA Hitoshi:
+@:LDP man-pages:3.50:2007/07/26:NAN:3:INFINITY:3:
+@:LDP man-pages:3.50:2007/12/28:TAILQ_ENTRY:3:queue:3:
+@:LDP man-pages:3.50:2007/12/28:TAILQ_HEAD:3:queue:3:
+@:LDP man-pages:3.50:2007/12/28:TAILQ_INIT:3:queue:3:
+@:LDP man-pages:3.50:2007/12/28:TAILQ_INSERT_AFTER:3:queue:3:
+@:LDP man-pages:3.50:2007/12/28:TAILQ_INSERT_HEAD:3:queue:3:
+@:LDP man-pages:3.50:2007/12/28:TAILQ_INSERT_TAIL:3:queue:3:
+@:LDP man-pages:3.50:2007/12/28:TAILQ_REMOVE:3:queue:3:
+@:LDP man-pages:3.50:2010/10/13:__after_morecore_hook:3:malloc_hook:3:
+@:LDP man-pages:3.50:2001/12/16:__fbufsize:3:stdio_ext:3:
+@:LDP man-pages:3.50:2001/12/16:__flbf:3:stdio_ext:3:
+@:LDP man-pages:3.50:2001/12/16:__fpending:3:stdio_ext:3:
+@:LDP man-pages:3.50:2001/12/15:__fpurge:3:fpurge:3:
+@:LDP man-pages:3.50:2001/12/16:__freadable:3:stdio_ext:3:
+@:LDP man-pages:3.50:2001/12/16:__freading:3:stdio_ext:3:
+@:LDP man-pages:3.50:2010/10/13:__free_hook:3:malloc_hook:3:
+@:LDP man-pages:3.50:2001/12/16:__fsetlocking:3:stdio_ext:3:
+@:LDP man-pages:3.50:2001/12/16:__fwritable:3:stdio_ext:3:
+@:LDP man-pages:3.50:2001/12/16:__fwriting:3:stdio_ext:3:
+@:LDP man-pages:3.50:2010/10/13:__malloc_hook:3:malloc_hook:3:
+@:LDP man-pages:3.50:2010/10/13:__malloc_initialize_hook:3:malloc_hook:3:
+@:LDP man-pages:3.50:2010/10/13:__memalign_hook:3:malloc_hook:3:
+@:LDP man-pages:3.50:2010/10/13:__realloc_hook:3:malloc_hook:3:
+☆:LDP man-pages:3.41=>3.50:2012/12/31:__setfpucw:3:2000/09/20::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+@:LDP man-pages:3.50:2001/12/16:_flushlbf:3:stdio_ext:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:a64l:3:2004/01/17::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2007/12/15:abort:3:1998/02/18::tyoshino@eng.toyo.ac.jp:Takashi Yoshino:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:abs:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:acos:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:acosf:3:acos:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:acosh:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:acoshf:3:acosh:3:
+@:LDP man-pages:3.50:2010/09/20:acoshl:3:acosh:3:
+@:LDP man-pages:3.50:2010/09/20:acosl:3:acos:3:
+@:LDP man-pages:3.50:2009/09/15:addmntent:3:getmntent:3:
+☆:LDP man-pages:3.41=>3.50:2008/06/14:addseverity:3:2004/07/18::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2008/06/22:adjtime:3:2006/07/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/08:aio_cancel:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/08:aio_error:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/08:aio_fsync:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/04/26:aio_init:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/08:aio_read:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/08:aio_return:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/08:aio_suspend:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/08:aio_write:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/03/23:aligned_alloc:3:posix_memalign:3:
+☆:LDP man-pages:3.41=>3.50:2008/01/24:alloca:3:2002/09/19::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2012/04/26:alphasort:3:scandir:3:
+@:LDP man-pages:3.50:2007/05/18:argz:3:argz_add:3:
+☆:LDP man-pages:3.41=>3.50:2007/05/18:argz_add:3:2003/03/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2007/05/18:argz_add_sep:3:argz_add:3:
+@:LDP man-pages:3.50:2007/05/18:argz_append:3:argz_add:3:
+@:LDP man-pages:3.50:2007/05/18:argz_count:3:argz_add:3:
+@:LDP man-pages:3.50:2007/05/18:argz_create:3:argz_add:3:
+@:LDP man-pages:3.50:2007/05/18:argz_create_sep:3:argz_add:3:
+@:LDP man-pages:3.50:2007/05/18:argz_delete:3:argz_add:3:
+@:LDP man-pages:3.50:2007/05/18:argz_extract:3:argz_add:3:
+@:LDP man-pages:3.50:2007/05/18:argz_insert:3:argz_add:3:
+@:LDP man-pages:3.50:2007/05/18:argz_next:3:argz_add:3:
+@:LDP man-pages:3.50:2007/05/18:argz_replace:3:argz_add:3:
+@:LDP man-pages:3.50:2007/05/18:argz_stringify:3:argz_add:3:
+@:LDP man-pages:3.50:2010/02/25:asctime:3:ctime:3:
+@:LDP man-pages:3.50:2010/02/25:asctime_r:3:ctime:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:asin:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:asinf:3:asin:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:asinh:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:asinhf:3:asinh:3:
+@:LDP man-pages:3.50:2010/09/20:asinhl:3:asinh:3:
+@:LDP man-pages:3.50:2010/09/20:asinl:3:asin:3:
+☆:LDP man-pages:3.41=>3.50:2001/12/18:asprintf:3:2002/01/14::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+☆:LDP man-pages:3.41=>3.50:2002/08/25:assert:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:2002/08/25:assert_perror:3:2003/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:atan:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:atan2:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:atan2f:3:atan2:3:
+@:LDP man-pages:3.50:2010/09/20:atan2l:3:atan2:3:
+@:LDP man-pages:3.50:2010/09/20:atanf:3:atan:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/11:atanh:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/11:atanhf:3:atanh:3:
+@:LDP man-pages:3.50:2010/09/11:atanhl:3:atanh:3:
+@:LDP man-pages:3.50:2010/09/20:atanl:3:atan:3:
+☆:LDP man-pages:3.41=>3.50:2008/12/05:atexit:3:2009/01/15::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/08/03:atof:3:1998/02/18::tyoshino@eng.toyo.ac.jp:Takashi Yoshino:
+☆:LDP man-pages:3.41=>3.50:2012/08/03:atoi:3:2001/02/09::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:2012/08/03:atol:3:atoi:3:
+@:LDP man-pages:3.50:2012/08/03:atoll:3:atoi:3:
+@:LDP man-pages:3.50:2012/08/03:atoq:3:atoi:3:
+@:LDP man-pages:3.50:2008/07/17:auth_destroy:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:authnone_create:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:authunix_create:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:authunix_create_default:3:rpc:3:
+☆:LDP man-pages:3.41=>3.50:2008/06/14:backtrace:3:2007/10/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/06/14:backtrace_symbols:3:backtrace:3:
+@:LDP man-pages:3.50:2008/06/14:backtrace_symbols_fd:3:backtrace:3:
+☆:LDP man-pages:3.41=>3.50:2009/03/30:basename:3:2007/05/03::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/08/06:bcmp:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:2009/03/15:bcopy:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:2010/09/10:be16toh:3:endian:3:
+@:LDP man-pages:3.50:2010/09/10:be32toh:3:endian:3:
+@:LDP man-pages:3.50:2010/09/10:be64toh:3:endian:3:
+☆:LDP man-pages:3.41=>3.50:2008/12/03:bindresvport:3:2007/06/13::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2009/03/15:bsd_signal:3:2007/06/03::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2003/11/01:bsearch:3:2005/02/26::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2002/01/20:bstring:3:2003/11/13::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:2011/09/22:btowc:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/04/23:btree:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2009/01/15:byteorder:3:2005/11/04::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/08/06:bzero:3:2003/03/14::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/08/11:cabs:3:2003/07/23::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/11:cabsf:3:cabs:3:
+@:LDP man-pages:3.50:2008/08/11:cabsl:3:cabs:3:
+☆:LDP man-pages:3.41=>3.50:2011/09/15:cacos:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2011/09/15:cacosf:3:cacos:3:
+☆:LDP man-pages:3.41=>3.50:2011/09/15:cacosh:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2011/09/15:cacoshf:3:cacosh:3:
+@:LDP man-pages:3.50:2011/09/15:cacoshl:3:cacosh:3:
+@:LDP man-pages:3.50:2011/09/15:cacosl:3:cacos:3:
+@:LDP man-pages:3.50:2012/05/10:calloc:3:malloc:3:
+@:LDP man-pages:3.50:2008/07/17:callrpc:3:rpc:3:
+☆:LDP man-pages:3.41=>3.50:2013/03/10:canonicalize_file_name:3:2005/09/06::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/08/11:carg:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/11:cargf:3:carg:3:
+@:LDP man-pages:3.50:2008/08/11:cargl:3:carg:3:
+☆:LDP man-pages:3.41=>3.50:2008/08/11:casin:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/11:casinf:3:casin:3:
+☆:LDP man-pages:3.41=>3.50:2008/08/11:casinh:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/11:casinhf:3:casinh:3:
+@:LDP man-pages:3.50:2008/08/11:casinhl:3:casinh:3:
+@:LDP man-pages:3.50:2008/08/11:casinl:3:casin:3:
+☆:LDP man-pages:3.41=>3.50:2011/09/15:catan:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2011/09/15:catanf:3:catan:3:
+☆:LDP man-pages:3.41=>3.50:2011/09/15:catanh:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2011/09/15:catanhf:3:catanh:3:
+@:LDP man-pages:3.50:2011/09/15:catanhl:3:catanh:3:
+@:LDP man-pages:3.50:2011/09/15:catanl:3:catan:3:
+@:LDP man-pages:3.50:2001/12/14:catclose:3:catopen:3:
+☆:LDP man-pages:3.41=>3.50:1998/08/09:catgets:3:1999/03/01::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+☆:LDP man-pages:3.41=>3.50:2001/12/14:catopen:3:2002/01/14::ysato@h4.dion.ne.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2007/05/18:cbc_crypt:3:des_crypt:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:cbrt:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:cbrtf:3:cbrt:3:
+@:LDP man-pages:3.50:2010/09/20:cbrtl:3:cbrt:3:
+☆:LDP man-pages:3.41=>3.50:2008/08/11:ccos:3:2003/07/28::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/11:ccosf:3:ccos:3:
+☆:LDP man-pages:3.41=>3.50:2008/08/11:ccosh:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/11:ccoshf:3:ccosh:3:
+@:LDP man-pages:3.50:2008/08/11:ccoshl:3:ccosh:3:
+@:LDP man-pages:3.50:2008/08/11:ccosl:3:ccos:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:ceil:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:ceilf:3:ceil:3:
+@:LDP man-pages:3.50:2010/09/20:ceill:3:ceil:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/12:cerf:3:2005/02/26::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/12:cerfc:3:cerf:3:
+@:LDP man-pages:3.50:2010/09/12:cerfcf:3:cerf:3:
+@:LDP man-pages:3.50:2010/09/12:cerfcl:3:cerf:3:
+@:LDP man-pages:3.50:2010/09/12:cerff:3:cerf:3:
+@:LDP man-pages:3.50:2010/09/12:cerfl:3:cerf:3:
+☆:LDP man-pages:3.41=>3.50:2008/08/11:cexp:3:2003/08/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/02/27:cexp2:3:2005/03/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/02/27:cexp2f:3:cexp2:3:
+@:LDP man-pages:3.50:2013/02/27:cexp2l:3:cexp2:3:
+@:LDP man-pages:3.50:2008/08/11:cexpf:3:cexp:3:
+@:LDP man-pages:3.50:2008/08/11:cexpl:3:cexp:3:
+@:LDP man-pages:3.50:2013/03/15:cfgetispeed:3:termios:3:
+@:LDP man-pages:3.50:2013/03/15:cfgetospeed:3:termios:3:
+@:LDP man-pages:3.50:2013/03/15:cfmakeraw:3:termios:3:
+☆:LDP man-pages:3.41=>3.50:2007/07/26:cfree:3:2004/08/14::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2013/03/15:cfsetispeed:3:termios:3:
+@:LDP man-pages:3.50:2013/03/15:cfsetospeed:3:termios:3:
+@:LDP man-pages:3.50:2013/03/15:cfsetspeed:3:termios:3:
+☆:LDP man-pages:3.41=>3.50:2008/08/11:cimag:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/11:cimagf:3:cimag:3:
+@:LDP man-pages:3.50:2008/08/11:cimagl:3:cimag:3:
+☆:LDP man-pages:3.41=>3.50:2010/10/04:clearenv:3:2002/08/20::ysato@h4.dion.ne.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2008/08/29:clearerr:3:ferror:3:
+@:LDP man-pages:3.50:2008/08/29:clearerr_unlocked:3:unlocked_stdio:3:
+@:LDP man-pages:3.50:2008/07/17:clnt_broadcast:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:clnt_call:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:clnt_control:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:clnt_create:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:clnt_destroy:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:clnt_freeres:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:clnt_geterr:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:clnt_pcreateerror:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:clnt_perrno:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:clnt_perror:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:clnt_spcreateerror:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:clnt_sperrno:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:clnt_sperror:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:clntraw_create:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:clnttcp_create:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:clntudp_bufcreate:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:clntudp_create:3:rpc:3:
+☆:LDP man-pages:3.41=>3.50:2008/08/28:clock:3:2007/06/01::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+×:LDP man-pages:3.50:2012/10/29:clock_getcpuclockid:3:::::
+@:LDP man-pages:3.50:2013/02/25:clock_getres:3:clock_getres:2:
+@:LDP man-pages:3.50:2013/02/25:clock_gettime:3:clock_getres:2:
+@:LDP man-pages:3.50:2013/02/25:clock_settime:3:clock_getres:2:
+☆:LDP man-pages:3.41=>3.50:2008/08/11:clog:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/08/11:clog10:3:2007/01/07::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/11:clog10f:3:clog10:3:
+@:LDP man-pages:3.50:2008/08/11:clog10l:3:clog10:3:
+☆:LDP man-pages:3.41=>3.50:2008/08/07:clog2:3:2007/01/07::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/07:clog2f:3:clog2:3:
+@:LDP man-pages:3.50:2008/08/07:clog2l:3:clog2:3:
+@:LDP man-pages:3.50:2008/08/11:clogf:3:clog:3:
+@:LDP man-pages:3.50:2008/08/11:clogl:3:clog:3:
+☆:LDP man-pages:3.41=>3.50:2008/09/23:closedir:3:2005/03/15::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2012/08/17:closelog:3:syslog:3:
+☆:LDP man-pages:3.41=>3.50:2008/11/20:cmsg:3:1999/08/17::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+☆:LDP man-pages:3.41=>3.50:2012/05/10:confstr:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/08/11:conj:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/11:conjf:3:conj:3:
+@:LDP man-pages:3.50:2008/08/11:conjl:3:conj:3:
+☆:LDP man-pages:3.41=>3.50:2012/03/25:copysign:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/03/25:copysignf:3:copysign:3:
+@:LDP man-pages:3.50:2012/03/25:copysignl:3:copysign:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/11:cos:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/11:cosf:3:cos:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:cosh:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:coshf:3:cosh:3:
+@:LDP man-pages:3.50:2010/09/20:coshl:3:cosh:3:
+@:LDP man-pages:3.50:2010/09/11:cosl:3:cos:3:
+☆:LDP man-pages:3.41=>3.50:2008/08/11:cpow:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/11:cpowf:3:cpow:3:
+@:LDP man-pages:3.50:2008/08/11:cpowl:3:cpow:3:
+☆:LDP man-pages:3.41=>3.50:2010/06/10:cproj:3:2005/03/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/06/10:cprojf:3:cproj:3:
+@:LDP man-pages:3.50:2010/06/10:cprojl:3:cproj:3:
+☆:LDP man-pages:3.41=>3.50:2008/08/11:creal:3:2003/07/28::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/11:crealf:3:creal:3:
+@:LDP man-pages:3.50:2008/08/11:creall:3:creal:3:
+☆:LDP man-pages:3.41=>3.50:2011/09/15:crypt:3:2008/10/08::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:2011/09/15:crypt_r:3:crypt:3:
+☆:LDP man-pages:3.41=>3.50:2008/08/11:csin:3:2003/07/28::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/11:csinf:3:csin:3:
+☆:LDP man-pages:3.41=>3.50:2008/08/11:csinh:3:2003/09/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/11:csinhf:3:csinh:3:
+@:LDP man-pages:3.50:2008/08/11:csinhl:3:csinh:3:
+@:LDP man-pages:3.50:2008/08/11:csinl:3:csin:3:
+☆:LDP man-pages:3.41=>3.50:2008/08/11:csqrt:3:2003/08/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/11:csqrtf:3:csqrt:3:
+@:LDP man-pages:3.50:2008/08/11:csqrtl:3:csqrt:3:
+☆:LDP man-pages:3.41=>3.50:2008/08/11:ctan:3:2005/02/21::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/11:ctanf:3:ctan:3:
+☆:LDP man-pages:3.41=>3.50:2008/08/11:ctanh:3:2005/02/21::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/11:ctanhf:3:ctanh:3:
+@:LDP man-pages:3.50:2008/08/11:ctanhl:3:ctanh:3:
+@:LDP man-pages:3.50:2008/08/11:ctanl:3:ctan:3:
+☆:LDP man-pages:3.41=>3.50:2007/07/26:ctermid:3:1997/2/10::nagoya@cc.hit-u.ac.jp:NAGOYA Hiroaki:
+☆:LDP man-pages:3.41=>3.50:2010/02/25:ctime:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/02/25:ctime_r:3:ctime:3:
+@:LDP man-pages:3.50:2008/06/29:cuserid:3:getlogin:3:
+☆:LDP man-pages:3.41=>3.50:2009/12/05:daemon:3:2002/01/14::ysato@h4.dion.ne.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2012/03/25:daylight:3:tzset:3:
+@:LDP man-pages:3.50:2012/05/04:db:3:dbopen:3:
+☆:LDP man-pages:3.41=>3.50:2012/05/04:dbopen:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2007/05/18:des_crypt:3:2004/08/14::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2007/05/18:des_setparity:3:des_crypt:3:
+☆:LDP man-pages:3.41=>3.50:2012/12/22:difftime:3:2006/07/20::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/26:dirfd:3:2003/10/15::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2009/03/30:dirname:3:basename:3:
+☆:LDP man-pages:3.41=>3.50:2012/04/17:div:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2007/05/18:dl_iterate_phdr:3:2005/02/14::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2008/12/06:dladdr:3:dlopen:3:
+@:LDP man-pages:3.50:2008/12/06:dlclose:3:dlopen:3:
+@:LDP man-pages:3.50:2008/12/06:dlerror:3:dlopen:3:
+☆:LDP man-pages:3.41=>3.50:2008/12/06:dlopen:3:2009/03/09::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/12/06:dlsym:3:dlopen:3:
+@:LDP man-pages:3.50:2008/12/06:dlvsym:3:dlopen:3:
+@:LDP man-pages:3.50:2013/03/05:dn_comp:3:resolver:3:
+@:LDP man-pages:3.50:2013/03/05:dn_expand:3:resolver:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/15:dprintf:3:2002/01/14::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+☆:LDP man-pages:3.41=>3.50:2007/07/26:drand48:3:1997/01/20::tyoshino@eng.toyo.ac.jp:YOSHINO Takashi:
+☆:LDP man-pages:3.41=>3.50:2007/07/26:drand48_r:3:2005/02/14::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2010/09/20:drem:3:remainder:3:
+@:LDP man-pages:3.50:2010/09/20:dremf:3:remainder:3:
+@:LDP man-pages:3.50:2010/09/20:dreml:3:remainder:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/22:dysize:3:2002/01/06::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+@:LDP man-pages:3.50:2010/11/01:eaccess:3:euidaccess:3:
+@:LDP man-pages:3.50:2007/05/18:ecb_crypt:3:des_crypt:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:ecvt:3:2009/05/14::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:2007/07/26:ecvt_r:3:2002/09/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/07/17:edata:3:end:3:
+☆:LDP man-pages:3.41=>3.50:2003/04/04:encrypt:3:2004/02/06::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2003/04/04:encrypt_r:3:encrypt:3:
+☆:LDP man-pages:3.41=>3.50:2008/07/17:end:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2003/09/09:endaliasent:3:setaliasent:3:
+@:LDP man-pages:3.50:2002/02/28:endfsent:3:getfsent:3:
+@:LDP man-pages:3.50:2010/10/21:endgrent:3:getgrent:3:
+@:LDP man-pages:3.50:2010/10/04:endhostent:3:gethostbyname:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/10:endian:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2009/09/15:endmntent:3:getmntent:3:
+@:LDP man-pages:3.50:2008/08/19:endnetent:3:getnetent:3:
+@:LDP man-pages:3.50:2007/07/26:endnetgrent:3:setnetgrent:3:
+@:LDP man-pages:3.50:2008/08/19:endprotoent:3:getprotoent:3:
+@:LDP man-pages:3.50:2010/10/21:endpwent:3:getpwent:3:
+@:LDP man-pages:3.50:2008/08/19:endrpcent:3:getrpcent:3:
+@:LDP man-pages:3.50:2008/08/19:endservent:3:getservent:3:
+@:LDP man-pages:3.50:2013/01/22:endspent:3:getspnam:3:
+@:LDP man-pages:3.50:2002/07/18:endttyent:3:getttyent:3:
+@:LDP man-pages:3.50:2007/07/26:endusershell:3:getusershell:3:
+@:LDP man-pages:3.50:2008/06/29:endutent:3:getutent:3:
+@:LDP man-pages:3.50:2008/06/29:endutxent:3:getutent:3:
+@:LDP man-pages:3.50:2007/05/18:envz:3:envz_add:3:
+☆:LDP man-pages:3.41=>3.50:2007/05/18:envz_add:3:2003/03/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2007/05/18:envz_entry:3:envz_add:3:
+@:LDP man-pages:3.50:2007/05/18:envz_get:3:envz_add:3:
+@:LDP man-pages:3.50:2007/05/18:envz_merge:3:envz_add:3:
+@:LDP man-pages:3.50:2007/05/18:envz_remove:3:envz_add:3:
+@:LDP man-pages:3.50:2007/05/18:envz_strip:3:envz_add:3:
+@:LDP man-pages:3.50:2007/07/26:erand48:3:drand48:3:
+@:LDP man-pages:3.50:2007/07/26:erand48_r:3:drand48_r:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:erf:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:erfc:3:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:erfcf:3:erfc:3:
+@:LDP man-pages:3.50:2010/09/20:erfcl:3:erfc:3:
+@:LDP man-pages:3.50:2010/09/20:erff:3:erf:3:
+@:LDP man-pages:3.50:2010/09/20:erfl:3:erf:3:
+☆:LDP man-pages:3.41=>3.50:2012/03/15:err:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/07/09:errno:3:2006/07/26::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/08/29:error:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/08/29:error_at_line:3:error:3:
+@:LDP man-pages:3.50:2010/08/29:error_message_count:3:error:3:
+@:LDP man-pages:3.50:2010/08/29:error_one_per_line:3:error:3:
+@:LDP man-pages:3.50:2010/08/29:error_print_progname:3:error:3:
+@:LDP man-pages:3.50:2012/03/15:errx:3:err:3:
+@:LDP man-pages:3.50:2008/07/17:etext:3:end:3:
+☆:LDP man-pages:3.41=>3.50:2002/07/20:ether_aton:3:2002/09/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2002/07/20:ether_aton_r:3:ether_aton:3:
+@:LDP man-pages:3.50:2002/07/20:ether_hostton:3:ether_aton:3:
+@:LDP man-pages:3.50:2002/07/20:ether_line:3:ether_aton:3:
+@:LDP man-pages:3.50:2002/07/20:ether_ntoa:3:ether_aton:3:
+@:LDP man-pages:3.50:2002/07/20:ether_ntoa_r:3:ether_aton:3:
+@:LDP man-pages:3.50:2002/07/20:ether_ntohost:3:ether_aton:3:
+☆:LDP man-pages:3.41=>3.50:2010/11/01:euidaccess:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/08/30:eventfd_read:3:eventfd:2:
+@:LDP man-pages:3.50:2010/08/30:eventfd_write:3:eventfd:2:
+☆:LDP man-pages:3.41=>3.50:2010/09/25:exec:3:2005/03/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/25:execl:3:exec:3:
+@:LDP man-pages:3.50:2010/09/25:execle:3:exec:3:
+@:LDP man-pages:3.50:2010/09/25:execlp:3:exec:3:
+@:LDP man-pages:3.50:2010/09/25:execv:3:exec:3:
+@:LDP man-pages:3.50:2010/09/25:execvp:3:exec:3:
+@:LDP man-pages:3.50:2010/09/25:execvpe:3:exec:3:
+☆:LDP man-pages:3.41=>3.50:2013/02/14:exit:3:2007/06/18::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:exp:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/08/11:exp10:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/11:exp10f:3:exp10:3:
+@:LDP man-pages:3.50:2008/08/11:exp10l:3:exp10:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:exp2:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:exp2f:3:exp2:3:
+@:LDP man-pages:3.50:2010/09/20:exp2l:3:exp2:3:
+@:LDP man-pages:3.50:2010/09/20:expf:3:exp:3:
+@:LDP man-pages:3.50:2010/09/20:expl:3:exp:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/12:expm1:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/12:expm1f:3:expm1:3:
+@:LDP man-pages:3.50:2010/09/12:expm1l:3:expm1:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:fabs:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:fabsf:3:fabs:3:
+@:LDP man-pages:3.50:2010/09/20:fabsl:3:fabs:3:
+☆:LDP man-pages:3.41=>3.50:2009/02/23:fclose:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2006/12/27:fcloseall:3:2007/05/04::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:fcvt:3:ecvt:3:
+@:LDP man-pages:3.50:2007/07/26:fcvt_r:3:ecvt_r:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:fdim:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:fdimf:3:fdim:3:
+@:LDP man-pages:3.50:2010/09/20:fdiml:3:fdim:3:
+@:LDP man-pages:3.50:2012/04/22:fdopen:3:fopen:3:
+@:LDP man-pages:3.50:2010/06/20:fdopendir:3:opendir:3:
+@:LDP man-pages:3.50:2010/10/31:feclearexcept:3:fenv:3:
+@:LDP man-pages:3.50:2010/10/31:fedisableexcept:3:fenv:3:
+@:LDP man-pages:3.50:2010/10/31:feenableexcept:3:fenv:3:
+@:LDP man-pages:3.50:2010/10/31:fegetenv:3:fenv:3:
+@:LDP man-pages:3.50:2010/10/31:fegetexcept:3:fenv:3:
+@:LDP man-pages:3.50:2010/10/31:fegetexceptflag:3:fenv:3:
+@:LDP man-pages:3.50:2010/10/31:fegetround:3:fenv:3:
+@:LDP man-pages:3.50:2010/10/31:feholdexcept:3:fenv:3:
+☆:LDP man-pages:3.41=>3.50:2010/10/31:fenv:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/29:feof:3:ferror:3:
+@:LDP man-pages:3.50:2008/08/29:feof_unlocked:3:unlocked_stdio:3:
+@:LDP man-pages:3.50:2010/10/31:feraiseexcept:3:fenv:3:
+☆:LDP man-pages:3.41=>3.50:2008/08/29:ferror:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:2008/08/29:ferror_unlocked:3:unlocked_stdio:3:
+@:LDP man-pages:3.50:2010/10/31:fesetenv:3:fenv:3:
+@:LDP man-pages:3.50:2010/10/31:fesetexceptflag:3:fenv:3:
+@:LDP man-pages:3.50:2010/10/31:fesetround:3:fenv:3:
+@:LDP man-pages:3.50:2010/10/31:fetestexcept:3:fenv:3:
+@:LDP man-pages:3.50:2010/10/31:feupdateenv:3:fenv:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/15:fexecve:3:2009/03/09::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2009/09/06:fflush:3:2001/11/09::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:2008/08/29:fflush_unlocked:3:unlocked_stdio:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:ffs:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:2010/09/20:ffsl:3:ffs:3:
+@:LDP man-pages:3.50:2010/09/20:ffsll:3:ffs:3:
+@:LDP man-pages:3.50:2012/01/18:fgetc:3:gets:3:
+@:LDP man-pages:3.50:2008/08/29:fgetc_unlocked:3:unlocked_stdio:3:
+☆:LDP man-pages:3.41=>3.50:2008/07/10:fgetgrent:3:1997/12/19::nishi@rpts.cl.nec.co.jp:HIROFUMI Nishizuka:
+@:LDP man-pages:3.50:2010/10/21:fgetgrent_r:3:getgrent_r:3:
+@:LDP man-pages:3.50:1993/11/29:fgetpos:3:fseek:3:
+☆:LDP man-pages:3.41=>3.50:2008/07/10:fgetpwent:3:1997/12/18::nishi@rpts.cl.nec.co.jp:HIROFUMI Nishizuka:
+@:LDP man-pages:3.50:2010/10/21:fgetpwent_r:3:getpwent_r:3:
+@:LDP man-pages:3.50:2012/01/18:fgets:3:gets:3:
+@:LDP man-pages:3.50:2008/08/29:fgets_unlocked:3:unlocked_stdio:3:
+@:LDP man-pages:3.50:2013/01/22:fgetspent:3:getspnam:3:
+@:LDP man-pages:3.50:2013/01/22:fgetspent_r:3:getspnam:3:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:fgetwc:3:2001/11/09::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:2008/08/29:fgetwc_unlocked:3:unlocked_stdio:3:
+☆:LDP man-pages:3.41=>3.50:2011/09/28:fgetws:3:2001/11/09::ysato@h4.dion.ne.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2008/08/29:fgetws_unlocked:3:unlocked_stdio:3:
+@:LDP man-pages:3.50:2008/08/29:fileno:3:ferror:3:
+@:LDP man-pages:3.50:2008/08/29:fileno_unlocked:3:unlocked_stdio:3:
+☆:LDP man-pages:3.41=>3.50:2008/08/05:finite:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/05:finitef:3:finite:3:
+@:LDP man-pages:3.50:2008/08/05:finitel:3:finite:3:
+☆:LDP man-pages:3.41=>3.50:2008/08/29:flockfile:3:2001/11/05::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:floor:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:floorf:3:floor:3:
+@:LDP man-pages:3.50:2010/09/20:floorl:3:floor:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:fma:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:fmaf:3:fma:3:
+@:LDP man-pages:3.50:2010/09/20:fmal:3:fma:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:fmax:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:fmaxf:3:fmax:3:
+@:LDP man-pages:3.50:2010/09/20:fmaxl:3:fmax:3:
+☆:LDP man-pages:3.41=>3.50:2012/04/28:fmemopen:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:fmin:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:fminf:3:fmin:3:
+@:LDP man-pages:3.50:2010/09/20:fminl:3:fmin:3:
+☆:LDP man-pages:3.41=>3.50:2012/03/15:fmod:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/03/15:fmodf:3:fmod:3:
+@:LDP man-pages:3.50:2012/03/15:fmodl:3:fmod:3:
+☆:LDP man-pages:3.41=>3.50:2008/06/14:fmtmsg:3:2004/08/14::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2000/10/15:fnmatch:3:2006/03/06::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/04/22:fopen:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+×:LDP man-pages:3.50:2012/04/30:fopencookie:3:::::
+@:LDP man-pages:3.50:2010/06/13:forkpty:3:openpty:3:
+☆:LDP man-pages:3.41=>3.50:1993/04/04:fpathconf:3:1998/03/20::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:fpclassify:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/03/05:fprintf:3:printf:3:
+☆:LDP man-pages:3.41=>3.50:2001/12/15:fpurge:3:2002/01/14::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+@:LDP man-pages:3.50:2011/09/28:fputc:3:puts:3:
+@:LDP man-pages:3.50:2008/08/29:fputc_unlocked:3:unlocked_stdio:3:
+@:LDP man-pages:3.50:2011/09/28:fputs:3:puts:3:
+@:LDP man-pages:3.50:2008/08/29:fputs_unlocked:3:unlocked_stdio:3:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:fputwc:3:2001/11/09::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:2008/08/29:fputwc_unlocked:3:unlocked_stdio:3:
+☆:LDP man-pages:3.41=>3.50:2011/09/28:fputws:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:2008/08/29:fputws_unlocked:3:unlocked_stdio:3:
+☆:LDP man-pages:3.41=>3.50:2012/03/30:fread:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/29:fread_unlocked:3:unlocked_stdio:3:
+@:LDP man-pages:3.50:2012/05/10:free:3:malloc:3:
+@:LDP man-pages:3.50:2013/01/15:freeaddrinfo:3:getaddrinfo:3:
+@:LDP man-pages:3.50:2010/09/04:freehostent:3:getipnodebyname:3:
+※:LDP man-pages:3.50:2012/11/11:freeifaddrs:3:getifaddrs:3:
+@:LDP man-pages:3.50:2012/04/22:freopen:3:fopen:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:frexp:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:frexpf:3:frexp:3:
+@:LDP man-pages:3.50:2010/09/20:frexpl:3:frexp:3:
+@:LDP man-pages:3.50:2013/01/30:fscanf:3:scanf:3:
+☆:LDP man-pages:3.41=>3.50:1993/11/29:fseek:3:1998/04/27::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+☆:LDP man-pages:3.41=>3.50:2001/11/05:fseeko:3:2006/01/18::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:1993/11/29:fsetpos:3:fseek:3:
+@:LDP man-pages:3.50:2003/08/22:fstatvfs:3:statvfs:3:
+@:LDP man-pages:3.50:1993/11/29:ftell:3:fseek:3:
+@:LDP man-pages:3.50:2001/11/05:ftello:3:fseeko:3:
+☆:LDP man-pages:3.41=>3.50:2010/02/25:ftime:3:2008/10/08::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:2001/11/28:ftok:3:2002/01/06::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+@:LDP man-pages:3.50:2008/08/29:ftrylockfile:3:flockfile:3:
+☆:LDP man-pages:3.41=>3.50:2012/10/25:fts:3:2000/09/05::sato@complex.eng.hokudai.ac.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2012/10/25:fts_children:3:fts:3:
+@:LDP man-pages:3.50:2012/10/25:fts_close:3:fts:3:
+@:LDP man-pages:3.50:2012/10/25:fts_open:3:fts:3:
+@:LDP man-pages:3.50:2012/10/25:fts_read:3:fts:3:
+@:LDP man-pages:3.50:2012/10/25:fts_set:3:fts:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:ftw:3:2006/07/30::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/29:funlockfile:3:flockfile:3:
+※:LDP man-pages:3.50:2012/03/25:futimens:3:utimensat:2:
+☆:LDP man-pages:3.41=>3.50:2013/03/15:futimes:3:2006/07/31::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2011/09/17:fwide:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
+@:LDP man-pages:3.50:2011/09/17:fwprintf:3:wprintf:3:
+@:LDP man-pages:3.50:2012/03/30:fwrite:3:fread:3:
+@:LDP man-pages:3.50:2008/08/29:fwrite_unlocked:3:unlocked_stdio:3:
+※:LDP man-pages:3.50:2010/09/27:gai_cancel:3:getaddrinfo_a:3:
+※:LDP man-pages:3.50:2010/09/27:gai_error:3:getaddrinfo_a:3:
+@:LDP man-pages:3.50:2013/01/15:gai_strerror:3:getaddrinfo:3:
+※:LDP man-pages:3.50:2010/09/27:gai_suspend:3:getaddrinfo_a:3:
+☆:LDP man-pages:3.41=>3.50:2008/08/05:gamma:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/05:gammaf:3:gamma:3:
+@:LDP man-pages:3.50:2008/08/05:gammal:3:gamma:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:gcvt:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:get_current_dir_name:3:getcwd:3:
+@:LDP man-pages:3.50:2008/07/17:get_myaddress:3:rpc:3:
+@:LDP man-pages:3.50:2012/03/20:get_nprocs:3:get_nprocs_conf:3:
+☆:LDP man-pages:3.41=>3.50:2012/03/20:get_nprocs_conf:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/01/15:getaddrinfo:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+×:LDP man-pages:3.50:2010/09/27:getaddrinfo_a:3:::::
+@:LDP man-pages:3.50:2003/09/09:getaliasbyname:3:setaliasent:3:
+@:LDP man-pages:3.50:2003/09/09:getaliasbyname_r:3:setaliasent:3:
+@:LDP man-pages:3.50:2003/09/09:getaliasent:3:setaliasent:3:
+@:LDP man-pages:3.50:2003/09/09:getaliasent_r:3:setaliasent:3:
+×:LDP man-pages:3.50:2012/11/07:getauxval:3:::::
+@:LDP man-pages:3.50:2012/01/18:getc:3:gets:3:
+@:LDP man-pages:3.50:2008/08/29:getc_unlocked:3:unlocked_stdio:3:
+@:LDP man-pages:3.50:2012/01/18:getchar:3:gets:3:
+@:LDP man-pages:3.50:2008/08/29:getchar_unlocked:3:unlocked_stdio:3:
+×:LDP man-pages:3.50:2009/03/15:getcontext:3:::::
+☆:LDP man-pages:3.41=>3.50:2010/09/20:getcwd:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:getdate:3:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:getdate_err:3:getdate:3:
+@:LDP man-pages:3.50:2010/09/20:getdate_r:3:getdate:3:
+@:LDP man-pages:3.50:2010/06/12:getdelim:3:getline:3:
+☆:LDP man-pages:3.41=>3.50:2007/07/26:getdirentries:3:1998/04/30::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+×:LDP man-pages:3.50:2013/02/05:getdtablesize:3:::::
+☆:LDP man-pages:3.41=>3.50:2012/08/14:getenv:3:2003/09/28::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+☆:LDP man-pages:3.41=>3.50:2002/02/28:getfsent:3:2002/08/07::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+@:LDP man-pages:3.50:2002/02/28:getfsfile:3:getfsent:3:
+@:LDP man-pages:3.50:2002/02/28:getfsspec:3:getfsent:3:
+☆:LDP man-pages:3.41=>3.50:2010/10/21:getgrent:3:2005/09/06::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/10/21:getgrent_r:3:2004/08/14::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2012/04/23:getgrgid:3:getgrnam:3:
+@:LDP man-pages:3.50:2012/04/23:getgrgid_r:3:getgrnam:3:
+☆:LDP man-pages:3.41=>3.50:2012/04/23:getgrnam:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/04/23:getgrnam_r:3:getgrnam:3:
+☆:LDP man-pages:3.41=>3.50:2008/07/03:getgrouplist:3:2008/08/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/10/04:gethostbyaddr:3:gethostbyname:3:
+@:LDP man-pages:3.50:2010/10/04:gethostbyaddr_r:3:gethostbyname:3:
+☆:LDP man-pages:3.41=>3.50:2010/10/04:gethostbyname:3:2007/06/13::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/10/04:gethostbyname2:3:gethostbyname:3:
+@:LDP man-pages:3.50:2010/10/04:gethostbyname2_r:3:gethostbyname:3:
+@:LDP man-pages:3.50:2010/10/04:gethostbyname_r:3:gethostbyname:3:
+@:LDP man-pages:3.50:2010/10/04:gethostent:3:gethostbyname:3:
+@:LDP man-pages:3.50:2010/10/04:gethostent_r:3:gethostbyname:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:gethostid:3:2009/01/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+×:LDP man-pages:3.50:2012/11/11:getifaddrs:3:::::
+@:LDP man-pages:3.50:2010/09/04:getipnodebyaddr:3:getipnodebyname:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/04:getipnodebyname:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:2010/06/12:getline:3:2010/04/25::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2007/12/08:getloadavg:3:2002/01/21::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+☆:LDP man-pages:3.41=>3.50:2008/06/29:getlogin:3:2005/03/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/06/29:getlogin_r:3:getlogin:3:
+☆:LDP man-pages:3.41=>3.50:2009/09/15:getmntent:3:2005/03/18::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2009/09/15:getmntent_r:3:getmntent:3:
+☆:LDP man-pages:3.41=>3.50:2013/01/15:getnameinfo:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/19:getnetbyaddr:3:getnetent:3:
+@:LDP man-pages:3.50:2010/09/10:getnetbyaddr_r:3:getnetent_r:3:
+@:LDP man-pages:3.50:2008/08/19:getnetbyname:3:getnetent:3:
+@:LDP man-pages:3.50:2010/09/10:getnetbyname_r:3:getnetent_r:3:
+☆:LDP man-pages:3.41=>3.50:2008/08/19:getnetent:3:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/10:getnetent_r:3:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2007/07/26:getnetgrent:3:setnetgrent:3:
+@:LDP man-pages:3.50:2007/07/26:getnetgrent_r:3:setnetgrent:3:
+☆:LDP man-pages:3.41=>3.50:2010/11/01:getopt:3:2008/08/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/11/01:getopt_long:3:getopt:3:
+@:LDP man-pages:3.50:2010/11/01:getopt_long_only:3:getopt:3:
+☆:LDP man-pages:3.41=>3.50:2013/03/15:getpass:3:2001/02/14::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+@:LDP man-pages:3.50:2008/08/19:getprotobyname:3:getprotoent:3:
+@:LDP man-pages:3.50:2010/09/10:getprotobyname_r:3:getprotoent_r:3:
+@:LDP man-pages:3.50:2008/08/19:getprotobynumber:3:getprotoent:3:
+@:LDP man-pages:3.50:2010/09/10:getprotobynumber_r:3:getprotoent_r:3:
+☆:LDP man-pages:3.41=>3.50:2008/08/19:getprotoent:3:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/10:getprotoent_r:3:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/10:getpt:3:2003/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/10/21:getpw:3:2008/10/08::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:2010/10/21:getpwent:3:2005/09/06::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/10/21:getpwent_r:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/04/23:getpwnam:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/04/23:getpwnam_r:3:getpwnam:3:
+@:LDP man-pages:3.50:2012/04/23:getpwuid:3:getpwnam:3:
+@:LDP man-pages:3.50:2012/04/23:getpwuid_r:3:getpwnam:3:
+@:LDP man-pages:3.50:2008/08/19:getrpcbyname:3:getrpcent:3:
+@:LDP man-pages:3.50:2010/09/10:getrpcbyname_r:3:getrpcent_r:3:
+@:LDP man-pages:3.50:2008/08/19:getrpcbynumber:3:getrpcent:3:
+@:LDP man-pages:3.50:2010/09/10:getrpcbynumber_r:3:getrpcent_r:3:
+☆:LDP man-pages:3.41=>3.50:2008/08/19:getrpcent:3:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/10:getrpcent_r:3:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2007/12/23:getrpcport:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
+☆:LDP man-pages:3.41=>3.50:2012/01/18:gets:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/19:getservbyname:3:getservent:3:
+@:LDP man-pages:3.50:2010/09/10:getservbyname_r:3:getservent_r:3:
+@:LDP man-pages:3.50:2008/08/19:getservbyport:3:getservent:3:
+@:LDP man-pages:3.50:2010/09/10:getservbyport_r:3:getservent_r:3:
+☆:LDP man-pages:3.41=>3.50:2008/08/19:getservent:3:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/10:getservent_r:3:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/01/22:getspent:3:getspnam:3:
+@:LDP man-pages:3.50:2013/01/22:getspent_r:3:getspnam:3:
+☆:LDP man-pages:3.41=>3.50:2013/01/22:getspnam:3:2005/09/06::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/01/22:getspnam_r:3:getspnam:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/26:getsubopt:3:2007/06/03::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2002/07/18:getttyent:3:2004/09/14::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2002/07/18:getttynam:3:getttyent:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/10:getumask:3:2003/02/02::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2007/07/26:getusershell:3:1998/02/05::ishioka@dad.eec.toshiba.co.jp:ISHIOKA Takashi:
+☆:LDP man-pages:3.41=>3.50:2008/06/29:getutent:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/06/29:getutent_r:3:getutent:3:
+@:LDP man-pages:3.50:2008/06/29:getutid:3:getutent:3:
+@:LDP man-pages:3.50:2008/06/29:getutid_r:3:getutent:3:
+@:LDP man-pages:3.50:2008/06/29:getutline:3:getutent:3:
+@:LDP man-pages:3.50:2008/06/29:getutline_r:3:getutent:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/10:getutmp:3:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/10:getutmpx:3:getutmp:3:
+@:LDP man-pages:3.50:2008/06/29:getutxent:3:getutent:3:
+@:LDP man-pages:3.50:2008/06/29:getutxid:3:getutent:3:
+@:LDP man-pages:3.50:2008/06/29:getutxline:3:getutent:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/26:getw:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:1999/07/25:getwc:3:fgetwc:3:
+@:LDP man-pages:3.50:2008/08/29:getwc_unlocked:3:unlocked_stdio:3:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:getwchar:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:2008/08/29:getwchar_unlocked:3:unlocked_stdio:3:
+@:LDP man-pages:3.50:2010/09/20:getwd:3:getcwd:3:
+☆:LDP man-pages:3.41=>3.50:2007/10/10:glob:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:2007/10/10:globfree:3:glob:3:
+@:LDP man-pages:3.50:2010/02/25:gmtime:3:ctime:3:
+@:LDP man-pages:3.50:2010/02/25:gmtime_r:3:ctime:3:
+@:LDP man-pages:3.50:2012/05/10:gnu_dev_major:3:makedev:3:
+@:LDP man-pages:3.50:2012/05/10:gnu_dev_makedev:3:makedev:3:
+@:LDP man-pages:3.50:2012/05/10:gnu_dev_minor:3:makedev:3:
+@:LDP man-pages:3.50:2012/08/26:gnu_get_libc_release:3:gnu_get_libc_version:3:
+☆:LDP man-pages:3.41=>3.50:2012/08/26:gnu_get_libc_version:3:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/06/14:grantpt:3:2003/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2007/07/26:gsignal:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/10/04:h_errno:3:gethostbyname:3:
+☆:LDP man-pages:3.41=>3.50:2012/04/23:hash:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2009/09/15:hasmntopt:3:getmntent:3:
+@:LDP man-pages:3.50:2011/09/10:hcreate:3:hsearch:3:
+@:LDP man-pages:3.50:2011/09/10:hcreate_r:3:hsearch:3:
+@:LDP man-pages:3.50:2011/09/10:hdestroy:3:hsearch:3:
+@:LDP man-pages:3.50:2011/09/10:hdestroy_r:3:hsearch:3:
+@:LDP man-pages:3.50:2010/10/04:herror:3:gethostbyname:3:
+☆:LDP man-pages:3.41=>3.50:2011/09/10:hsearch:3:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2011/09/10:hsearch_r:3:hsearch:3:
+@:LDP man-pages:3.50:2010/10/04:hstrerror:3:gethostbyname:3:
+@:LDP man-pages:3.50:2010/09/10:htobe16:3:endian:3:
+@:LDP man-pages:3.50:2010/09/10:htobe32:3:endian:3:
+@:LDP man-pages:3.50:2010/09/10:htobe64:3:endian:3:
+@:LDP man-pages:3.50:2010/09/10:htole16:3:endian:3:
+@:LDP man-pages:3.50:2010/09/10:htole32:3:endian:3:
+@:LDP man-pages:3.50:2010/09/10:htole64:3:endian:3:
+@:LDP man-pages:3.50:2009/01/15:htonl:3:byteorder:3:
+@:LDP man-pages:3.50:2009/01/15:htons:3:byteorder:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:hypot:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:hypotf:3:hypot:3:
+@:LDP man-pages:3.50:2010/09/20:hypotl:3:hypot:3:
+☆:LDP man-pages:3.41=>3.50:2012/05/10:iconv:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/08/11:iconv_close:3:2000/07/11::sato@complex.eng.hokudai.ac.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2008/08/11:iconv_open:3:2007/06/01::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+※:LDP man-pages:3.50:2012/11/21:if_freenameindex:3:if_nameindex:3:
+※:LDP man-pages:3.50:2012/12/14:if_indextoname:3:if_nametoindex:3:
+×:LDP man-pages:3.50:2012/11/21:if_nameindex:3:::::
+×:LDP man-pages:3.50:2012/12/14:if_nametoindex:3:::::
+☆:LDP man-pages:3.41=>3.50:2010/09/20:ilogb:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:ilogbf:3:ilogb:3:
+@:LDP man-pages:3.50:2010/09/20:ilogbl:3:ilogb:3:
+@:LDP man-pages:3.50:2010/09/20:imaxabs:3:abs:3:
+@:LDP man-pages:3.50:2012/04/17:imaxdiv:3:div:3:
+☆:LDP man-pages:3.41=>3.50:2011/09/21:index:3:1997/12/12::nishi@rpts.cl.nec.co.jp:HIROFUMI Nishizuka:
+☆:LDP man-pages:3.41=>3.50:2013/02/10:inet:3:2008/08/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/02/10:inet_addr:3:inet:3:
+@:LDP man-pages:3.50:2013/02/10:inet_aton:3:inet:3:
+@:LDP man-pages:3.50:2013/02/10:inet_lnaof:3:inet:3:
+@:LDP man-pages:3.50:2013/02/10:inet_makeaddr:3:inet_addr:3:
+@:LDP man-pages:3.50:2013/02/10:inet_netof:3:inet:3:
+@:LDP man-pages:3.50:2013/02/10:inet_network:3:inet:3:
+@:LDP man-pages:3.50:2013/02/10:inet_ntoa:3:inet:3:
+☆:LDP man-pages:3.41=>3.50:2008/11/11:inet_ntop:3:2008/08/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/06/18:inet_pton:3:2008/08/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:1993/06/02:infnan:3:2005/03/15::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2007/07/26:initgroups:3:2005/02/26::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:initstate:3:random:3:
+@:LDP man-pages:3.50:2008/03/07:initstate_r:3:random_r:3:
+@:LDP man-pages:3.50:2007/07/26:innetgr:3:setnetgrent:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/09:insque:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/11/11:intro:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/04/23:iruserok:3:rcmd:3:
+@:LDP man-pages:3.50:2012/04/23:iruserok_af:3:rcmd:3:
+@:LDP man-pages:3.50:2010/09/20:isalnum:3:isalpha:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:isalpha:3:2007/05/03::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:isascii:3:isalpha:3:
+☆:LDP man-pages:3.41=>3.50:2008/12/03:isatty:3:1997/2/10::nagoya@cc.hit-u.ac.jp:NAGOYA Hiroaki:
+@:LDP man-pages:3.50:2010/09/20:isblank:3:isalpha:3:
+@:LDP man-pages:3.50:2010/09/20:iscntrl:3:isalpha:3:
+@:LDP man-pages:3.50:2010/09/20:isdigit:3:isalpha:3:
+@:LDP man-pages:3.50:2010/09/20:isfinite:3:fpclassify:3:
+@:LDP man-pages:3.50:2010/09/20:isgraph:3:isalpha:3:
+☆:LDP man-pages:3.41=>3.50:2012/05/06:isgreater:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/05/06:isgreaterequal:3:isgreater:3:
+@:LDP man-pages:3.50:2010/09/20:isinf:3:fpclassify:3:
+@:LDP man-pages:3.50:2008/08/05:isinff:3:finite:3:
+@:LDP man-pages:3.50:2008/08/05:isinfl:3:finite:3:
+@:LDP man-pages:3.50:2012/05/06:isless:3:isgreater:3:
+@:LDP man-pages:3.50:2012/05/06:islessequal:3:isgreater:3:
+@:LDP man-pages:3.50:2012/05/06:islessgreater:3:isgreater:3:
+@:LDP man-pages:3.50:2010/09/20:islower:3:isalpha:3:
+@:LDP man-pages:3.50:2010/09/20:isnan:3:fpclassify:3:
+@:LDP man-pages:3.50:2008/08/05:isnanf:3:finite:3:
+@:LDP man-pages:3.50:2008/08/05:isnanl:3:finite:3:
+@:LDP man-pages:3.50:2010/09/20:isnormal:3:fpclassify:3:
+@:LDP man-pages:3.50:2010/09/20:isprint:3:isalpha:3:
+@:LDP man-pages:3.50:2010/09/20:ispunct:3:isalpha:3:
+@:LDP man-pages:3.50:2010/09/20:isspace:3:isalpha:3:
+@:LDP man-pages:3.50:2012/05/06:isunordered:3:isgreater:3:
+@:LDP man-pages:3.50:2010/09/20:isupper:3:isalpha:3:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:iswalnum:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:iswalpha:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:iswblank:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:iswcntrl:3:1999/09/12::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:iswctype:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:iswdigit:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:iswgraph:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:iswlower:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:iswprint:3:1999/09/12::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:iswpunct:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:iswspace:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:iswupper:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:iswxdigit:3:2008/07/23::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:2010/09/20:isxdigit:3:isalpha:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:j0:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:j0f:3:j0:3:
+@:LDP man-pages:3.50:2010/09/20:j0l:3:j0:3:
+@:LDP man-pages:3.50:2010/09/20:j1:3:j0:3:
+@:LDP man-pages:3.50:2010/09/20:j1f:3:j0:3:
+@:LDP man-pages:3.50:2010/09/20:j1l:3:j0:3:
+@:LDP man-pages:3.50:2010/09/20:jn:3:j0:3:
+@:LDP man-pages:3.50:2010/09/20:jnf:3:j0:3:
+@:LDP man-pages:3.50:2010/09/20:jnl:3:j0:3:
+@:LDP man-pages:3.50:2007/07/26:jrand48:3:drand48:3:
+@:LDP man-pages:3.50:2007/07/26:jrand48_r:3:drand48_r:3:
+@:LDP man-pages:3.50:2002/07/18:key_decryptsession:3:key_setsecret:3:
+@:LDP man-pages:3.50:2002/07/18:key_encryptsession:3:key_setsecret:3:
+@:LDP man-pages:3.50:2002/07/18:key_gendes:3:key_setsecret:3:
+@:LDP man-pages:3.50:2002/07/18:key_secretkey_is_set:3:key_setsecret:3:
+☆:LDP man-pages:3.41=>3.50:2002/07/18:key_setsecret:3:2003/02/01::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/11/29:klogctl:3:syslog:2:
+@:LDP man-pages:3.50:2010/09/20:l64a:3:a64l:3:
+@:LDP man-pages:3.50:2010/09/20:labs:3:abs:3:
+@:LDP man-pages:3.50:2013/01/22:lckpwdf:3:getspnam:3:
+@:LDP man-pages:3.50:2007/07/26:lcong48:3:drand48:3:
+@:LDP man-pages:3.50:2007/07/26:lcong48_r:3:drand48_r:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:ldexp:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:ldexpf:3:ldexp:3:
+@:LDP man-pages:3.50:2010/09/20:ldexpl:3:ldexp:3:
+@:LDP man-pages:3.50:2012/04/17:ldiv:3:div:3:
+@:LDP man-pages:3.50:2010/09/10:le16toh:3:endian:3:
+@:LDP man-pages:3.50:2010/09/10:le32toh:3:endian:3:
+@:LDP man-pages:3.50:2010/09/10:le64toh:3:endian:3:
+@:LDP man-pages:3.50:1999/09/27:lfind:3:lsearch:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/11:lgamma:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/11:lgamma_r:3:lgamma:3:
+@:LDP man-pages:3.50:2010/09/11:lgammaf:3:lgamma:3:
+@:LDP man-pages:3.50:2010/09/11:lgammaf_r:3:lgamma:3:
+@:LDP man-pages:3.50:2010/09/11:lgammal:3:lgamma:3:
+@:LDP man-pages:3.50:2010/09/11:lgammal_r:3:lgamma:3:
+☆:LDP man-pages:3.41=>3.50:2012/05/08:lio_listio:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:llabs:3:abs:3:
+@:LDP man-pages:3.50:2012/04/17:lldiv:3:div:3:
+@:LDP man-pages:3.50:2010/09/20:llrint:3:lrint:3:
+@:LDP man-pages:3.50:2010/09/20:llrintf:3:lrint:3:
+@:LDP man-pages:3.50:2010/09/20:llrintl:3:lrint:3:
+@:LDP man-pages:3.50:2010/09/20:llround:3:lround:3:
+@:LDP man-pages:3.50:2010/09/20:llroundf:3:lround:3:
+@:LDP man-pages:3.50:2010/09/20:llroundl:3:lround:3:
+☆:LDP man-pages:3.41=>3.50:1993/04/25:localeconv:3:1998/05/25::tyoshino@eng.toyo.ac.jp:Takashi Yoshino:
+@:LDP man-pages:3.50:2010/02/25:localtime:3:ctime:3:
+@:LDP man-pages:3.50:2010/02/25:localtime_r:3:ctime:3:
+☆:LDP man-pages:3.41=>3.50:2012/07/07:lockf:3:2010/04/25::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:log:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:log10:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:log10f:3:log10:3:
+@:LDP man-pages:3.50:2010/09/20:log10l:3:log10:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:log1p:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:log1pf:3:log1p:3:
+@:LDP man-pages:3.50:2010/09/20:log1pl:3:log1p:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/12:log2:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/12:log2f:3:log2:3:
+@:LDP man-pages:3.50:2010/09/12:log2l:3:log2:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:logb:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:logbf:3:logb:3:
+@:LDP man-pages:3.50:2010/09/20:logbl:3:logb:3:
+@:LDP man-pages:3.50:2010/09/20:logf:3:log:3:
+☆:LDP man-pages:3.41=>3.50:2004/05/06:login:3:2005/02/14::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2010/06/13:login_tty:3:openpty:3:
+@:LDP man-pages:3.50:2010/09/20:logl:3:log:3:
+@:LDP man-pages:3.50:2004/05/06:logout:3:login:3:
+@:LDP man-pages:3.50:2008/07/02:logwtmp:3:updwtmp:3:
+☆:LDP man-pages:3.41=>3.50:2009/01/13:longjmp:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2007/07/26:lrand48:3:drand48:3:
+@:LDP man-pages:3.50:2007/07/26:lrand48_r:3:drand48_r:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:lrint:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:lrintf:3:lrint:3:
+@:LDP man-pages:3.50:2010/09/20:lrintl:3:lrint:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:lround:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:lroundf:3:lround:3:
+@:LDP man-pages:3.50:2010/09/20:lroundl:3:lround:3:
+☆:LDP man-pages:3.41=>3.50:1999/09/27:lsearch:3:2005/03/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2004/12/11:lseek64:3:2005/02/14::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2013/03/15:lutimes:3:futimes:3:
+@:LDP man-pages:3.50:2012/05/10:major:3:makedev:3:
+☆:LDP man-pages:3.41=>3.50:2013/02/12:makecontext:3:2008/12/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/10:makedev:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+×:LDP man-pages:3.50:2012/05/06:mallinfo:3:::::
+☆:LDP man-pages:3.41=>3.50:2012/05/10:malloc:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+×:LDP man-pages:3.50:2012/05/04:malloc_get_state:3:::::
+☆:LDP man-pages:3.41=>3.50:2010/10/13:malloc_hook:3:2012/05/26::amotoki@gmail.com:Akihiro MOTOKI:
+×:LDP man-pages:3.50:2012/04/28:malloc_info:3:::::
+※:LDP man-pages:3.50:2012/05/04:malloc_set_state:3:malloc_get_state:3:
+×:LDP man-pages:3.50:2012/05/06:malloc_stats:3:::::
+×:LDP man-pages:3.50:2012/03/29:malloc_trim:3:::::
+×:LDP man-pages:3.50:2012/03/29:malloc_usable_size:3:::::
+×:LDP man-pages:3.50:2012/04/30:mallopt:3:::::
+☆:LDP man-pages:3.41=>3.50:2010/09/10:matherr:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:mblen:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:mbrlen:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
+☆:LDP man-pages:3.41=>3.50:2011/09/28:mbrtowc:3:2008/07/24::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:2000/11/20:mbsinit:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
+☆:LDP man-pages:3.41=>3.50:2011/10/01:mbsnrtowcs:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
+☆:LDP man-pages:3.41=>3.50:2011/09/28:mbsrtowcs:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
+☆:LDP man-pages:3.41=>3.50:2011/09/28:mbstowcs:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
+☆:LDP man-pages:3.41=>3.50:2011/09/28:mbtowc:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
+×:LDP man-pages:3.50:2012/04/18:mcheck:3:::::
+※:LDP man-pages:3.50:2012/04/18:mcheck_check_all:3:mcheck:3:
+※:LDP man-pages:3.50:2012/04/18:mcheck_pedantic:3:mcheck:3:
+@:LDP man-pages:3.50:2012/03/23:memalign:3:posix_memalign:3:
+☆:LDP man-pages:3.41=>3.50:2009/01/13:memccpy:3:1997/07/26::tyoshino@eng.toyo.ac.jp:Takashi Yoshino:
+☆:LDP man-pages:3.41=>3.50:2012/04/23:memchr:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/11/25:memcmp:3:1997/12/17::nishi@rpts.cl.nec.co.jp:HIROFUMI Nishizuka:
+☆:LDP man-pages:3.41=>3.50:2010/11/15:memcpy:3:1997/02/21::tyoshino@eng.toyo.ac.jp:Takashi Yoshino:
+☆:LDP man-pages:3.41=>3.50:2010/09/10:memfrob:3:1998/05/34::ishikawa@linux.or.jp:ISHIKAWA Mutsumi:
+☆:LDP man-pages:3.41=>3.50:2008/12/05:memmem:3:1997/12/17::tyoshino@eng.toyo.ac.jp:Takashi Yoshino:
+☆:LDP man-pages:3.41=>3.50:1993/04/10:memmove:3:2007/06/15::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/08/12:mempcpy:3:2004/09/14::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2012/04/23:memrchr:3:memchr:3:
+☆:LDP man-pages:3.41=>3.50:1993/04/11:memset:3:1997/02/21::tyoshino@eng.toyo.ac.jp:Takashi Yoshino:
+@:LDP man-pages:3.50:2012/05/10:minor:3:makedev:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/26:mkdtemp:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/01/27:mkfifo:3:2008/10/08::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:2009/12/13:mkfifoat:3:2006/08/19::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2012/12/21:mkostemp:3:mkstemp:3:
+@:LDP man-pages:3.50:2012/12/21:mkostemps:3:mkstemp:3:
+☆:LDP man-pages:3.41=>3.50:2012/12/21:mkstemp:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/12/21:mkstemps:3:mkstemp:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:mktemp:3:1999/04/10::tanisako@osa.dec.com:Kazuyuki Tanisako:
+@:LDP man-pages:3.50:2010/02/25:mktime:3:ctime:3:
+@:LDP man-pages:3.50:2013/02/25:mmap64:3:mmap:2:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:modf:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:modff:3:modf:3:
+@:LDP man-pages:3.50:2010/09/20:modfl:3:modf:3:
+☆:LDP man-pages:3.41=>3.50:2012/04/26:mpool:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+※:LDP man-pages:3.50:2012/04/18:mprobe:3:mcheck:3:
+☆:LDP man-pages:3.41=>3.50:2010/08/29:mq_close:3:2006/04/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/08/29:mq_getattr:3:2006/04/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/10/04:mq_notify:3:2010/04/25::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2009/02/20:mq_open:3:2006/04/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:mq_receive:3:2006/04/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:mq_send:3:2006/04/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/08/29:mq_setattr:3:mq_getattr:3:
+@:LDP man-pages:3.50:2010/09/20:mq_timedreceive:3:mq_receive:3:
+@:LDP man-pages:3.50:2010/09/20:mq_timedsend:3:mq_send:3:
+☆:LDP man-pages:3.41=>3.50:2010/08/29:mq_unlink:3:2006/04/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2007/07/26:mrand48:3:drand48:3:
+@:LDP man-pages:3.50:2007/07/26:mrand48_r:3:drand48_r:3:
+×:LDP man-pages:3.50:2012/04/18:mtrace:3:::::
+※:LDP man-pages:3.50:2012/04/18:muntrace:3:mtrace:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:nan:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:nanf:3:nan:3:
+@:LDP man-pages:3.50:2010/09/20:nanl:3:nan:3:
+@:LDP man-pages:3.50:2010/09/20:nearbyint:3:rint:3:
+@:LDP man-pages:3.50:2010/09/20:nearbyintf:3:rint:3:
+@:LDP man-pages:3.50:2010/09/20:nearbyintl:3:rint:3:
+☆:LDP man-pages:3.41=>3.50:2012/08/05:netlink:3:1999/08/20::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:nextafter:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:nextafterf:3:nextafter:3:
+@:LDP man-pages:3.50:2010/09/20:nextafterl:3:nextafter:3:
+@:LDP man-pages:3.50:2010/09/20:nexttoward:3:nextafter:3:
+@:LDP man-pages:3.50:2010/09/20:nexttowardf:3:nextafter:3:
+@:LDP man-pages:3.50:2010/09/20:nexttowardl:3:nextafter:3:
+@:LDP man-pages:3.50:2010/09/20:nftw:3:ftw:3:
+☆:LDP man-pages:3.41=>3.50:2010/10/03:nl_langinfo:3:2001/07/15::KY4N-UCD@asahi-net.or.jp:UCHIDA Norihiro:
+@:LDP man-pages:3.50:2007/07/26:nrand48:3:drand48:3:
+@:LDP man-pages:3.50:2007/07/26:nrand48_r:3:drand48_r:3:
+@:LDP man-pages:3.50:2009/01/15:ntohl:3:byteorder:3:
+@:LDP man-pages:3.50:2009/01/15:ntohs:3:byteorder:3:
+☆:LDP man-pages:3.41=>3.50:2008/07/12:offsetof:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/12/05:on_exit:3:2009/01/15:o:amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/04/28:open_memstream:3:fmemopen:3:
+@:LDP man-pages:3.50:2012/04/28:open_wmemstream:3:fmemopen:3:
+☆:LDP man-pages:3.41=>3.50:2010/06/20:opendir:3:2007/10/14:o:amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/08/17:openlog:3:syslog:3:
+☆:LDP man-pages:3.41=>3.50:2010/06/13:openpty:3:2006/02/13::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/11/01:optarg:3:getopt:3:
+@:LDP man-pages:3.50:2010/11/01:opterr:3:getopt:3:
+@:LDP man-pages:3.50:2010/11/01:optind:3:getopt:3:
+@:LDP man-pages:3.50:2010/11/01:optopt:3:getopt:3:
+@:LDP man-pages:3.50:2003/04/04:passwd2des:3:xcrypt:3:
+@:LDP man-pages:3.50:1993/04/04:pathconf:3:fpathconf:3:
+@:LDP man-pages:3.50:2010/02/03:pclose:3:popen:3:
+☆:LDP man-pages:3.41=>3.50:2012/04/17:perror:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/07/17:pmap_getmaps:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:pmap_getport:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:pmap_rmtcall:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:pmap_set:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:pmap_unset:3:rpc:3:
+☆:LDP man-pages:3.41=>3.50:2010/02/03:popen:3:2008/11/09::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/02/12:posix_fallocate:3:2006/08/19::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2012/03/23:posix_memalign:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/04/20:posix_openpt:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/12:pow:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/08/11:pow10:3:2005/02/14::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2008/08/11:pow10f:3:pow10:3:
+@:LDP man-pages:3.50:2008/08/11:pow10l:3:pow10:3:
+@:LDP man-pages:3.50:2010/09/12:powf:3:pow:3:
+@:LDP man-pages:3.50:2010/09/12:powl:3:pow:3:
+☆:LDP man-pages:3.41=>3.50:2013/03/05:printf:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2007/07/26:profil:3:2005/03/15::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2006/04/29:program_invocation_name:3:2006/07/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2006/04/29:program_invocation_short_name:3:program_invocation_name:3:
+@:LDP man-pages:3.50:2010/10/06:psiginfo:3:psignal:3:
+☆:LDP man-pages:3.41=>3.50:2010/10/06:psignal:3:2012/05/26::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/11/11:pthread_attr_destroy:3:pthread_attr_init:3:
+@:LDP man-pages:3.50:2010/09/10:pthread_attr_getaffinity_np:3:pthread_attr_setaffinity_np:3:
+@:LDP man-pages:3.50:2010/02/03:pthread_attr_getdetachstate:3:pthread_attr_setdetachstate:3:
+@:LDP man-pages:3.50:2008/10/24:pthread_attr_getguardsize:3:pthread_attr_setguardsize:3:
+@:LDP man-pages:3.50:2012/03/15:pthread_attr_getinheritsched:3:pthread_attr_setinheritsched:3:
+@:LDP man-pages:3.50:2012/03/15:pthread_attr_getschedparam:3:pthread_attr_setschedparam:3:
+@:LDP man-pages:3.50:2010/02/03:pthread_attr_getschedpolicy:3:pthread_attr_setschedpolicy:3:
+@:LDP man-pages:3.50:2008/10/24:pthread_attr_getscope:3:pthread_attr_setscope:3:
+@:LDP man-pages:3.50:2008/10/24:pthread_attr_getstack:3:pthread_attr_setstack:3:
+@:LDP man-pages:3.50:2008/10/24:pthread_attr_getstackaddr:3:pthread_attr_setstackaddr:3:
+@:LDP man-pages:3.50:2012/03/15:pthread_attr_getstacksize:3:pthread_attr_setstacksize:3:
+☆:LDP man-pages:3.41=>3.50:2008/11/11:pthread_attr_init:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/10:pthread_attr_setaffinity_np:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/02/03:pthread_attr_setdetachstate:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/10/24:pthread_attr_setguardsize:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/03/15:pthread_attr_setinheritsched:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/03/15:pthread_attr_setschedparam:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/02/03:pthread_attr_setschedpolicy:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/10/24:pthread_attr_setscope:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/10/24:pthread_attr_setstack:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/10/24:pthread_attr_setstackaddr:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/03/15:pthread_attr_setstacksize:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/11/17:pthread_cancel:3:2012/05/01::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/11/24:pthread_cleanup_pop:3:pthread_cleanup_push:3:
+@:LDP man-pages:3.50:2008/12/04:pthread_cleanup_pop_restore_np:3:pthread_cleanup_push_defer_np:3:
+☆:LDP man-pages:3.41=>3.50:2008/11/24:pthread_cleanup_push:3:2012/06/04::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/12/04:pthread_cleanup_push_defer_np:3:2012/06/04::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/08/03:pthread_create:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/11/27:pthread_detach:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2009/03/30:pthread_equal:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2009/03/30:pthread_exit:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/10:pthread_getaffinity_np:3:pthread_setaffinity_np:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/10:pthread_getattr_np:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2009/04/10:pthread_getconcurrency:3:pthread_setconcurrency:3:
+☆:LDP man-pages:3.41=>3.50:2009/02/08:pthread_getcpuclockid:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+※:LDP man-pages:3.50:2013/02/04:pthread_getname_np:3:pthread_setname_np:3:
+@:LDP man-pages:3.50:2008/11/17:pthread_getschedparam:3:pthread_setschedparam:3:
+☆:LDP man-pages:3.41=>3.50:2008/11/27:pthread_join:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/08/19:pthread_kill:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/09:pthread_kill_other_threads_np:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/10/24:pthread_self:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/10:pthread_setaffinity_np:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/11/24:pthread_setcancelstate:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/11/24:pthread_setcanceltype:3:pthread_setcancelstate:3:
+☆:LDP man-pages:3.41=>3.50:2009/04/10:pthread_setconcurrency:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+×:LDP man-pages:3.50:2013/02/04:pthread_setname_np:3:::::
+☆:LDP man-pages:3.41=>3.50:2008/11/17:pthread_setschedparam:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/11/06:pthread_setschedprio:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/08/03:pthread_sigmask:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/08/19:pthread_sigqueue:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/04/14:pthread_testcancel:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/10:pthread_timedjoin_np:3:pthread_tryjoin_np:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/10:pthread_tryjoin_np:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/03/05:pthread_yield:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/09/03:ptsname:3:2005/03/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/09/03:ptsname_r:3:ptsname:3:
+@:LDP man-pages:3.50:2011/09/28:putc:3:puts:3:
+@:LDP man-pages:3.50:2008/08/29:putc_unlocked:3:unlocked_stdio:3:
+@:LDP man-pages:3.50:2011/09/28:putchar:3:puts:3:
+@:LDP man-pages:3.50:2008/08/29:putchar_unlocked:3:unlocked_stdio:3:
+☆:LDP man-pages:3.41=>3.50:2007/07/26:putenv:3:2008/07/24::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:2003/09/09:putgrent:3:2004/09/14::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2007/07/26:putpwent:3:1997/12/18::nishi@rpts.cl.nec.co.jp:HIROFUMI Nishizuka:
+☆:LDP man-pages:3.41=>3.50:2011/09/28:puts:3:2008/07/24::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:2013/01/22:putspent:3:getspnam:3:
+@:LDP man-pages:3.50:2008/06/29:pututline:3:getutent:3:
+@:LDP man-pages:3.50:2008/06/29:pututxline:3:getutent:3:
+@:LDP man-pages:3.50:2010/09/26:putw:3:getw:3:
+@:LDP man-pages:3.50:1999/07/25:putwc:3:fputwc:3:
+@:LDP man-pages:3.50:2008/08/29:putwc_unlocked:3:unlocked_stdio:3:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:putwchar:3:2001/11/09::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:2008/08/29:putwchar_unlocked:3:unlocked_stdio:3:
+@:LDP man-pages:3.50:2012/03/23:pvalloc:3:posix_memalign:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:qecvt:3:2002/09/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2007/07/26:qecvt_r:3:ecvt_r:3:
+@:LDP man-pages:3.50:2010/09/20:qfcvt:3:qecvt:3:
+@:LDP man-pages:3.50:2007/07/26:qfcvt_r:3:ecvt_r:3:
+@:LDP man-pages:3.50:2010/09/20:qgcvt:3:qecvt:3:
+☆:LDP man-pages:3.41=>3.50:2012/03/08:qsort:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/03/08:qsort_r:3:qsort:3:
+☆:LDP man-pages:3.41=>3.50:2007/12/28:queue:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/04/20:raise:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/10/01:rand:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/10/01:rand_r:3:rand:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:random:3:1997/01/21::tyoshino@eng.toyo.ac.jp:YOSHINO Takashi:
+☆:LDP man-pages:3.41=>3.50:2008/03/07:random_r:3:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/04/23:rawmemchr:3:memchr:3:
+☆:LDP man-pages:3.41=>3.50:2012/04/23:rcmd:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/04/23:rcmd_af:3:rcmd:3:
+☆:LDP man-pages:3.41=>3.50:1995/07/14:re_comp:3:1997/12/18::nishi@rpts.cl.nec.co.jp:HIROFUMI Nishizuka:
+@:LDP man-pages:3.50:1995/07/14:re_exec:3:re_comp:3:
+☆:LDP man-pages:3.41=>3.50:2012/07/07:readdir:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/07/07:readdir_r:3:readdir:3:
+@:LDP man-pages:3.50:2012/05/10:realloc:3:malloc:3:
+☆:LDP man-pages:3.41=>3.50:2013/03/15:realpath:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/04/23:recno:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/02/11:regcomp:3:regex:3:
+@:LDP man-pages:3.50:2013/02/11:regerror:3:regex:3:
+☆:LDP man-pages:3.41=>3.50:2013/02/11:regex:3:2005/03/15::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/02/11:regexec:3:regex:3:
+@:LDP man-pages:3.50:2013/02/11:regfree:3:regex:3:
+@:LDP man-pages:3.50:2008/07/17:registerrpc:3:rpc:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:remainder:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:remainderf:3:remainder:3:
+@:LDP man-pages:3.50:2010/09/20:remainderl:3:remainder:3:
+☆:LDP man-pages:3.41=>3.50:2008/12/03:remove:3:2008/07/24::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:2010/09/09:remque:3:insque:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:remquo:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:remquof:3:remquo:3:
+@:LDP man-pages:3.50:2010/09/20:remquol:3:remquo:3:
+@:LDP man-pages:3.50:2013/03/05:res_init:3:resolver:3:
+@:LDP man-pages:3.50:2013/03/05:res_mkquery:3:resolver:3:
+@:LDP man-pages:3.50:2013/03/05:res_query:3:resolver:3:
+@:LDP man-pages:3.50:2013/03/05:res_querydomain:3:resolver:3:
+@:LDP man-pages:3.50:2013/03/05:res_search:3:resolver:3:
+@:LDP man-pages:3.50:2013/03/05:res_send:3:resolver:3:
+☆:LDP man-pages:3.41=>3.50:2013/03/05:resolver:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:1993/11/29:rewind:3:fseek:3:
+☆:LDP man-pages:3.41=>3.50:1995/06/11:rewinddir:3:1997/12/24::nishi@rpts.cl.nec.co.jp:HIROFUMI Nishizuka:
+☆:LDP man-pages:3.41=>3.50:2012/04/23:rexec:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/04/23:rexec_af:3:rexec:3:
+@:LDP man-pages:3.50:2011/09/21:rindex:3:index:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:rint:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:rintf:3:rint:3:
+@:LDP man-pages:3.50:2010/09/20:rintl:3:rint:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:round:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:roundf:3:round:3:
+@:LDP man-pages:3.50:2010/09/20:roundl:3:round:3:
+☆:LDP man-pages:3.41=>3.50:2008/07/17:rpc:3:2001/11/09::ysato@h4.dion.ne.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2007/07/26:rpmatch:3:2006/07/31::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/04/23:rresvport:3:rcmd:3:
+@:LDP man-pages:3.50:2012/04/23:rresvport_af:3:rcmd:3:
+☆:LDP man-pages:3.41=>3.50:2012/08/03:rtime:3:2004/09/14::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2012/03/24:rtnetlink:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/04/23:ruserok:3:rcmd:3:
+@:LDP man-pages:3.50:2012/04/23:ruserok_af:3:rcmd:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:scalb:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:scalbf:3:scalb:3:
+@:LDP man-pages:3.50:2010/09/20:scalbl:3:scalb:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:scalbln:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:scalblnf:3:scalbln:3:
+@:LDP man-pages:3.50:2010/09/20:scalblnl:3:scalbln:3:
+@:LDP man-pages:3.50:2010/09/20:scalbn:3:scalbln:3:
+@:LDP man-pages:3.50:2010/09/20:scalbnf:3:scalbln:3:
+@:LDP man-pages:3.50:2010/09/20:scalbnl:3:scalbln:3:
+☆:LDP man-pages:3.41=>3.50:2012/04/26:scandir:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/03/17:scandirat:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/01/30:scanf:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/10/31:sched_getcpu:3:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/08/14:secure_getenv:3:getenv:3:
+@:LDP man-pages:3.50:2007/07/26:seed48:3:drand48:3:
+@:LDP man-pages:3.50:2007/07/26:seed48_r:3:drand48_r:3:
+☆:LDP man-pages:3.41=>3.50:2009/03/11:seekdir:3:1997/12/24::nishi@rpts.cl.nec.co.jp:HIROFUMI Nishizuka:
+☆:LDP man-pages:3.41=>3.50:2012/05/13:sem_close:3:2006/04/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/13:sem_destroy:3:2006/04/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/13:sem_getvalue:3:2006/04/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/13:sem_init:3:2006/04/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/13:sem_open:3:2009/03/09::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/13:sem_post:3:2006/04/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/05/13:sem_timedwait:3:sem_wait:3:
+@:LDP man-pages:3.50:2012/05/13:sem_trywait:3:sem_wait:3:
+☆:LDP man-pages:3.41=>3.50:2012/05/13:sem_unlink:3:2006/04/24::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/13:sem_wait:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2003/09/09:setaliasent:3:2004/09/14::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2012/08/03:setbuf:3:2001/07/14::ysato@h4.dion.ne.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2012/08/03:setbuffer:3:setbuf:3:
+※:LDP man-pages:3.50:2009/03/15:setcontext:3:getcontext:3:
+☆:LDP man-pages:3.41=>3.50:2009/09/20:setenv:3:2005/03/15::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2002/02/28:setfsent:3:getfsent:3:
+@:LDP man-pages:3.50:2010/10/21:setgrent:3:getgrent:3:
+@:LDP man-pages:3.50:2010/10/04:sethostent:3:gethostbyname:3:
+@:LDP man-pages:3.50:2010/09/20:sethostid:3:gethostid:3:
+☆:LDP man-pages:3.41=>3.50:2009/06/26:setjmp:3:2009/03/05::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:2003/04/04:setkey:3:encrypt:3:
+@:LDP man-pages:3.50:2003/04/04:setkey_r:3:encrypt:3:
+@:LDP man-pages:3.50:2012/08/03:setlinebuf:3:setbuf:3:
+☆:LDP man-pages:3.41=>3.50:2008/12/05:setlocale:3:2002/10/12::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+☆:LDP man-pages:3.41=>3.50:2001/10/05:setlogmask:3:2001/11/03::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2009/09/15:setmntent:3:getmntent:3:
+@:LDP man-pages:3.50:2008/08/19:setnetent:3:getnetent:3:
+☆:LDP man-pages:3.41=>3.50:2007/07/26:setnetgrent:3:2005/03/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/19:setprotoent:3:getprotoent:3:
+@:LDP man-pages:3.50:2010/10/21:setpwent:3:getpwent:3:
+@:LDP man-pages:3.50:2008/08/19:setrpcent:3:getrpcent:3:
+@:LDP man-pages:3.50:2008/08/19:setservent:3:getservent:3:
+@:LDP man-pages:3.50:2013/01/22:setspent:3:getspnam:3:
+@:LDP man-pages:3.50:2010/09/20:setstate:3:random:3:
+@:LDP man-pages:3.50:2008/03/07:setstate_r:3:random_r:3:
+@:LDP man-pages:3.50:2002/07/18:setttyent:3:getttyent:3:
+@:LDP man-pages:3.50:2007/07/26:setusershell:3:getusershell:3:
+@:LDP man-pages:3.50:2008/06/29:setutent:3:getutent:3:
+@:LDP man-pages:3.50:2008/06/29:setutxent:3:getutent:3:
+@:LDP man-pages:3.50:2012/08/03:setvbuf:3:setbuf:3:
+@:LDP man-pages:3.50:2013/01/22:sgetspent:3:getspnam:3:
+@:LDP man-pages:3.50:2013/01/22:sgetspent_r:3:getspnam:3:
+☆:LDP man-pages:3.41=>3.50:2009/02/25:shm_open:3:2009/03/09::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2009/02/25:shm_unlink:3:shm_open:3:
+@:LDP man-pages:3.50:2008/09/01:sigaddset:3:sigsetops:3:
+@:LDP man-pages:3.50:2008/09/01:sigandset:3:sigsetops:3:
+@:LDP man-pages:3.50:2012/09/06:sigblock:3:sigvec:3:
+@:LDP man-pages:3.50:2008/09/01:sigdelset:3:sigsetops:3:
+@:LDP man-pages:3.50:2008/09/01:sigemptyset:3:sigsetops:3:
+@:LDP man-pages:3.50:2008/09/01:sigfillset:3:sigsetops:3:
+@:LDP man-pages:3.50:2012/09/06:siggetmask:3:sigvec:3:
+@:LDP man-pages:3.50:2010/09/20:sighold:3:sigset:3:
+@:LDP man-pages:3.50:2010/09/20:sigignore:3:sigset:3:
+☆:LDP man-pages:3.41=>3.50:2011/09/09:siginterrupt:3:1998/05/24::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
+@:LDP man-pages:3.50:2008/09/01:sigisemptyset:3:sigsetops:3:
+@:LDP man-pages:3.50:2008/09/01:sigismember:3:sigsetops:3:
+@:LDP man-pages:3.50:2009/01/13:siglongjmp:3:longjmp:3:
+@:LDP man-pages:3.50:2012/09/06:sigmask:3:sigvec:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:signbit:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/11:signgam:3:lgamma:3:
+☆:LDP man-pages:3.41=>3.50:2009/02/04:significand:3:2005/02/14::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2009/02/04:significandf:3:significand:3:
+@:LDP man-pages:3.50:2009/02/04:significandl:3:significand:3:
+@:LDP man-pages:3.50:2008/09/01:sigorset:3:sigsetops:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/12:sigpause:3:2005/12/05::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/03/25:sigqueue:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:sigrelse:3:sigset:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:sigset:3:2005/12/08::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2009/06/26:sigsetjmp:3:setjmp:3:
+@:LDP man-pages:3.50:2012/09/06:sigsetmask:3:sigvec:3:
+☆:LDP man-pages:3.41=>3.50:2008/09/01:sigsetops:3:2005/12/05::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/26:sigstack:3:sigaltstack:2:
+☆:LDP man-pages:3.41=>3.50:2012/09/06:sigvec:3:2005/12/13::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/07/21:sigwait:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/11:sin:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/08/11:sincos:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/11:sincosf:3:sincos:3:
+@:LDP man-pages:3.50:2008/08/11:sincosl:3:sincos:3:
+@:LDP man-pages:3.50:2010/09/11:sinf:3:sin:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:sinh:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:sinhf:3:sinh:3:
+@:LDP man-pages:3.50:2010/09/20:sinhl:3:sinh:3:
+@:LDP man-pages:3.50:2010/09/11:sinl:3:sin:3:
+☆:LDP man-pages:3.41=>3.50:2010/02/03:sleep:3:1997/01/21::tyoshino@eng.toyo.ac.jp:YOSHINO Takashi:
+@:LDP man-pages:3.50:2013/03/05:snprintf:3:printf:3:
+☆:LDP man-pages:3.41=>3.50:2008/12/03:sockatmark:3:2006/08/19::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2013/03/05:sprintf:3:printf:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:sqrt:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:sqrtf:3:sqrt:3:
+@:LDP man-pages:3.50:2010/09/20:sqrtl:3:sqrt:3:
+@:LDP man-pages:3.50:2010/10/01:srand:3:rand:3:
+@:LDP man-pages:3.50:2007/07/26:srand48:3:drand48:3:
+@:LDP man-pages:3.50:2007/07/26:srand48_r:3:drand48_r:3:
+@:LDP man-pages:3.50:2010/09/20:srandom:3:random:3:
+@:LDP man-pages:3.50:2008/03/07:srandom_r:3:random_r:3:
+@:LDP man-pages:3.50:2013/01/30:sscanf:3:scanf:3:
+@:LDP man-pages:3.50:2007/07/26:ssignal:3:gsignal:3:
+☆:LDP man-pages:3.41=>3.50:2003/08/22:statvfs:3:2005/02/14::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2013/03/15:stdarg:3:2008/07/24::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:2008/07/14:stderr:3:stdin:3:
+☆:LDP man-pages:3.41=>3.50:2008/07/14:stdin:3:2005/09/05::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2001/12/26:stdio:3:2004/02/06::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2001/12/16:stdio_ext:3:2002/08/14::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/07/14:stdout:3:stdin:3:
+☆:LDP man-pages:3.41=>3.50:2012/03/15:stpcpy:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2011/09/28:stpncpy:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
+☆:LDP man-pages:3.41=>3.50:2012/05/10:strcasecmp:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2011/09/28:strcasestr:3:strstr:3:
+☆:LDP man-pages:3.41=>3.50:2012/07/19:strcat:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/04/24:strchr:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/04/24:strchrnul:3:strchr:3:
+☆:LDP man-pages:3.41=>3.50:2012/11/25:strcmp:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:strcoll:3:2007/06/01::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/07/19:strcpy:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/05/10:strcspn:3:strspn:3:
+☆:LDP man-pages:3.41=>3.50:2012/05/10:strdup:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/05/10:strdupa:3:strdup:3:
+☆:LDP man-pages:3.41=>3.50:2012/04/22:strerror:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/04/22:strerror_r:3:strerror:3:
+☆:LDP man-pages:3.41=>3.50:2000/12/05:strfmon:3:2001/02/14::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:strfry:3:1998/05/25::motoki@hal.t.u-tokyo.ac.jp:Akihiro Motoki:
+☆:LDP man-pages:3.41=>3.50:2012/05/10:strftime:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/02/25:string:3:1997/01/20::yoshino@civil.jcn.nihon-u.ac.jp:YOSHINO Takashi:
+☆:LDP man-pages:3.41=>3.50:2012/05/04:strlen:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/05/10:strncasecmp:3:strcasecmp:3:
+@:LDP man-pages:3.50:2012/07/19:strncat:3:strcat:3:
+@:LDP man-pages:3.50:2012/11/25:strncmp:3:strcmp:3:
+@:LDP man-pages:3.50:2012/07/19:strncpy:3:strcpy:3:
+@:LDP man-pages:3.50:2012/05/10:strndup:3:strdup:3:
+@:LDP man-pages:3.50:2012/05/10:strndupa:3:strdup:3:
+☆:LDP man-pages:3.41=>3.50:2012/05/10:strnlen:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/10:strpbrk:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2009/12/05:strptime:3:2002/01/14::ysato@h4.dion.ne.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2012/04/24:strrchr:3:strchr:3:
+☆:LDP man-pages:3.41=>3.50:2011/09/28:strsep:3:2009/03/05::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:2010/09/15:strsignal:3:1999/12/25::argrath@yo.rim.or.jp:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:2012/05/10:strspn:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2011/09/28:strstr:3:2008/07/24::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:strtod:3:2006/07/20::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:strtof:3:strtod:3:
+☆:LDP man-pages:3.41=>3.50:2003/11/28:strtoimax:3:2004/09/14::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2012/05/10:strtok:3:2012/05/31:o:amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/05/10:strtok_r:3:strtok:3:
+☆:LDP man-pages:3.41=>3.50:2013/02/10:strtol:3:2006/07/20::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:strtold:3:strtod:3:
+@:LDP man-pages:3.50:2013/02/10:strtoll:3:strtol:3:
+@:LDP man-pages:3.50:2013/02/10:strtoq:3:strtol:3:
+☆:LDP man-pages:3.41=>3.50:2011/09/15:strtoul:3:2006/07/20::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2011/09/15:strtoull:3:strtoul:3:
+@:LDP man-pages:3.50:2003/11/28:strtoumax:3:strtoimax:3:
+@:LDP man-pages:3.50:2011/09/15:strtouq:3:strtoul:3:
+☆:LDP man-pages:3.41=>3.50:2001/12/19:strverscmp:3:2002/09/22::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/10:strxfrm:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/07/17:svc_destroy:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:svc_freeargs:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:svc_getargs:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:svc_getcaller:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:svc_getreq:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:svc_getreqset:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:svc_register:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:svc_run:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:svc_sendreply:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:svc_unregister:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:svcerr_auth:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:svcerr_decode:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:svcerr_noproc:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:svcerr_noprog:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:svcerr_progvers:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:svcerr_systemerr:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:svcerr_weakauth:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:svcfd_create:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:svcraw_create:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:svctcp_create:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:svcudp_bufcreate:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:svcudp_create:3:rpc:3:
+☆:LDP man-pages:3.41=>3.50:2001/12/15:swab:3:2008/07/24::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:2013/02/12:swapcontext:3:makecontext:3:
+@:LDP man-pages:3.50:2011/09/17:swprintf:3:wprintf:3:
+@:LDP man-pages:3.50:2012/04/17:sys_errlist:3:perror:3:
+@:LDP man-pages:3.50:2012/04/17:sys_nerr:3:perror:3:
+☆:LDP man-pages:3.41=>3.50:2013/02/12:sysconf:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/08/17:syslog:3:2012/05/31:o:amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/10:system:3:2012/05/31:o:amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2007/05/04:sysv_signal:3:2007/06/03::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/11:tan:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/11:tanf:3:tan:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:tanh:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:tanhf:3:tanh:3:
+@:LDP man-pages:3.50:2010/09/20:tanhl:3:tanh:3:
+@:LDP man-pages:3.50:2010/09/11:tanl:3:tan:3:
+@:LDP man-pages:3.50:2013/03/15:tcdrain:3:termios:3:
+@:LDP man-pages:3.50:2013/03/15:tcflow:3:termios:3:
+@:LDP man-pages:3.50:2013/03/15:tcflush:3:termios:3:
+@:LDP man-pages:3.50:2013/03/15:tcgetattr:3:termios:3:
+☆:LDP man-pages:3.41=>3.50:2003/01/28:tcgetpgrp:3:2003/08/30::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/10:tcgetsid:3:2003/08/30::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/03/15:tcsendbreak:3:termios:3:
+@:LDP man-pages:3.50:2013/03/15:tcsetattr:3:termios:3:
+@:LDP man-pages:3.50:2003/01/28:tcsetpgrp:3:tcgetpgrp:3:
+@:LDP man-pages:3.50:2012/08/03:tdelete:3:tsearch:3:
+@:LDP man-pages:3.50:2012/08/03:tdestroy:3:tsearch:3:
+☆:LDP man-pages:3.41=>3.50:2009/03/11:telldir:3:2010/04/25::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/08/06:tempnam:3:2006/07/26::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/03/15:termios:3:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/08/03:tfind:3:tsearch:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:tgamma:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:tgammaf:3:tgamma:3:
+@:LDP man-pages:3.50:2010/09/20:tgammal:3:tgamma:3:
+☆:LDP man-pages:3.41=>3.50:2007/07/26:timegm:3:2002/01/14::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+@:LDP man-pages:3.50:2007/07/26:timelocal:3:timegm:3:
+☆:LDP man-pages:3.41=>3.50:2010/02/25:timeradd:3:2007/10/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/02/25:timerclear:3:timeradd:3:
+@:LDP man-pages:3.50:2010/02/25:timercmp:3:timeradd:3:
+@:LDP man-pages:3.50:2010/02/25:timerisset:3:timeradd:3:
+@:LDP man-pages:3.50:2010/02/25:timersub:3:timeradd:3:
+@:LDP man-pages:3.50:2012/03/25:timezone:3:tzset:3:
+☆:LDP man-pages:3.41=>3.50:2008/07/14:tmpfile:3:2001/12/14:o:ysato@h4.dion.ne.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2010/09/10:tmpnam:3:2006/07/26:o:amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/10:tmpnam_r:3:tmpnam:3:
+☆:LDP man-pages:3.41=>3.50:2009/03/15:toascii:3:1997/12/16::nishi@rpts.cl.nec.co.jp:HIROFUMI Nishizuka:
+@:LDP man-pages:3.50:1993/04/04:tolower:3:toupper:3:
+☆:LDP man-pages:3.41=>3.50:1993/04/04:toupper:3:1997/04/29::rui@linux.or.jp:Ueyama Rui:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:towctrans:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:towlower:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:towupper:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:trunc:3:2008/09/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:truncf:3:trunc:3:
+@:LDP man-pages:3.50:2010/09/20:truncl:3:trunc:3:
+☆:LDP man-pages:3.41=>3.50:2012/08/03:tsearch:3:2002/02/14::ysato@h4.dion.ne.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2012/12/21:ttyname:3:2008/07/24::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:2012/12/21:ttyname_r:3:ttyname:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:ttyslot:3:2004/09/14::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2012/08/03:twalk:3:tsearch:3:
+@:LDP man-pages:3.50:2012/03/25:tzname:3:tzset:3:
+☆:LDP man-pages:3.41=>3.50:2012/03/25:tzset:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:ualarm:3:2007/05/04::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/01/22:ulckpwdf:3:getspnam:3:
+☆:LDP man-pages:3.41=>3.50:2008/08/06:ulimit:3:1998/12/06::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+☆:LDP man-pages:3.41=>3.50:2012/12/21:undocumented:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/01/18:ungetc:3:gets:3:
+☆:LDP man-pages:3.41=>3.50:1999/09/19:ungetwc:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
+☆:LDP man-pages:3.41=>3.50:2008/08/29:unlocked_stdio:3:2001/11/03::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/06/14:unlockpt:3:2003/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2009/09/20:unsetenv:3:setenv:3:
+☆:LDP man-pages:3.41=>3.50:2008/07/02:updwtmp:3:2008/10/08::argrath@ub32.org:Kentaro Shirakata:
+@:LDP man-pages:3.50:2008/07/02:updwtmpx:3:updwtmp:3:
+☆:LDP man-pages:3.41=>3.50:2010/12/03:usleep:3:2007/05/04::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/06/29:utmpname:3:getutent:3:
+@:LDP man-pages:3.50:2008/06/29:utmpxname:3:getutent:3:
+@:LDP man-pages:3.50:2013/03/15:va_arg:3:stdarg:3:
+@:LDP man-pages:3.50:2013/03/15:va_copy:3:stdarg:3:
+@:LDP man-pages:3.50:2013/03/15:va_end:3:stdarg:3:
+@:LDP man-pages:3.50:2013/03/15:va_start:3:stdarg:3:
+@:LDP man-pages:3.50:2012/03/23:valloc:3:posix_memalign:3:
+@:LDP man-pages:3.50:2001/12/18:vasprintf:3:asprintf:3:
+@:LDP man-pages:3.50:2010/09/15:vdprintf:3:dprintf:3:
+@:LDP man-pages:3.50:2012/03/15:verr:3:err:3:
+@:LDP man-pages:3.50:2012/03/15:verrx:3:err:3:
+@:LDP man-pages:3.50:2012/04/26:versionsort:3:scandir:3:
+@:LDP man-pages:3.50:2013/03/05:vfprintf:3:printf:3:
+@:LDP man-pages:3.50:2013/01/30:vfscanf:3:scanf:3:
+@:LDP man-pages:3.50:2011/09/17:vfwprintf:3:wprintf:3:
+@:LDP man-pages:3.50:2013/02/11:vlimit:3:getrlimit:2:
+@:LDP man-pages:3.50:2013/03/05:vprintf:3:printf:3:
+@:LDP man-pages:3.50:2013/01/30:vscanf:3:scanf:3:
+@:LDP man-pages:3.50:2013/03/05:vsnprintf:3:printf:3:
+@:LDP man-pages:3.50:2013/03/05:vsprintf:3:printf:3:
+@:LDP man-pages:3.50:2013/01/30:vsscanf:3:scanf:3:
+@:LDP man-pages:3.50:2011/09/17:vswprintf:3:wprintf:3:
+@:LDP man-pages:3.50:2012/08/17:vsyslog:3:syslog:3:
+※:LDP man-pages:3.50:2010/09/26:vtimes:3:getrusage:2:
+@:LDP man-pages:3.50:2012/03/15:vwarn:3:err:3:
+@:LDP man-pages:3.50:2012/03/15:vwarnx:3:err:3:
+@:LDP man-pages:3.50:2011/09/17:vwprintf:3:wprintf:3:
+@:LDP man-pages:3.50:2012/03/15:warn:3:err:3:
+@:LDP man-pages:3.50:2012/03/15:warnx:3:err:3:
+☆:LDP man-pages:3.41=>3.50:2011/10/01:wcpcpy:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2011/10/01:wcpncpy:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:2011/09/28:wcrtomb:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/15:wcscasecmp:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:2011/09/28:wcscat:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:wcschr:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:wcscmp:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:2011/09/28:wcscpy:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:wcscspn:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:2010/09/15:wcsdup:3:2004/06/13::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2011/09/28:wcslen:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/15:wcsncasecmp:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:2011/09/28:wcsncat:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:2011/09/28:wcsncmp:3:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2011/09/28:wcsncpy:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:2011/10/01:wcsnlen:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:2011/10/16:wcsnrtombs:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:wcspbrk:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:wcsrchr:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:2011/10/16:wcsrtombs:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:wcsspn:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:2011/09/28:wcsstr:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:2003/11/01:wcstoimax:3:2004/09/14::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2011/09/28:wcstok:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:2011/10/16:wcstombs:3:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2003/11/01:wcstoumax:3:wcstoimax:3:
+☆:LDP man-pages:3.41=>3.50:2010/09/10:wcswidth:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:2011/09/22:wctob:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:wctomb:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:wctrans:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:wctype:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:2011/09/28:wcwidth:3:2002/08/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:wmemchr:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:wmemcmp:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:wmemcpy:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:wmemmove:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+@:LDP man-pages:3.50:2008/08/12:wmempcpy:3:mempcpy:3:
+☆:LDP man-pages:3.41=>3.50:1999/07/25:wmemset:3:1999/10/29::fujiwara@linux.or.jp:FUJIWARA Teruyoshi:
+☆:LDP man-pages:3.41=>3.50:2008/07/14:wordexp:3:2004/09/29::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2008/07/14:wordfree:3:wordexp:3:
+☆:LDP man-pages:3.41=>3.50:2011/09/17:wprintf:3:2000/01/11::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
+☆:LDP man-pages:3.41=>3.50:2003/04/04:xcrypt:3:2004/10/16::ysato444@yahoo.co.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2003/04/04:xdecrypt:3:xcrypt:3:
+☆:LDP man-pages:3.41=>3.50:2007/12/30:xdr:3:2000/01/14::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
+@:LDP man-pages:3.50:2008/07/17:xdr_accepted_reply:3:rpc:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_array:3:xdr:3:
+@:LDP man-pages:3.50:2008/07/17:xdr_authunix_parms:3:rpc:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_bool:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_bytes:3:xdr:3:
+@:LDP man-pages:3.50:2008/07/17:xdr_callhdr:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:xdr_callmsg:3:rpc:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_char:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_destroy:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_double:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_enum:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_float:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_free:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_getpos:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_inline:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_int:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_long:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_opaque:3:xdr:3:
+@:LDP man-pages:3.50:2008/07/17:xdr_opaque_auth:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:xdr_pmap:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:xdr_pmaplist:3:rpc:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_pointer:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_reference:3:xdr:3:
+@:LDP man-pages:3.50:2008/07/17:xdr_rejected_reply:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:xdr_replymsg:3:rpc:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_setpos:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_short:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_string:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_u_char:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_u_int:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_u_long:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_u_short:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_union:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_vector:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_void:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdr_wrapstring:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdrmem_create:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdrrec_create:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdrrec_endofrecord:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdrrec_eof:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdrrec_skiprecord:3:xdr:3:
+@:LDP man-pages:3.50:2007/12/30:xdrstdio_create:3:xdr:3:
+@:LDP man-pages:3.50:2003/04/04:xencrypt:3:xcrypt:3:
+@:LDP man-pages:3.50:2008/07/17:xprt_register:3:rpc:3:
+@:LDP man-pages:3.50:2008/07/17:xprt_unregister:3:rpc:3:
+☆:LDP man-pages:3.41=>3.50:2008/08/10:y0:3:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2008/08/10:y0f:3:y0:3:
+@:LDP man-pages:3.50:2008/08/10:y0l:3:y0:3:
+@:LDP man-pages:3.50:2008/08/10:y1:3:y0:3:
+@:LDP man-pages:3.50:2008/08/10:y1f:3:y0:3:
+@:LDP man-pages:3.50:2008/08/10:y1l:3:y0:3:
+@:LDP man-pages:3.50:2008/08/10:yn:3:y0:3:
+@:LDP man-pages:3.50:2008/08/10:ynf:3:y0:3:
+@:LDP man-pages:3.50:2008/08/10:ynl:3:y0:3:
+×:LDP man-pages:3.50:2012/08/05:cciss:4:::::
+☆:LDP man-pages:3.41=>3.50:1994/10/31:console:4:2002/01/14:o:argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:2012/08/05:console_codes:4:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2009/02/28:console_ioctl:4:2008/07/22::argrath@ub32.org:Kentaro Shirakata:
+×:LDP man-pages:3.50:2009/03/31:cpuid:4:::::
+☆:LDP man-pages:3.41=>3.50:2012/08/05:dsp56k:4:2000/07/11::sato@complex.eng.hokudai.ac.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2010/08/29:fd:4:1998/01/12:o:ishikawa@linux.or.jp:ISHIKAWA Mutsumi:
+☆:LDP man-pages:3.41=>3.50:2007/11/24:full:4:2006/07/20::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:1992/12/17:hd:4:1998/02/05:o:ishikawa@linux.or.jp:ISHIKAWA Mutsumi:
+×:LDP man-pages:3.50:2012/08/05:hpsa:4:::::
+☆:LDP man-pages:3.41=>3.50:2010/09/04:initrd:4:2012/05/31:o:amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2007/10/23:intro:4:1998/02/05:o:ishikawa@linux.or.jp:ISHIKAWA Mutsumi:
+@:LDP man-pages:3.50:1992/11/21:kmem:4:mem:4:
+☆:LDP man-pages:3.41=>3.50:1995/01/15:lp:4:1998/02/05:o:ishikawa@linux.or.jp:ISHIKAWA Mutsumi:
+☆:LDP man-pages:3.41=>3.50:1992/11/21:mem:4:1998/02/05:o:ishikawa@linux.or.jp:ISHIKAWA Mutsumi:
+☆:LDP man-pages:3.41=>3.50:1996/02/10:mouse:4:1999/03/24:o:ss236rx@ymg.urban.ne.jp:Shouichi Saito:
+×:LDP man-pages:3.50:2009/03/31:msr:4:::::
+☆:LDP man-pages:3.41=>3.50:2009/02/23:null:4:1998/02/05:o:ishikawa@linux.or.jp:ISHIKAWA Mutsumi:
+@:LDP man-pages:3.50:1992/11/21:port:4:mem:4:
+@:LDP man-pages:3.50:2002/10/09:ptmx:4:pts:4:
+☆:LDP man-pages:3.41=>3.50:2002/10/09:pts:4:2003/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:1992/11/21:ram:4:1997/01/12:o:ishikawa@linux.or.jp:ISHIKAWA Mutsumi:
+☆:LDP man-pages:3.41=>3.50:2013/03/15:random:4:2008/08/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/02/25:rtc:4:2007/02/08::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2012/05/03:sd:4:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/08/05:sk98lin:4:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/04:st:4:2005/06/12::nakano@st.seikei.ac.jp:NAKANO Takeo:
+☆:LDP man-pages:3.41=>3.50:2003/04/07:tty:4:2003/09/14::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:1992/12/19:ttyS:4:1998/02/05::ishikawa@linux.or.jp:ISHIKAWA Mutsumi:
+☆:LDP man-pages:3.41=>3.50:2008/10/29:tty_ioctl:4:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/03/15:urandom:4:random:4:
+☆:LDP man-pages:3.41=>3.50:2007/12/17:vcs:4:2001/02/11::sato@complex.eng.hokudai.ac.jp:Yuichi SATO:
+@:LDP man-pages:3.50:2007/12/17:vcsa:4:vcs:4:
+☆:LDP man-pages:3.41=>3.50:1996/10/22:wavelan:4:1998/02/10::ishikawa@linux.or.jp:ISHIKAWA Mutsumi:
+@:LDP man-pages:3.50:2009/02/23:zero:4:null:4:
+☆:LDP man-pages:3.41=>3.50:2008/06/15:acct:5:2008/08/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:1994/11/28:charmap:5:2008/07/22::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:2013/02/25:core:5:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2001/12/26:dir_colors:5:2002/01/14::ysato@h4.dion.ne.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2010/06/19:elf:5:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/08/05:filesystems:5:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/08/05:fs:5:filesystems:5:
+☆:LDP man-pages:3.41=>3.50:2000/08/27:ftpusers:5:2001/03/12::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+×:LDP man-pages:3.50:2013/02/13:gai.conf:5:::::
+☆:LDP man-pages:3.41=>3.50:2010/10/21:group:5:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2003/08/23:host.conf:5:2003/10/15::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2002/06/16:hosts:5:2005/09/06::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2003/08/24:hosts.equiv:5:2005/03/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2007/10/23:intro:5:1998/10/13::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+@:LDP man-pages:3.50:2013/02/12:ipc:5:svipc:7:
+☆:LDP man-pages:3.41=>3.50:1993/07/24:issue:5:1998/07/25::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+☆:LDP man-pages:3.41=>3.50:2008/06/17:locale:5:2008/08/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:1992/12/29:motd:5:1998/2/4::nagoya@cc.hit-u.ac.jp:Hiroaki Nagoya:
+☆:LDP man-pages:3.41=>3.50:2008/09/04:networks:5:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/04/16:nologin:5:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/02/12:nscd.conf:5:2006/07/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+×:LDP man-pages:3.50:2013/02/13:nss:5:::::
+☆:LDP man-pages:3.41=>3.50:2013/02/12:nsswitch.conf:5:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+※:LDP man-pages:3.50:2012/08/05:numa_maps:5:numa:7:
+☆:LDP man-pages:3.41=>3.50:2012/05/03:passwd:5:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/02/11:proc:5:2012/06/04::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/08/05:protocols:5:2008/07/22::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:2013/03/05:resolv.conf:5:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/03/05:resolver:5:resolv.conf:5:
+☆:LDP man-pages:3.41=>3.50:1985/09/26:rpc:5:2008/07/22::argrath@ub32.org:Kentaro Shirakata:
+☆:LDP man-pages:3.41=>3.50:1992/12/29:securetty:5:2003/01/08::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/05/22:services:5:2002/08/14::amotoki@dd.iij4u.or.jp:Akihiro Motoki:
+☆:LDP man-pages:3.41=>3.50:2012/12/31:shells:5:2000/12/11::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+☆:LDP man-pages:3.41=>3.50:2007/09/30:slabinfo:5:2001/09/10::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+☆:LDP man-pages:3.41=>3.50:1996/10/21:termcap:5:2000/10/12::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+☆:LDP man-pages:3.41=>3.50:2012/12/31:ttytype:5:1998/02/10::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+☆:LDP man-pages:3.41=>3.50:2012/05/04:tzfile:5:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/02/11:utmp:5:2008/08/19::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/02/11:utmpx:5:utmp:5:
+@:LDP man-pages:3.50:2013/02/11:wtmp:5:utmp:5:
+☆:LDP man-pages:3.41=>3.50:2007/10/23:intro:6:1997/11/15::pessi@kmc.kyoto-u.ac.jp:II Ryouta:
+☆:LDP man-pages:3.41=>3.50:2012/08/05:aio:7:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:armscii-8:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/11/25:arp:7:2009/01/15::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2009/02/12:ascii:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/19:boot:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/03/15:bootparam:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/03/11:capabilities:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/08/05:charsets:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2011/09/16:complex:7:2006/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:cp1251:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+×:LDP man-pages:3.50:2013/02/12:cpuset:7:::::
+☆:LDP man-pages:3.41=>3.50:2008/06/03:credentials:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/11/20:ddp:7:1999/12/06::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+☆:LDP man-pages:3.41=>3.50:2009/07/25:environ:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/04/17:epoll:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/08/05:feature_test_macros:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/12/03:fifo:7:2006/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/08/05:futex:7:2006/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/08/05:glibc:7:libc:7:
+☆:LDP man-pages:3.41=>3.50:2012/07/28:glob:7:2003/09/28::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+☆:LDP man-pages:3.41=>3.50:2012/08/05:hier:7:2002/01/14::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+☆:LDP man-pages:3.41=>3.50:2010/11/07:hostname:7:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/10:icmp:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/02/25:inotify:7:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2007/10/23:intro:7:2005/12/05::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/02/12:ip:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/12/16:ipv6:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/08/14:iso-8859-1:7:iso_8859-1:7:
+@:LDP man-pages:3.50:2010/09/20:iso-8859-10:7:iso_8859-10:7:
+@:LDP man-pages:3.50:2010/09/20:iso-8859-11:7:iso_8859-11:7:
+@:LDP man-pages:3.50:2010/09/20:iso-8859-13:7:iso_8859-13:7:
+@:LDP man-pages:3.50:2010/09/20:iso-8859-14:7:iso_8859-14:7:
+@:LDP man-pages:3.50:1999/05/31:iso-8859-15:7:iso_8859-15:7:
+@:LDP man-pages:3.50:2012/08/05:iso-8859-16:7:iso_8859-16:7:
+@:LDP man-pages:3.50:2012/08/05:iso-8859-2:7:iso_8859-2:7:
+@:LDP man-pages:3.50:2010/09/20:iso-8859-3:7:iso_8859-3:7:
+@:LDP man-pages:3.50:2009/01/24:iso-8859-4:7:iso_8859-4:7:
+@:LDP man-pages:3.50:2010/09/20:iso-8859-5:7:iso_8859-5:7:
+@:LDP man-pages:3.50:2010/09/20:iso-8859-6:7:iso_8859-6:7:
+@:LDP man-pages:3.50:2008/10/30:iso-8859-7:7:iso_8859-7:7:
+@:LDP man-pages:3.50:2010/09/20:iso-8859-8:7:iso_8859-8:7:
+@:LDP man-pages:3.50:2002/09/24:iso-8859-9:7:iso_8859-9:7:
+☆:LDP man-pages:3.41=>3.50:2012/08/14:iso_8859-1:7:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:iso_8859-10:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:iso_8859-11:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:iso_8859-13:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:iso_8859-14:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:1999/05/31:iso_8859-15:7:2002/09/28::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
+☆:LDP man-pages:3.41=>3.50:2012/08/05:iso_8859-16:7:2003/09/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/08/05:iso_8859-2:7:2002/09/28::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:iso_8859-3:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2009/01/24:iso_8859-4:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:iso_8859-5:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:iso_8859-6:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/10/30:iso_8859-7:7:2002/09/28::hanataka@abyss.rim.or.jp:HANATAKA Shinya:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:iso_8859-8:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2002/09/24:iso_8859-9:7:2003/01/20::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/08/14:iso_8859_1:7:iso_8859-1:7:
+@:LDP man-pages:3.50:2010/09/20:iso_8859_10:7:iso_8859-10:7:
+@:LDP man-pages:3.50:2010/09/20:iso_8859_11:7:iso_8859-11:7:
+@:LDP man-pages:3.50:2010/09/20:iso_8859_13:7:iso_8859-13:7:
+@:LDP man-pages:3.50:2010/09/20:iso_8859_14:7:iso_8859-14:7:
+@:LDP man-pages:3.50:1999/05/31:iso_8859_15:7:iso_8859-15:7:
+@:LDP man-pages:3.50:2012/08/05:iso_8859_16:7:iso_8859-16:7:
+@:LDP man-pages:3.50:2012/08/05:iso_8859_2:7:iso_8859-2:7:
+@:LDP man-pages:3.50:2010/09/20:iso_8859_3:7:iso_8859-3:7:
+@:LDP man-pages:3.50:2009/01/24:iso_8859_4:7:iso_8859-4:7:
+@:LDP man-pages:3.50:2010/09/20:iso_8859_5:7:iso_8859-5:7:
+@:LDP man-pages:3.50:2010/09/20:iso_8859_6:7:iso_8859-6:7:
+@:LDP man-pages:3.50:2008/10/30:iso_8859_7:7:iso_8859-7:7:
+@:LDP man-pages:3.50:2010/09/20:iso_8859_8:7:iso_8859-8:7:
+@:LDP man-pages:3.50:2002/09/24:iso_8859_9:7:iso_8859-9:7:
+☆:LDP man-pages:3.41=>3.50:2012/08/05:koi8-r:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/20:koi8-u:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/08/14:latin1:7:iso_8859-1:7:
+@:LDP man-pages:3.50:2012/08/05:latin10:7:iso_8859-16:7:
+@:LDP man-pages:3.50:2012/08/05:latin2:7:iso_8859-2:7:
+@:LDP man-pages:3.50:2010/09/20:latin3:7:iso_8859-3:7:
+@:LDP man-pages:3.50:2009/01/24:latin4:7:iso_8859-4:7:
+@:LDP man-pages:3.50:2002/09/24:latin5:7:iso_8859-9:7:
+@:LDP man-pages:3.50:2010/09/20:latin6:7:iso_8859-10:7:
+@:LDP man-pages:3.50:2010/09/20:latin7:7:iso_8859-13:7:
+@:LDP man-pages:3.50:2010/09/20:latin8:7:iso_8859-14:7:
+@:LDP man-pages:3.50:1999/05/31:latin9:7:iso_8859-15:7:
+☆:LDP man-pages:3.41=>3.50:2012/08/05:libc:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/12/05:locale:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2004/09/15:mailaddr:7:2005/03/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/08/05:man:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/02/24:man-pages:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/08/11:math_error:7:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:0000/00/00:mdoc:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:0000/00/00:mdoc.samples:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2009/09/27:mq_overview:7:2009/03/09::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/04/26:netdevice:7:2012/05/08::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/03/15:netlink:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+×:LDP man-pages:3.50:2012/08/05:numa:7:::::
+☆:LDP man-pages:3.41=>3.50:2011/09/09:operator:7:2004/11/16::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2012/05/10:packet:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2009/12/05:path_resolution:7:2007/06/13::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2005/12/08:pipe:7:2005/12/27::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2007/12/21:posixoptions:7:2005/01/14::ysato444@yahoo.co.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2010/11/14:pthreads:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2005/10/10:pty:7:2005/10/14::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/10:raw:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2009/01/12:regex:7:1998/07/08::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+×:LDP man-pages:3.50:2012/07/07:rtld-audit:7:::::
+☆:LDP man-pages:3.41=>3.50:2013/03/05:rtnetlink:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/13:sem_overview:7:2009/03/09::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2010/09/10:shm_overview:7:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+×:LDP man-pages:3.50:2011/09/09:sigevent:7:::::
+☆:LDP man-pages:3.41=>3.50:2012/05/01:signal:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/03/15:socket:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+×:LDP man-pages:3.50:2007/12/20:spufs:7:::::
+☆:LDP man-pages:3.41=>3.50:2012/08/05:standards:7:2006/08/15::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2000/11/16:suffixes:7:2001/04/24::ysato@h4.dion.ne.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2013/02/12:svipc:7:2006/07/16::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+×:LDP man-pages:3.50:2008/06/18:symlink:7:::::
+☆:LDP man-pages:3.41=>3.50:2012/04/23:tcp:7:2012/05/05::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2013/02/12:termio:7:2007/05/04::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/10/28:time:7:2008/08/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2010/09/20:tis-620:7:iso_8859-11:7:
+☆:LDP man-pages:3.41=>3.50:2010/06/13:udp:7:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2008/12/03:udplite:7:2008/10/12::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/08/05:unicode:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/08/05:units:7:2002/01/14::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+☆:LDP man-pages:3.41=>3.50:2012/05/10:unix:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/08/05:uri:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/08/05:url:7:uri:7:
+@:LDP man-pages:3.50:2012/08/05:urn:7:uri:7:
+☆:LDP man-pages:3.41=>3.50:2012/04/30:utf-8:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2012/04/30:utf8:7:utf-8:7:
+☆:LDP man-pages:3.41=>3.50:2012/08/05:x25:7:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2007/10/23:intro:8:2008/02/10::amotoki@dd.iij4u.or.jp:Akihiro MOTOKI:
+@:LDP man-pages:3.50:2013/02/10:ld-linux:8:ld.so:8:
+@:LDP man-pages:3.50:2013/02/10:ld-linux.so:8:ld.so:8:
+☆:LDP man-pages:3.41=>3.50:2013/02/10:ld.so:8:2012/04/30::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/10:ldconfig:8:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+☆:LDP man-pages:3.41=>3.50:2012/05/10:nscd:8:2012/05/31::amotoki@gmail.com:Akihiro MOTOKI:
+×:LDP man-pages:3.50:2013/02/10:sln:8:::::
+☆:LDP man-pages:3.41=>3.50:1998/11/01:sync:8:2000/06/13::sato@complex.eng.hokudai.ac.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2007/05/18:tzselect:8:2002/01/14::ysato@h4.dion.ne.jp:Yuichi SATO:
+☆:LDP man-pages:3.41=>3.50:2013/02/12:zdump:8:1999/09/14::nakano@apm.seikei.ac.jp:NAKANO Takeo:
+☆:LDP man-pages:3.41=>3.50:2010/02/25:zic:8:2001/04/04::sato@complex.eng.hokudai.ac.jp:Yuichi SATO: