Mechanically kill hard sentence breaks.

This commit is contained in:
ru 2004-07-02 23:52:20 +00:00
parent 47f5e31e2b
commit 01548ace15
217 changed files with 1440 additions and 758 deletions

View File

@ -196,7 +196,7 @@ mode bit is set.
This bit should be set when the packet aliasing host originates network
traffic as well as forwards it.
When the packet aliasing host is waiting for a connection from an unknown
host address or unknown port number (e.g. an FTP data connection), this
host address or unknown port number (e.g.\& an FTP data connection), this
mode bit specifies that a socket be allocated as a place holder to prevent
port conflicts.
Once a connection is established, usually within a minute or so, the socket
@ -237,7 +237,7 @@ possible to use a hole for another connection.
A hole is removed when the connection that uses it dies.
To cater to unexpected death of a program using
.Nm
(e.g. kill -9),
(e.g.\& kill -9),
changing the state of the flag will clear the entire firewall range
allocated for holes.
This will also happen on the initial call to
@ -560,7 +560,7 @@ For links created with
.Fn LibAliasRedirectAddr ,
the
.Fa port
argument is ignored and could have any value, e.g. htons(~0).
argument is ignored and could have any value, e.g.\& htons(~0).
.Pp
This function returns 0 on success, \-1 otherwise.
.Ed
@ -571,15 +571,15 @@ This function returns 0 on success, \-1 otherwise.
This function marks the specified static redirect rule entered by
.Fn LibAliasRedirectPort
as dynamic.
This can be used to e.g. dynamically redirect a single TCP connection,
This can be used to e.g.\& dynamically redirect a single TCP connection,
after which the rule is removed.
Only fully specified links can be made dynamic.
(See the
.Sx STATIC AND DYNAMIC LINKS
and
.Sx PARTIALLY SPECIFIED ALIASING LINKS
sections below for a definition of static vs. dynamic,
and partially vs. fully specified links.)
sections below for a definition of static vs.\& dynamic,
and partially vs.\& fully specified links.)
.Pp
This function returns 0 on success, \-1 otherwise.
.Ed
@ -878,7 +878,7 @@ and
.Fa maxpacketsize
is provided for error checking purposes.
This function can be used if an already-aliased packet needs to have its
original IP header restored for further processing (eg. logging).
original IP header restored for further processing (e.g.\& logging).
.Ed
.Sh BUGS
PPTP aliasing does not work when more than one internal client

View File

@ -299,7 +299,8 @@ recognized.
.Xr strtofflags 3 ,
which stops parsing at the first unrecognized name.)
.Ss ACL Handling
XXX This needs serious help. XXX
XXX This needs serious help.
XXX
.Pp
An
.Dq Access Control List

View File

@ -269,7 +269,8 @@ and
objects can be found in the overview manual page for
.Xr libarchive 3 .
.Sh EXAMPLE
The following illustrates basic usage of the library. In this example,
The following illustrates basic usage of the library.
In this example,
the callback functions are simply wrappers around the standard
.Xr open 2 ,
.Xr read 2 ,

View File

@ -225,7 +225,8 @@ overview.
Compression support is built-in to libarchive, which uses zlib and bzlib
to handle gzip and bzip2 compression, respectively.
.Sh EXAMPLE
The following sketch illustrates basic usage of the library. In this example,
The following sketch illustrates basic usage of the library.
In this example,
the callback functions are simply wrappers around the standard
.Xr open 2 ,
.Xr write 2 ,

View File

@ -101,7 +101,7 @@ should point to an address which is
.Fa len
bytes long,
in binary form
(i.e. not an Bluetooth BD_ADDR in human readable
(i.e., not an Bluetooth BD_ADDR in human readable
.Tn ASCII
form).
The

View File

@ -135,15 +135,18 @@
The
.Nm snmp_netgraph
module implements a number of tables and scalars that enable remote access to
the netgraph subsystem. It also exports a number of global variables and
the netgraph subsystem.
It also exports a number of global variables and
functions, that allow other modules to easily use the netgraph system.
.Pp
If upon start up of the module the variable
.Va begemotNgControlNodeName
is not empty the module opens a netgraph socket and names that socket node.
If the variable is empty, the socket is created, as soon as the variable is
written with a non-empty name. The socket can be closed by writing an empty
string to the variable. The socket itself and its name are available in
written with a non-empty name.
The socket can be closed by writing an empty
string to the variable.
The socket itself and its name are available in
.Va snmp_node
and
.Va snmp_nodename .
@ -169,7 +172,8 @@ is the node specific command cookie,
.It Fa opcode
is the node specific code for the operation to performa,
.It Fa arg
is a pointer to the message itself. This message must start with a
is a pointer to the message itself.
This message must start with a
.Vt struct ng_mesg .
.It Fa arglen
is the overall length of the message (header plus arguments).
@ -178,8 +182,10 @@ The functions return the message id that can be used to match incoming responses
or -1 if an error occurs.
.Pp
Another class of functions is used to send a control message and to wait for
a matching response. Note, that this operation blocks the daemon, so use it
only if you are sure that the response will happen. There is a maximum timeout
a matching response.
Note, that this operation blocks the daemon, so use it
only if you are sure that the response will happen.
There is a maximum timeout
that is configurable in the MIB variable
.Va begemotNgTimeout .
Other messages arriving while the functions are waiting for the response are
@ -201,9 +207,11 @@ and waits for a matching response.
.Pp
All three functions take the same arguments as the
.Fn ng_output*
functions. The functions return the reponse message in a buffer allocated by
functions.
The functions return the reponse message in a buffer allocated by
.Xr malloc 3
or NULL in case of an error. The maximum size of the response buffer can be
or NULL in case of an error.
The maximum size of the response buffer can be
configured in the variable
.Va begemotNgResBufSiz .
.Pp
@ -212,16 +220,19 @@ A data message can be send with the function
This function takes the name of the
.Va snmp_node Ns 's
hook through which to send the data, a pointer to the message buffer and
the size of the message. It returns -1 if an error happens.
the size of the message.
It returns -1 if an error happens.
.Ss ASYNCHRONOUS CONTROL AND DATA MESSAGES
A module can register functions to asynchronuosly receive control and data
message.
.Pp
The function
.Fn ng_register_cookie
registers a control message receive function. If a control message is
registers a control message receive function.
If a control message is
received, that is not consumed by the dialog functions, the list of registerred
control message receive functions is scanned. If the cookie in the received
control message receive functions is scanned.
If the cookie in the received
message is the same as the
.Fa cookie
argument to the
@ -238,7 +249,8 @@ is called with a pointer to the received message, the hook on which the
message was received (or NULL if it was received not on a hook), the id
of the sender's node and the
.Fa uarg
argument of the registration call. The handler function should not modify
argument of the registration call.
The handler function should not modify
the contents of the message, because more than one function may be registered
to the same cookie and node id.
.Pp
@ -253,12 +265,14 @@ A module can call
.Fn ng_register_hook
to register a callback for data messages on one of the
.Va snmp_node Ns 's
hooks. If a data message is received on that hook, the callback function
hooks.
If a data message is received on that hook, the callback function
.Fa func
is called with the hook name, a pointer to the data message, the size of
the message and the argument
.Fa uarg
to the registration function. The message should be treated as read-only.
to the registration function.
The message should be treated as read-only.
A data message registration can be undone by calling
.Fn ng_unregister_hook
with the return value of the registration call.
@ -291,7 +305,8 @@ and writes it to the buffer pointed to by
.Fa name .
This buffer should be at least
.Li NG_NODESIZ
bytes long. The function returns the node id or 0 if the
bytes long.
The function returns the node id or 0 if the
node is not found
.Pp
The function
@ -302,7 +317,8 @@ and writes it to the buffer pointed to by
.Fa type .
This buffer should be at least
.Li NG_TYPESIZ
bytes long. The function returns the node id or 0 if the
bytes long.
The function returns the node id or 0 if the
node is not found.
.Pp
The function
@ -315,8 +331,10 @@ to the buffer pointed to by
.Fa peer_hook .
The buffer should be at least
.Li NG_HOOKSIZ
bytes long. The function returns 0 if the node and the hook is found, -1
otherwise. The function skips intermediate tee nodes (see
bytes long.
The function returns 0 if the node and the hook is found, -1
otherwise.
The function skips intermediate tee nodes (see
.Xr ng_tee 4 ).
.Pp
The function
@ -348,7 +366,8 @@ of node
.Fa id .
If
.Fa name
is not NULL the new node is named with this name. The function returns
is not NULL the new node is named with this name.
The function returns
The node id of the new node or 0 if an error happens.
.Pp
The functions

View File

@ -53,8 +53,10 @@ The
function
establishes a 32-bit identifier for the
current processor that is intended to be unique among all
UNIX systems in existence. This is normally a DARPA Internet
address for the local machine. This call is allowed only to the
UNIX systems in existence.
This is normally a DARPA Internet
address for the local machine.
This call is allowed only to the
super-user and is normally performed at boot time.
.Pp
The

View File

@ -60,7 +60,8 @@ This interface is made obsolete by
The system defines a set of signals that may be delivered to a process.
Signal delivery resembles the occurrence of a hardware interrupt:
the signal is blocked from further occurrence, the current process
context is saved, and a new one is built. A process may specify a
context is saved, and a new one is built.
A process may specify a
.Em handler
to which a signal is delivered, or specify that a signal is to be
.Em blocked
@ -69,7 +70,8 @@ or
A process may also specify that a default action is to be taken
by the system when a signal occurs.
Normally, signal handlers execute on the current stack
of the process. This may be changed, on a per-handler basis,
of the process.
This may be changed, on a per-handler basis,
so that signals are taken on a special
.Em "signal stack" .
.Pp
@ -82,8 +84,10 @@ but other signals may yet occur.
A global
.Em "signal mask"
defines the set of signals currently blocked from delivery
to a process. The signal mask for a process is initialized
from that of its parent (normally 0). It
to a process.
The signal mask for a process is initialized
from that of its parent (normally 0).
It
may be changed with a
.Xr sigblock 2
or
@ -92,12 +96,15 @@ call, or when a signal is delivered to the process.
.Pp
When a signal
condition arises for a process, the signal is added to a set of
signals pending for the process. If the signal is not currently
signals pending for the process.
If the signal is not currently
.Em blocked
by the process then it is delivered to the process. When a signal
by the process then it is delivered to the process.
When a signal
is delivered, the current state of the process is saved,
a new signal mask is calculated (as described below),
and the signal handler is invoked. The call to the handler
and the signal handler is invoked.
The call to the handler
is arranged so that if the signal handling routine returns
normally the process will resume execution in the context
from before the signal's delivery.
@ -119,7 +126,8 @@ in the signal mask associated with the handler to be invoked.
The
.Fn sigvec
function
assigns a handler for a specific signal. If
assigns a handler for a specific signal.
If
.Fa vec
is non-zero, it
specifies a handler routine and mask

View File

@ -87,7 +87,7 @@ The flag value is specified by
any of the following values:
.Bl -tag -width indent
.It Dv R_DUP
Permit duplicate keys in the tree, i.e. permit insertion if the key to be
Permit duplicate keys in the tree, i.e., permit insertion if the key to be
inserted already exists in the tree.
The default behavior, as described in
.Xr dbopen 3 ,
@ -145,7 +145,7 @@ Not currently implemented.
.It Va minkeypage
The minimum number of keys which will be stored on any single page.
This value is used to determine which keys will be stored on overflow
pages, i.e. if a key or data item is longer than the pagesize divided
pages, i.e., if a key or data item is longer than the pagesize divided
by the minkeypage value, it will be stored on overflow pages instead
of in the page itself.
If

View File

@ -335,7 +335,7 @@ or
.Va sync
routines.
Modifications to the database during a sequential scan will be reflected
in the scan, i.e. records inserted behind the cursor will not be returned
in the scan, i.e., records inserted behind the cursor will not be returned
while records inserted in front of the cursor will be returned.
.Pp
The

View File

@ -190,7 +190,7 @@ field of the key should be the size of that type.
Because there can be no meta-data associated with the underlying
.Nm
access method files, any changes made to the default values
(e.g. fixed record length or byte separator value) must be explicitly
(e.g.\& fixed record length or byte separator value) must be explicitly
specified each time the file is opened.
.Pp
In the interface specified by

View File

@ -100,4 +100,4 @@ function first appeared in
and
.Fx 4.2 .
.Sh AUTHORS
Todd C. Miller <Todd.Miller@courtesan.com>
.An "Todd C. Miller" Aq Todd.Miller@courtesan.com

View File

@ -78,7 +78,8 @@ with it
and
returns a pointer to be used to identify the
.Em directory stream
in subsequent operations. The pointer
in subsequent operations.
The pointer
.Dv NULL
is returned if
.Fa filename
@ -89,7 +90,8 @@ enough memory to hold the whole thing.
The
.Fn readdir
function
returns a pointer to the next directory entry. It returns
returns a pointer to the next directory entry.
It returns
.Dv NULL
upon reaching the end of the directory or detecting an invalid
.Fn seekdir
@ -102,7 +104,8 @@ provides the same functionality as
.Fn readdir ,
but the caller must provide a directory
.Fa entry
buffer to store the results in. If the read succeeds,
buffer to store the results in.
If the read succeeds,
.Fa result
is pointed at the
.Fa entry ;
@ -126,7 +129,8 @@ are good only for the lifetime of the
.Dv DIR
pointer,
.Fa dirp ,
from which they are derived. If the directory is closed and then
from which they are derived.
If the directory is closed and then
reopened, prior values returned by
.Fn telldir
will no longer be valid.

View File

@ -107,4 +107,4 @@ function first appeared in
and
.Fx 4.2 .
.Sh AUTHORS
Todd C. Miller <Todd.Miller@courtesan.com>
.An "Todd C. Miller" Aq Todd.Miller@courtesan.com

View File

@ -93,7 +93,8 @@ The
function first appeared in the Solaris operating system.
.Sh BUGS
This implementation is bug-compatible with the Solaris
implementation. In particular, the following bugs are present:
implementation.
In particular, the following bugs are present:
.Bl -bullet
.It
If
@ -101,12 +102,15 @@ If
lies in the main executable rather than in a shared library, the
pathname returned in
.Va dli_fname
may not be correct. The pathname is taken directly from
may not be correct.
The pathname is taken directly from
.Va argv[0]
of the calling process. When executing a program specified by its
of the calling process.
When executing a program specified by its
full pathname, most shells set
.Va argv[0]
to the pathname. But this is not required of shells or guaranteed
to the pathname.
But this is not required of shells or guaranteed
by the operating system.
.It
If
@ -115,10 +119,12 @@ is of the form
.Va &func ,
where
.Va func
is a global function, its value may be an unpleasant surprise. In
is a global function, its value may be an unpleasant surprise.
In
dynamically linked programs, the address of a global function is
considered to point to its program linkage table entry, rather than to
the entry point of the function itself. This causes most global
the entry point of the function itself.
This causes most global
functions to appear to be defined within the main executable, rather
than in the shared libraries where the actual code resides.
.It

View File

@ -40,22 +40,26 @@
.Sh DESCRIPTION
.Bf Sy
Due to enhancements in the dynamic linker, this interface is no longer
needed. It is deprecated and will be removed from future releases.
needed.
It is deprecated and will be removed from future releases.
In current releases it still exists, but only as a stub which does nothing.
.Ef
.Pp
Threads packages can call
.Fn dllockinit
at initialization time to register locking functions for the dynamic
linker to use. This enables the dynamic linker to prevent multiple
linker to use.
This enables the dynamic linker to prevent multiple
threads from entering its critical sections simultaneously.
.Pp
The
.Fa context
argument specifies an opaque context for creating locks. The
argument specifies an opaque context for creating locks.
The
dynamic linker will pass it to the
.Fa lock_create
function when creating the locks it needs. When the dynamic linker
function when creating the locks it needs.
When the dynamic linker
is permanently finished using the locking functions (e.g., if the
program makes a subsequent call to
.Fn dllockinit
@ -65,7 +69,8 @@ to destroy the context.
.Pp
The
.Fa lock_create
argument specifies a function for creating a read/write lock. It
argument specifies a function for creating a read/write lock.
It
must return a pointer to the new lock.
.Pp
The
@ -73,18 +78,23 @@ The
and
.Fa wlock_acquire
arguments specify functions which lock a lock for reading or
writing, respectively. The
writing, respectively.
The
.Fa lock_release
argument specifies a function which unlocks a lock. Each of these
argument specifies a function which unlocks a lock.
Each of these
functions is passed a pointer to the lock.
.Pp
The
.Fa lock_destroy
argument specifies a function to destroy a lock. It may be
argument specifies a function to destroy a lock.
It may be
.Dv NULL
if locks do not need to be destroyed. The
if locks do not need to be destroyed.
The
.Fa context_destroy
argument specifies a function to destroy the context. It may be
argument specifies a function to destroy the context.
It may be
.Dv NULL
if the context does not need to be destroyed.
.Pp
@ -96,9 +106,11 @@ a default locking mechanism which works by blocking the
.Dv SIGPROF ,
and
.Dv SIGALRM
signals. This is sufficient for many application level threads
signals.
This is sufficient for many application level threads
packages, which typically use one of these signals to implement
preemption. An application which has registered its own locking
preemption.
An application which has registered its own locking
methods with
.Fn dllockinit
can restore the default locking by calling

View File

@ -64,7 +64,8 @@ is a valid format string.
The
.Xr printf 3
family of functions cannot verify the types of arguments that they are
passed at run-time. In some cases, like
passed at run-time.
In some cases, like
.Xr catgets 3 ,
it is useful or necessary to use a user-supplied format string with no
guarantee that the format string matches the specified arguments.
@ -76,10 +77,11 @@ was designed to be used in these cases, as in:
printf(fmtcheck(user_format, standard_format), arg1, arg2);
.Ed
.Pp
In the check, field widths, fillers, precisions, etc. are ignored (unless
In the check, field widths, fillers, precisions, etc.\& are ignored (unless
the field width or precision is an asterisk
.Ql *
instead of a digit string). Also, any text other than the format specifiers
instead of a digit string).
Also, any text other than the format specifiers
is completely ignored.
.Sh RETURN VALUES
If
@ -94,7 +96,8 @@ Otherwise, it will return
.Fa fmt_default .
.Sh SECURITY CONSIDERATIONS
Note that the formats may be quite different as long as they accept the
same arguments. For example,
same arguments.
For example,
.Qq Li "%p %o %30s %#llx %-10.*e %n"
is compatible with
.Qq Li "This number %lu %d%% and string %s has %qd numbers and %.*g floats (%n)" .

View File

@ -53,7 +53,8 @@ of an existing file and a user-selectable
The specified
.Fa path
must specify an existing file that is accessible to the calling process
or the call will fail. Also, note that links to files will return the
or the call will fail.
Also, note that links to files will return the
same key, given the same
.Fa id .
.Sh RETURN VALUES

View File

@ -202,7 +202,7 @@ A directory being visited in post-order.
The contents of the
.Vt FTSENT
structure will be unchanged from when
it was returned in pre-order, i.e. with the
it was returned in pre-order, i.e., with the
.Fa fts_info
field set to
.Dv FTS_D .
@ -306,7 +306,7 @@ It is initialized to
A pointer to the
.Vt FTSENT
structure referencing the file in the hierarchy
immediately above the current file, i.e. the directory of which this
immediately above the current file, i.e., the directory of which this
file is a member.
A parent structure for the initial entry point is provided as well,
however, only the
@ -601,7 +601,7 @@ has not yet been called for a hierarchy,
.Fn fts_children
will return a pointer to the files in the logical directory specified to
.Fn fts_open ,
i.e. the arguments specified to
i.e., the arguments specified to
.Fn fts_open .
Otherwise, if the
.Vt FTSENT

View File

@ -54,7 +54,8 @@ A read/write interface to this information is available via the
MIB variable
.Dq Li kern.bootfile .
.Sh RETURN VALUES
If the call succeeds a string giving the pathname is returned. If it
If the call succeeds a string giving the pathname is returned.
If it
fails, a null pointer is returned and an error code is
placed in the global location
.Va errno .

View File

@ -135,9 +135,11 @@ is
the current entry is removed from the database.
A call to
.Fn cgetset
must precede the database traversal. It must be called before the
must precede the database traversal.
It must be called before the
.Fn cgetent
call. If a sequential access is being performed (see below), it must be called
call.
If a sequential access is being performed (see below), it must be called
before the first sequential access call
.Fn ( cgetfirst
or
@ -166,16 +168,19 @@ with type
.Fa type .
A
.Fa type
is specified using any single character. If a colon (`:') is used, an
is specified using any single character.
If a colon (`:') is used, an
untyped capability will be searched for (see below for explanation of
types). A pointer to the value of
types).
A pointer to the value of
.Fa cap
in
.Fa buf
is returned on success,
.Dv NULL
if the requested capability couldn't be
found. The end of the capability value is signaled by a `:' or
found.
The end of the capability value is signaled by a `:' or
.Tn ASCII
.Dv NUL
(see below for capability database syntax).
@ -240,7 +245,8 @@ record returned by the previous
.Fn cgetfirst
or
.Fn cgetnext
call. If there is no such previous call, the first record in the database is
call.
If there is no such previous call, the first record in the database is
returned.
Each record is returned in a
.Xr malloc 3 Ns \&'d
@ -263,27 +269,35 @@ Upon completion of database (0 return) the database is closed.
The
.Fn cgetclose
function closes the sequential access and frees any memory and file descriptors
being used. Note that it does not erase the buffer pushed by a call to
being used.
Note that it does not erase the buffer pushed by a call to
.Fn cgetset .
.Sh CAPABILITY DATABASE SYNTAX
Capability databases are normally
.Tn ASCII
and may be edited with standard
text editors. Blank lines and lines beginning with a `#' are comments
and are ignored. Lines ending with a `\|\e' indicate that the next line
text editors.
Blank lines and lines beginning with a `#' are comments
and are ignored.
Lines ending with a `\|\e' indicate that the next line
is a continuation of the current line; the `\|\e' and following newline
are ignored. Long lines are usually continued onto several physical
are ignored.
Long lines are usually continued onto several physical
lines by ending each line except the last with a `\|\e'.
.Pp
Capability databases consist of a series of records, one per logical
line. Each record contains a variable number of `:'-separated fields
(capabilities). Empty fields consisting entirely of white space
line.
Each record contains a variable number of `:'-separated fields
(capabilities).
Empty fields consisting entirely of white space
characters (spaces and tabs) are ignored.
.Pp
The first capability of each record specifies its names, separated by `|'
characters. These names are used to reference records in the database.
characters.
These names are used to reference records in the database.
By convention, the last name is usually a comment and is not intended as
a lookup tag. For example, the
a lookup tag.
For example, the
.Em vt100
record from the
.Xr termcap 5
@ -308,16 +322,21 @@ has value
does not exist
.El
.Pp
Names consist of one or more characters. Names may contain any character
Names consist of one or more characters.
Names may contain any character
except `:', but it's usually best to restrict them to the printable
characters and avoid use of graphics like `#', `=', `%', `@', etc. Types
characters and avoid use of graphics like `#', `=', `%', `@', etc.\& Types
are single characters used to separate capability names from their
associated typed values. Types may be any character except a `:'.
Typically, graphics like `#', `=', `%', etc. are used. Values may be any
associated typed values.
Types may be any character except a `:'.
Typically, graphics like `#', `=', `%', etc.\& are used.
Values may be any
number of characters and may contain any character except `:'.
.Sh CAPABILITY DATABASE SEMANTICS
Capability records describe a set of (name, value) bindings. Names may
have multiple values bound to them. Different values for a name are
Capability records describe a set of (name, value) bindings.
Names may
have multiple values bound to them.
Different values for a name are
distinguished by their
.Fa types .
The
@ -326,7 +345,8 @@ function will return a pointer to a value of a name given the capability
name and the type of the value.
.Pp
The types `#' and `=' are conventionally used to denote numeric and
string typed values, but no restriction on those types is enforced. The
string typed values, but no restriction on those types is enforced.
The
functions
.Fn cgetnum
and
@ -351,7 +371,8 @@ capabilities may interpolate records which also contain
.Ic tc
capabilities and more than one
.Ic tc
capability may be used in a record. A
capability may be used in a record.
A
.Ic tc
expansion scope (i.e., where the argument is searched for) contains the
file in which the
@ -359,7 +380,8 @@ file in which the
is declared and all subsequent files in the file array.
.Pp
When a database is searched for a capability record, the first matching
record in the search is returned. When a record is scanned for a
record in the search is returned.
When a record is scanned for a
capability, the first matching capability is returned; the capability
.Ic :nameT@:
will hide any following definition of a value of type
@ -386,7 +408,8 @@ example\||\|an example of binding multiple values to names:\e
.Ed
.Pp
The capability foo has two values bound to it (bar of type `%' and blah of
type `^') and any other value bindings are hidden. The capability abc
type `^') and any other value bindings are hidden.
The capability abc
also has two values bound but only a value of type `$' is prevented from
being defined in the capability record more.
.Pp
@ -408,7 +431,8 @@ who-cares@ prevents the definition of any who-cares definitions in old
from being seen, glork#200 is inherited from old, and blah and anything
defined by the record extensions is added to those definitions in old.
Note that the position of the fript=bar and who-cares@ definitions before
tc=old is important here. If they were after, the definitions in old
tc=old is important here.
If they were after, the definitions in old
would take precedence.
.Sh CGETNUM AND CGETSTR SYNTAX AND SEMANTICS
Two types are predefined by
@ -453,7 +477,8 @@ Otherwise, if the number starts with a
it is interpreted as an octal number.
Otherwise the number is interpreted as a decimal number.
.Pp
String capability values may contain any character. Non-printable
String capability values may contain any character.
Non-printable
.Dv ASCII
codes, new lines, and colons may be conveniently represented by the use
of escape sequences:
@ -472,7 +497,8 @@ of escape sequences:
.El
.Pp
A `\|\e' may be followed by up to three octal digits directly specifies
the numeric code for a character. The use of
the numeric code for a character.
The use of
.Tn ASCII
.Dv NUL Ns s ,
while easily

View File

@ -52,7 +52,8 @@ takes a disk name (e.g.\&
.Ql rm03 )
and returns a prototype disk label
describing its geometry information and the standard
disk partition tables. All information is obtained from
disk partition tables.
All information is obtained from
the
.Xr disktab 5
file.

View File

@ -59,7 +59,8 @@ The
argument
specifies the size of the
.Fa name
array. The returned name is null-terminated unless insufficient
array.
The returned name is null-terminated unless insufficient
space is provided.
.Pp
The

View File

@ -96,7 +96,8 @@ search the group database for the given group name pointed to by
.Fa name
or the group id pointed to by
.Fa gid ,
respectively, returning the first one encountered. Identical group
respectively, returning the first one encountered.
Identical group
names or group gids may result in undefined behavior.
.Pp
The
@ -139,12 +140,15 @@ These functions will open the group file for reading, if necessary.
The
.Fn setgroupent
function
opens the file, or rewinds it if it is already open. If
opens the file, or rewinds it if it is already open.
If
.Fa stayopen
is non-zero, file descriptors are left open, significantly speeding
functions subsequent calls. This functionality is unnecessary for
functions subsequent calls.
This functionality is unnecessary for
.Fn getgrent
as it doesn't close its file descriptors by default. It should also
as it doesn't close its file descriptors by default.
It should also
be noted that it is dangerous for long-running programs to use this
functionality as the group file may be updated.
.Pp

View File

@ -43,7 +43,8 @@ function
queries several sources to determine the preferred object file
format, and copies its name into a buffer provided by the caller.
.Pp
The object file format is determined as follows. If
The object file format is determined as follows.
If
.Va argv
is
.No non- Ns Ev NULL
@ -70,9 +71,11 @@ Otherwise, a built-in system default object file format is returned.
points to a user-supplied buffer into which the name of the object
file format is copied.
.Va bufsize
gives the size of the buffer in bytes. The string placed in
gives the size of the buffer in bytes.
The string placed in
.Va buf
is always null-terminated. It is an error if the buffer is too
is always null-terminated.
It is an error if the buffer is too
small to hold the null-terminated name.
.Pp
.Va argv
@ -104,7 +107,8 @@ null terminator.
If the supplied buffer is too small to hold the object file format
and its null terminator,
.Fn getobjformat
returns -1. In that case, the contents of the buffer and argument
returns -1.
In that case, the contents of the buffer and argument
vector supplied by the caller are indeterminate.
.Sh ENVIRONMENT
.Bl -tag -width OBJFORMAT
@ -118,7 +122,8 @@ is set, it overrides the default object file format.
.Sh FILES
.Bl -tag -width /etc/objformat -compact
.It Pa /etc/objformat
If present, specifies the object file format to use. Syntax is
If present, specifies the object file format to use.
Syntax is
.Ql OBJFORMAT=xxx .
.El
.Sh SEE ALSO

View File

@ -102,7 +102,8 @@ unlocked.
The section to be locked or unlocked starts at the current
offset in the file and extends forward for a positive size or backward
for a negative size (the preceding bytes up to but not including the
current offset). However, it is not permitted to lock a section that
current offset).
However, it is not permitted to lock a section that
starts or extends before the beginning of the file.
If
.Fa size
@ -142,7 +143,8 @@ controlled by the process.
Locked sections will be unlocked starting
at the current file offset through
.Fa size
bytes or to the end of file if size is 0. When all of a locked section
bytes or to the end of file if size is 0.
When all of a locked section
is not released (that is, when the beginning or end of the area to be
unlocked falls within a locked section), the remaining portions of
that section are still locked by the process.
@ -160,13 +162,15 @@ the requested section is the maximum value for an object of type
off_t, when the process has an existing lock in which size is 0 and
which includes the last byte of the requested section, will be treated
as a request to unlock from the start of the requested section with a
size equal to 0. Otherwise an
size equal to 0.
Otherwise an
.Dv F_ULOCK
request will attempt to unlock only the requested section.
.Pp
A potential for deadlock occurs if a process controlling a locked
region is put to sleep by attempting to lock the locked region of
another process. This implementation detects that sleeping until a
another process.
This implementation detects that sleeping until a
locked region is unlocked would cause a deadlock and fails with an
.Er EDEADLK
error.

View File

@ -72,19 +72,22 @@ has one of the following meanings:
The
.Fa msgtyp
argument
is greater than 0. The first message of type
is greater than 0.
The first message of type
.Fa msgtyp
will be received.
.It
The
.Fa msgtyp
argument
is equal to 0. The first message on the queue will be received.
is equal to 0.
The first message on the queue will be received.
.It
The
.Fa msgtyp
argument
is less than 0. The first message of the lowest message type that is
is less than 0.
The first message of the lowest message type that is
less than or equal to the absolute value of
.Fa msgtyp
will be received.
@ -133,7 +136,8 @@ The message queue is removed, in which case -1 will be returned, and
set to
.Er EINVAL .
.It
A signal is received and caught. -1 is returned, and
A signal is received and caught.
-1 is returned, and
.Va errno
set to
.Er EINTR .

View File

@ -81,7 +81,8 @@ and
.Fn nrand48
functions
return values of type long in the range
[0, 2**31-1]. The high-order (31) bits of
[0, 2**31-1].
The high-order (31) bits of
r(n+1) are loaded into the lower bits of the returned value, with
the topmost (sign) bit set to zero.
.Pp
@ -91,7 +92,8 @@ and
.Fn jrand48
functions
return values of type long in the range
[-2**31, 2**31-1]. The high-order (32) bits of
[-2**31, 2**31-1].
The high-order (32) bits of
r(n+1) are loaded into the returned value.
.Pp
The
@ -100,7 +102,8 @@ The
and
.Fn mrand48
functions
use an internal buffer to store r(n). For these functions
use an internal buffer to store r(n).
For these functions
the initial value of r(0) = 0x1234abcd330e = 20017429951246.
.Pp
On the other hand,

View File

@ -90,7 +90,7 @@ call had just returned the value specified by
.Fa val ,
instead of 0.
.Pp
Pairs of calls may be intermixed, i.e. both
Pairs of calls may be intermixed, i.e., both
.Fn sigsetjmp
and
.Fn siglongjmp
@ -99,7 +99,7 @@ and
and
.Fn longjmp
combinations may be used in the same program, however, individual
calls may not, e.g. the
calls may not, e.g.\& the
.Fa env
argument to
.Fn setjmp

View File

@ -68,10 +68,12 @@ setproctitle("talking to %s", inet_ntoa(addr));
The
.Fn setproctitle
function
is implicitly non-standard. Other methods of causing the
is implicitly non-standard.
Other methods of causing the
.Xr ps 1
command line to change, including copying over the argv[0] string are
also implicitly non-portable. It is preferable to use an operating system
also implicitly non-portable.
It is preferable to use an operating system
supplied
.Fn setproctitle
if present.
@ -79,7 +81,8 @@ if present.
Unfortunately, it is possible that there are other calling conventions
to other versions of
.Fn setproctitle ,
although none have been found by the author as yet. This is believed to be
although none have been found by the author as yet.
This is believed to be
the predominant convention.
.Pp
It is thought that the implementation is compatible with other systems,

View File

@ -150,7 +150,8 @@ functions can fail with any error defined for
.Fn open
and
.Fn unlink ,
respectively. In addition, the following errors are defined for
respectively.
In addition, the following errors are defined for
.Fn shm_open :
.Bl -tag -width Er
.It Bq Er EINVAL

View File

@ -63,7 +63,8 @@ facility.
.Pp
Signals allow the manipulation of a process from outside its
domain as well as allowing the process to manipulate itself or
copies of itself (children). There are two general types of signals:
copies of itself (children).
There are two general types of signals:
those that cause termination of a process and those that do not.
Signals which cause termination of a program might result from
an irrecoverable error or might be the result of a user at a terminal

View File

@ -66,7 +66,8 @@ and there is no special handling for SIGALRM.
If the
.Fn sleep
function returns because the requested time has elapsed, the value
returned will be zero. If the
returned will be zero.
If the
.Fn sleep
function returns due to the delivery of a signal, the value returned
will be the unslept amount (the requested time minus the time actually

View File

@ -83,7 +83,8 @@ length array of integers.
The
.Fn sysctlbyname
function accepts an ASCII representation of the name and internally
looks up the integer name vector. Apart from that, it behaves the same
looks up the integer name vector.
Apart from that, it behaves the same
as the standard
.Fn sysctl
function.
@ -454,7 +455,7 @@ The third and fourth level names are as follows:
.El
.Pp
If the third level name is KERN_PROC_ARGS then the command line argument
array is returned in a flattened form, i.e. zero-terminated arguments
array is returned in a flattened form, i.e., zero-terminated arguments
follow each other.
The total size of array is returned.
It is also possible for a process to set its own process title this way.
@ -752,12 +753,14 @@ The returned data consists of a
0 if the statistics-based page management algorithm is in use
or 1 if the near-LRU algorithm is in use.
.It Li VM_SWAPPING_ENABLED
1 if process swapping is enabled or 0 if disabled. This variable is
1 if process swapping is enabled or 0 if disabled.
This variable is
permanently set to 0 if the kernel was built with swapping disabled.
.It Li VM_V_CACHE_MAX
Maximum desired size of the cache queue.
.It Li VM_V_CACHE_MIN
Minimum desired size of the cache queue. If the cache queue size
Minimum desired size of the cache queue.
If the cache queue size
falls very far below this value, the pageout daemon is awakened.
.It Li VM_V_FREE_MIN
Minimum amount of memory (cache memory plus free memory)
@ -771,7 +774,8 @@ The total amount of free memory (including cache memory) that the
pageout daemon tries to maintain.
.It Li VM_V_INACTIVE_TARGET
The desired number of inactive pages that the pageout daemon should
achieve when it runs. Inactive pages can be quickly inserted into
achieve when it runs.
Inactive pages can be quickly inserted into
process address space when needed.
.It Li VM_V_PAGEOUT_FREE_MIN
If the amount of free and cache memory falls below this value, the

View File

@ -131,12 +131,14 @@ Three or more bytes that are the designation for the standard
.Pq Em std
or summer
.Pq Em dst
time zone. Only
time zone.
Only
.Em std
is required; if
.Em dst
is missing, then summer time does not apply in this locale.
Upper and lowercase letters are explicitly allowed. Any characters
Upper and lowercase letters are explicitly allowed.
Any characters
except a leading colon
.Pq Ql \&: ,
digits, comma
@ -151,7 +153,8 @@ and
are allowed.
.It Em offset
Indicates the value one must add to the local time to arrive at
Coordinated Universal Time. The
Coordinated Universal Time.
The
.Em offset
has the form:
.Bd -ragged -offset indent
@ -167,26 +170,33 @@ The minutes
.Pq Em mm
and seconds
.Pq Em ss
are optional. The hour
are optional.
The hour
.Pq Em hh
is required and may be a single digit. The
is required and may be a single digit.
The
.Em offset
following
.Em std
is required. If no
is required.
If no
.Em offset
follows
.Em dst ,
summer time is assumed to be one hour ahead of standard time. One or
summer time is assumed to be one hour ahead of standard time.
One or
more digits may be used; the value is always interpreted as a decimal
number. The hour must be between zero and 24, and the minutes (and
seconds) \(em if present \(em between zero and 59. If preceded by a
number.
The hour must be between zero and 24, and the minutes (and
seconds) \(em if present \(em between zero and 59.
If preceded by a
.Pq Ql \-
the time zone shall be east of the Prime Meridian; otherwise it shall be
west (which may be indicated by an optional preceding
.Pq Ql + ) .
.It Em rule
Indicates when to change to and back from summer time. The
Indicates when to change to and back from summer time.
The
.Em rule
has the form:
.Bd -ragged -offset indent
@ -198,7 +208,8 @@ where the first
describes when the change from standard to summer time occurs and the
second
.Em date
describes when the change back happens. Each
describes when the change back happens.
Each
.Em time
field describes when, in current local time, the change to the other
time is made.
@ -214,7 +225,8 @@ The Julian day
.Em n
\*(Le 365).
Leap days are not counted; that is, in all years \(em including leap
years \(em February 28 is day 59 and March 1 is day 60. It is
years \(em February 28 is day 59 and March 1 is day 60.
It is
impossible to explicitly refer to the occasional February 29.
.It Em n
The zero-based Julian day
@ -246,10 +258,12 @@ the last
day in month
.Em m
.Dc
which may occur in either the fourth or the fifth week). Week 1 is the
which may occur in either the fourth or the fifth week).
Week 1 is the
first week in which the
.Em d Ns 'th
day occurs. Day zero is Sunday.
day occurs.
Day zero is Sunday.
.Pp
The
.Em time
@ -259,7 +273,8 @@ except that no leading sign
.Pq Ql \-
or
.Pq Ql +
is allowed. The default, if
is allowed.
The default, if
.Em time
is not given, is
.Sy 02:00:00 .

View File

@ -67,7 +67,7 @@ argument is non-zero, the
signal will be sent
to the process every
.Fa interval
microseconds after the timer expires (e.g. after
microseconds after the timer expires (e.g.\& after
.Fa microseconds
number of microseconds have passed).
.Pp

View File

@ -60,7 +60,8 @@ are used to decode a visual representation of characters, as produced
by the
.Xr vis 3
function, back into
the original form. Unvis is called with successive characters in
the original form.
Unvis is called with successive characters in
.Fa c
until a valid
sequence is recognized, at which time the decoded character is
@ -83,7 +84,8 @@ decoding any escape sequences along the way,
and returns the number of characters placed into
.Fa dst ,
or \-1 if an
invalid escape sequence was detected. The size of
invalid escape sequence was detected.
The size of
.Fa dst
should be
equal to the size of
@ -106,20 +108,24 @@ The
.Fn unvis
function
implements a state machine that can be used to decode an arbitrary
stream of bytes. All state associated with the bytes being decoded
stream of bytes.
All state associated with the bytes being decoded
is stored outside the
.Fn unvis
function (that is, a pointer to the state is passed in), so
calls decoding different streams can be freely intermixed. To
calls decoding different streams can be freely intermixed.
To
start decoding a stream of bytes, first initialize an integer
to zero. Call
to zero.
Call
.Fn unvis
with each successive byte, along with a pointer
to this integer, and a pointer to a destination character.
The
.Fn unvis
function
has several return codes that must be handled properly. They are:
has several return codes that must be handled properly.
They are:
.Bl -tag -width UNVIS_VALIDPUSH
.It Li \&0 (zero)
Another character is necessary; nothing has been recognized yet.
@ -131,11 +137,13 @@ A valid character has been recognized and is available at the location
pointed to by cp; however, the character currently passed in should
be passed in again.
.It Dv UNVIS_NOCHAR
A valid sequence was detected, but no character was produced. This
A valid sequence was detected, but no character was produced.
This
return code is necessary to indicate a logical break between characters.
.It Dv UNVIS_SYNBAD
An invalid escape sequence was detected, or the decoder is in an
unknown state. The decoder is placed into the starting state.
unknown state.
The decoder is placed into the starting state.
.El
.Pp
When all bytes in the stream have been processed, call

View File

@ -58,9 +58,11 @@ a string which represents the character
.Fa c .
If
.Fa c
needs no encoding, it is copied in unaltered. The string is
needs no encoding, it is copied in unaltered.
The string is
null terminated, and a pointer to the end of the string is
returned. The maximum length of any encoding is four
returned.
The maximum length of any encoding is four
characters (not including the trailing
.Dv NUL ) ;
thus, when
@ -160,9 +162,11 @@ Synonym for
\&|
.Dv VIS_NL .
.It Dv VIS_SAFE
Only encode "unsafe" characters. Unsafe means control
Only encode "unsafe" characters.
Unsafe means control
characters which may cause common terminals to perform
unexpected functions. Currently this form allows space,
unexpected functions.
Currently this form allows space,
tab, newline, backspace, bell, and return - in addition
to all graphic characters - unencoded.
.El
@ -259,7 +263,8 @@ where
.Ar d
represents a hexadecimal digit.
.It Dv VIS_OCTAL
Use a three digit octal sequence. The form is
Use a three digit octal sequence.
The form is
.Ql \eddd
where
.Ar d

View File

@ -45,7 +45,8 @@ The
system call
will return the permission for the process' I/O port space in the
.Fa *enable
argument. The port range starts at
argument.
The port range starts at
.Fa start
and the number of contiguous entries will be returned in
.Fa *length .

View File

@ -54,11 +54,14 @@ The
.Fn i386_set_watch
function
will set up the specified debug registers as indicated by the
arguments. The
arguments.
The
.Fa watchnum
argument specifies which watch register is used, 0, 1, 2, 3, or -1. If
argument specifies which watch register is used, 0, 1, 2, 3, or -1.
If
.Fa watchnum
is -1, a free watch register is found and used. If there are no free
is -1, a free watch register is found and used.
If there are no free
watch registers, an error code of -1 is returned.
The
.Fa watchaddr
@ -78,7 +81,8 @@ DBREG_DR7_RDWR Break when the watch area is read from or written
.Ed
.Pp
Note that these functions do not actually set or clear breakpoints;
they manipulate the indicated debug register set. You must use
they manipulate the indicated debug register set.
You must use
.Xr ptrace 2
to retrieve and install the debug register values for a process.
.Sh RETURN VALUES
@ -96,7 +100,8 @@ will return the
.Fa watchnum
argument, or the watchnum actually used in the case that
.Fa watchnum
is -1 on success. On error,
is -1 on success.
On error,
.Fn i386_set_watch
will return -1 indicating that the watchpoint could not be set up
because either no more watchpoints are available, or

View File

@ -191,7 +191,8 @@ function operates the same as
.Fn sgetrune
with the exception that it attempts to read enough bytes from
.Fa stream
to decode a single rune. It returns either
to decode a single rune.
It returns either
.Dv EOF
on end of file,
.Dv _INVALID_RUNE

View File

@ -81,7 +81,8 @@ and
functions.
This controls recognition of upper and lower case,
alphabetic or non-alphabetic characters,
and so on. The real work is done by the
and so on.
The real work is done by the
.Fn setrunelocale
function.
.It Dv LC_MESSAGES

View File

@ -61,9 +61,11 @@ Unicode Standard.
.Pp
.Nm UTF2
representation is backwards compatible with ASCII, so 0x00-0x7f refer to the
ASCII character set. The multibyte encodings of wide characters between
ASCII character set.
The multibyte encodings of wide characters between
0x0080 and 0xffff
consist entirely of bytes whose high order bit is set. The actual
consist entirely of bytes whose high order bit is set.
The actual
encoding is represented by the following table:
.Bd -literal
[0x0000 - 0x007f] [00000000.0bbbbbbb] -> 0bbbbbbb

View File

@ -52,7 +52,8 @@ The routines
and
.Fn ascii2addr
are used to convert network addresses between binary form and a
printable form appropriate to the address family. Both functions take
printable form appropriate to the address family.
Both functions take
an
.Fa af
argument, specifying the address family to be used in the conversion
@ -67,14 +68,17 @@ The
.Fn addr2ascii
function
is used to convert binary, network-format addresses into printable
form. In addition to
form.
In addition to
.Fa af ,
there are three other arguments. The
there are three other arguments.
The
.Fa addrp
argument is a pointer to the network address to be converted.
The
.Fa len
argument is the length of the address. The
argument is the length of the address.
The
.Fa buf
argument is an optional pointer to a caller-allocated buffer to hold
the result; if a null pointer is passed,
@ -94,7 +98,8 @@ and
The
.Fa ascii
argument is a pointer to the string which is to be converted into
binary. The
binary.
The
.Fa result
argument is a pointer to an appropriate network address structure for
the specified family.
@ -192,7 +197,8 @@ was improperly formatted for address family
.Xr inet 4
.Sh HISTORY
An interface close to this one was originally suggested by Craig
Partridge. This particular interface originally appeared in the
Partridge.
This particular interface originally appeared in the
.Tn INRIA
.Tn IPv6
implementation.
@ -201,8 +207,10 @@ Code and documentation by
.An Garrett A. Wollman ,
MIT Laboratory for Computer Science.
.Sh BUGS
The original implementations supported IPv6. This support should
eventually be resurrected. The
The original implementations supported IPv6.
This support should
eventually be resurrected.
The
.Tn NRL
implementation also included support for the
.Dv AF_ISO
@ -210,13 +218,16 @@ and
.Dv AF_NS
address families.
.Pp
The genericity of this interface is somewhat questionable. A truly
The genericity of this interface is somewhat questionable.
A truly
generic interface would provide a means for determining the length of
the buffer to be used so that it could be dynamically allocated, and
would always require a
.Dq Li "struct sockaddr"
to hold the binary address. Unfortunately, this is incompatible with existing
practice. This limitation means that a routine for printing network
to hold the binary address.
Unfortunately, this is incompatible with existing
practice.
This limitation means that a routine for printing network
addresses from arbitrary address families must still have internal
knowledge of the maximum buffer length needed and the appropriate part
of the address to use as the binary address.

View File

@ -85,4 +85,5 @@ functions appeared in
On the
.Tn VAX
bytes are handled backwards from most everyone else in
the world. This is not expected to be fixed in the near future.
the world.
This is not expected to be fixed in the near future.

View File

@ -107,7 +107,7 @@ should point to an address which is
.Fa len
bytes long,
in binary form
(i.e. not an IP address in human readable
(i.e., not an IP address in human readable
.Tn ASCII
form).
The

View File

@ -110,7 +110,8 @@ if one exists, otherwise it is NULL.
.Pp
The
.Li ifa_data
field references address family specific data. For
field references address family specific data.
For
.Dv AF_LINK
addresses it contains a pointer to the
.Fa struct if_data

View File

@ -217,15 +217,19 @@ flag then the caller wants all addresses: IPv6 and IPv4-mapped IPv6.
A query is first made for
.Li AAAA
records and if successful, the
IPv6 addresses are returned. Another query is then made for
IPv6 addresses are returned.
Another query is then made for
.Li A
records and any found are returned as IPv4-mapped IPv6 addresses.
.Li h_length
will be 16. Only if both queries fail does the function
will be 16.
Only if both queries fail does the function
return a
.Dv NULL
pointer. This flag is ignored unless af equals
AF_INET6. If both
pointer.
This flag is ignored unless af equals
AF_INET6.
If both
.Dv AI_ALL
and
.Dv AI_V4MAPPED

View File

@ -72,7 +72,8 @@ broken-out fields of a line in the network data base
.Pa /etc/networks ,
or entries supplied by the
.Xr yp 8
system. The order of the lookups is controlled by the
system.
The order of the lookups is controlled by the
`networks' entry in
.Xr nsswitch.conf 5 .
.Pp
@ -94,7 +95,8 @@ A zero terminated list of alternate names for the network.
.It Fa n_addrtype
The type of the network number returned; currently only AF_INET.
.It Fa n_net
The network number. Network numbers are returned in machine byte
The network number.
Network numbers are returned in machine byte
order.
.El
.Pp
@ -106,7 +108,8 @@ reads the next line of the file, opening the file if necessary.
The
.Fn setnetent
function
opens and rewinds the file. If the
opens and rewinds the file.
If the
.Fa stayopen
flag is non-zero,
the net data base will not be closed after each call to

View File

@ -95,7 +95,8 @@ reads the next line of the file, opening the file if necessary.
The
.Fn setprotoent
function
opens and rewinds the file. If the
opens and rewinds the file.
If the
.Fa stayopen
flag is non-zero,
the net data base will not be closed after each call to

View File

@ -99,7 +99,8 @@ reads the next line of the file, opening the file if necessary.
The
.Fn setservent
function
opens and rewinds the file. If the
opens and rewinds the file.
If the
.Fa stayopen
flag is non-zero,
the net data base will not be closed after each call to

View File

@ -144,11 +144,13 @@ takes an Internet address and returns an
.Tn ASCII
string representing the address in
.Ql .\&
notation. The routine
notation.
The routine
.Fn inet_makeaddr
takes an Internet network number and a local
network address and constructs an Internet address
from it. The routines
from it.
The routines
.Fn inet_netof
and
.Fn inet_lnaof
@ -174,7 +176,8 @@ a
.Pp
When four parts are specified, each is interpreted
as a byte of data and assigned, from left to right,
to the four bytes of an Internet address. Note
to the four bytes of an Internet address.
Note
that when an Internet address is viewed as a 32-bit
integer quantity on the
.Tn VAX
@ -220,7 +223,8 @@ and
.Fn inet_ntoa
functions are semi-deprecated in favor of the
.Xr addr2ascii 3
family. However, since those functions are not yet widely implemented,
family.
However, since those functions are not yet widely implemented,
portable programs cannot rely on their presence and will continue
to use the
.Xr inet 3

View File

@ -66,7 +66,7 @@ complicated.
The advanced API therefore defines a set
of functions to help applications.
These functions assume the
formatting rules specified in Appendix B in RFC2460 i.e. that the
formatting rules specified in Appendix B in RFC2460 i.e., that the
largest field is placed last in the option.
The function prototypes for
these functions are all in the
@ -76,7 +76,7 @@ header.
.Ss inet6_opt_init
.Fn inet6_opt_init
returns the number of bytes needed for the empty
extension header i.e. without any options.
extension header i.e., without any options.
If
.Li extbuf
is not NULL it also initializes the extension header to have the correct length
@ -115,7 +115,7 @@ is the 8-bit option type.
.Li len
is the length of the option data
.Po
i.e. excluding the option type and option length fields.
i.e., excluding the option type and option length fields.
.Pc
.Pp
Once

View File

@ -72,7 +72,8 @@
.Sh DESCRIPTION
RFC2292 IPv6 advanced API defines eight
functions that the application calls to build and examine a Routing
header. Four functions build a Routing header:
header.
Four functions build a Routing header:
.Bl -hang
.It Fn inet6_rthdr_space
return #bytes required for ancillary data
@ -108,7 +109,8 @@ containing the specified number of
.Fa segments
(addresses).
For an IPv6 Type 0 Routing header, the number
of segments must be between 1 and 23, inclusive. The return value
of segments must be between 1 and 23, inclusive.
The return value
includes the size of the cmsghdr structure that precedes the Routing
header, and any required padding.
.Pp

View File

@ -191,7 +191,8 @@ This option is enabled by default.
.It Dv RES_NOALIASES
This option turns off the user level aliasing feature controlled by the
.Dq Ev HOSTALIASES
environment variable. Network daemons should set this option.
environment variable.
Network daemons should set this option.
.It Dv RES_USE_INET6
Enables support for IPv6-only applications.
This causes IPv4 addresses to be returned as an IPv4 mapped address.
@ -227,7 +228,8 @@ it can be overridden by the environment variable
This environment variable may contain several blank-separated
tokens if you wish to override the
.Em "search list"
on a per-process basis. This is similar to the
on a per-process basis.
This is similar to the
.Ic search
command in the configuration file.
Another environment variable
@ -238,7 +240,8 @@ set by changing fields in the
.Va _res
structure or are inherited from the configuration file's
.Ic options
command. The syntax of the
command.
The syntax of the
.Dq Ev RES_OPTIONS
environment variable is explained in
.Xr resolver 5 .

View File

@ -124,9 +124,11 @@ The file system is read-only.
.Xr acl_set 3 ,
.Xr posix1e 3
.Sh STANDARDS
POSIX.1e is described in IEEE POSIX.1e draft 17. Discussion
POSIX.1e is described in IEEE POSIX.1e draft 17.
Discussion
of the draft continues on the cross-platform POSIX.1e implementation
mailing list. To join this list, see the
mailing list.
To join this list, see the
.Fx
POSIX.1e implementation
page for more information.

View File

@ -56,7 +56,8 @@ function fails if:
.It Bq Er EINVAL
Argument
.Fa acl
does not point to a valid ACL. Argument
does not point to a valid ACL.
Argument
.Fa entry_d
is not a valid descriptor for an ACL entry in
.Fa acl .

View File

@ -54,7 +54,8 @@ function fails if:
.It Bq Er EINVAL
Argument
.Fa permset_d
is not a valid descriptor for a permission set. Argument
is not a valid descriptor for a permission set.
Argument
.Fa perm
does not contain a valid
.Vt acl_perm_t

View File

@ -46,7 +46,8 @@ The
function returns a pointer to a copy of the ACL pointed to by the argument
.Va acl .
.Pp
This function may cause memory to be allocated. The caller should free any
This function may cause memory to be allocated.
The caller should free any
releasable memory, when the new ACL is no longer required, by calling
.Xr acl_free 3
with the
@ -62,7 +63,8 @@ support for POSIX.1e interfaces and features is still under
development at this time.
.Sh RETURN VALUES
Upon successful completion, this function shall return a pointer to the
duplicate ACL. Otherwise, a value of
duplicate ACL.
Otherwise, a value of
.Va (acl_t)NULL
shall be returned, and
.Va errno
@ -92,9 +94,11 @@ system-imposed memory management constraints.
.Xr acl_get 3 ,
.Xr posix1e 3
.Sh STANDARDS
POSIX.1e is described in IEEE POSIX.1e draft 17. Discussion
POSIX.1e is described in IEEE POSIX.1e draft 17.
Discussion
of the draft continues on the cross-platform POSIX.1e implementation
mailing list. To join this list, see the
mailing list.
To join this list, see the
.Fx
POSIX.1e implementation
page for more information.

View File

@ -73,9 +73,11 @@ argument is invalid.
.Xr acl_init 3 ,
.Xr posix1e 3
.Sh STANDARDS
POSIX.1e is described in IEEE POSIX.1e draft 17. Discussion
POSIX.1e is described in IEEE POSIX.1e draft 17.
Discussion
of the draft continues on the cross-platform POSIX.1e implementation
mailing list. To join this list, see the
mailing list.
To join this list, see the
.Fx
POSIX.1e implementation
page for more information.

View File

@ -48,7 +48,8 @@ function converts the text form of an ACL referred to by
into the internal working structure for ACLs, appropriate for applying to
files or manipulating.
.Pp
This function may cause memory to be allocated. The caller should free any
This function may cause memory to be allocated.
The caller should free any
releasable memory, when the new ACL is no longer required, by calling
.Xr acl_free 3
with the
@ -60,7 +61,8 @@ support for POSIX.1e interfaces and features is still under
development at this time.
.Sh RETURN VALUES
Upon successful completion, the function shall return a pointer to the
internal representation of the ACL in working storage. Otherwise, a value
internal representation of the ACL in working storage.
Otherwise, a value
of
.Va (acl_t)NULL
shall be returned, and
@ -90,9 +92,11 @@ hardware or system-imposed memory management constraints.
.Xr acl_to_text 3 ,
.Xr posix1e 3
.Sh STANDARDS
POSIX.1e is described in IEEE POSIX.1e draft 17. Discussion
POSIX.1e is described in IEEE POSIX.1e draft 17.
Discussion
of the draft continues on the cross-platform POSIX.1e implementation
mailing list. To join this list, see the
mailing list.
To join this list, see the
.Fx
POSIX.1e implementation
page for more information.
@ -112,7 +116,8 @@ rely on the
.Xr getpwent 3
library calls to manage username and uid mapping, as well as the
.Xr getgrent 3
library calls to manage groupname and gid mapping. These calls are not
library calls to manage groupname and gid mapping.
These calls are not
thread safe, and so transitively, neither are
.Fn acl_from_text
and

View File

@ -78,7 +78,8 @@ is a non-portable variation on
which does not follow a symlink if the target of the call is a
symlink.
.Pp
These functions may cause memory to be allocated. The caller should free
These functions may cause memory to be allocated.
The caller should free
any releasable memory, when the new ACL is no longer required, by calling
.Xr acl_free 3
with the
@ -96,7 +97,8 @@ support for POSIX.1e interfaces and features is still under
development at this time.
.Sh RETURN VALUES
Upon successful completion, the function shall return a pointer to the ACL
that was retrieved. Otherwise, a value of
that was retrieved.
Otherwise, a value of
.Va (acl_t)NULL
shall be returned, and
.Va errno
@ -138,9 +140,11 @@ The file system does not support ACL retrieval.
.Xr acl_set 3 ,
.Xr posix1e 3
.Sh STANDARDS
POSIX.1e is described in IEEE POSIX.1e draft 17. Discussion
POSIX.1e is described in IEEE POSIX.1e draft 17.
Discussion
of the draft continues on the cross-platform POSIX.1e implementation
mailing list. To join this list, see the
mailing list.
To join this list, see the
.Fx
POSIX.1e implementation
page for more information.

View File

@ -82,7 +82,8 @@ If the
function successfully obtains an ACL entry, a value of 1 is returned.
If the ACL has no ACL entries, the
.Fn acl_get_entry
returns a value of 0. If the value of
returns a value of 0.
If the value of
.Fa entry_id
is
.Dv ACL_NEXT_ENTRY
@ -93,7 +94,8 @@ a value of 0 will be returned until a successful call with
.Fa entry_id
of
.Dv ACL_FIRST_ENTRY
is made. Otherwise, a value of -1 will be returned and
is made.
Otherwise, a value of -1 will be returned and
the global variable
.Va errno
will be set to indicate the error.
@ -105,7 +107,8 @@ fails if:
.It Bq Er EINVAL
Argument
.Fa acl
does not point to a valid ACL. Argument
does not point to a valid ACL.
Argument
.Fa entry_id
is neither
.Dv ACL_FIRST_ENTRY

View File

@ -78,7 +78,8 @@ will return a value of
.Vt ( void * ) Ns Dv NULL
and the function will fail.
.Pp
This function may cause memory to be allocated. The caller should
This function may cause memory to be allocated.
The caller should
free any releasable memory, when the new qualifier is no longer
required, by calling
.Fn acl_free
@ -102,7 +103,8 @@ fails if:
.It Bq Er EINVAL
Argument
.Fa entry_d
does not point to a valid descriptor for an ACL entry. The
does not point to a valid descriptor for an ACL entry.
The
value of the tag type in the ACL entry referenced by argument
.Fa entry_d
is not

View File

@ -46,13 +46,16 @@ The
function allocates and initializes the working storage for an ACL of at
least
.Va count
ACL entries. A pointer to the working storage is returned. The working
ACL entries.
A pointer to the working storage is returned.
The working
storage allocated to contain the ACL is freed by a call to
.Xr acl_free 3 .
When the area is first allocated, it shall contain an ACL that contains
no ACL entries.
.Pp
This function may cause memory to be allocated. The caller should free any
This function may cause memory to be allocated.
The caller should free any
releasable memory, when the new ACL is no longer required, by calling
.Xr acl_free 3
with the
@ -64,7 +67,8 @@ support for POSIX.1e interfaces and features is still under
development at this time.
.Sh RETURN VALUES
Upon successful completion, this function shall return a pointer to the
working storage. Otherwise, a value of
working storage.
Otherwise, a value of
.Va (acl_t)NULL
shall be returned, and
.Va errno
@ -91,9 +95,11 @@ system-imposed memory management constraints.
.Xr acl_free 3 ,
.Xr posix1e 3
.Sh STANDARDS
POSIX.1e is described in IEEE POSIX.1e draft 17. Discussion
POSIX.1e is described in IEEE POSIX.1e draft 17.
Discussion
of the draft continues on the cross-platform POSIX.1e implementation
mailing list. To join this list, see the
mailing list.
To join this list, see the
.Fx
POSIX.1e implementation
page for more information.

View File

@ -126,9 +126,11 @@ read-only.
.Xr acl_valid 3 ,
.Xr posix1e 3
.Sh STANDARDS
POSIX.1e is described in IEEE POSIX.1e draft 17. Discussion
POSIX.1e is described in IEEE POSIX.1e draft 17.
Discussion
of the draft continues on the cross-platform POSIX.1e implementation
mailing list. To join this list, see the
mailing list.
To join this list, see the
.Fx
POSIX.1e implementation
page for more information.

View File

@ -56,7 +56,8 @@ function fails if:
.It Bq Er EINVAL
Argument
.Fa entry_d
is not a valid descriptor for an ACL entry. The tag type of the
is not a valid descriptor for an ACL entry.
The tag type of the
ACL entry
.Fa entry_d
is not

View File

@ -56,7 +56,8 @@ function fails if:
.It Bq Er EINVAL
Argument
.Fa entry_d
is not a valid descriptor for an ACL entry. Argument
is not a valid descriptor for an ACL entry.
Argument
.Fa tag_type
is not a valid ACL tag type.
.El

View File

@ -45,7 +45,8 @@ The
.Fn acl_to_text
function translates the ACL pointed to by argument
.Va acl
into a NULL terminated character string. If the pointer
into a NULL terminated character string.
If the pointer
.Va len_p
is not NULL, then the function shall return the length of the string (not
including the NULL terminator) in the location pointed to by
@ -55,7 +56,8 @@ The format of the text string returned by
shall be the POSIX.1e long ACL form.
.Pp
This function allocates any memory necessary to contain the string and
returns a pointer to the string. The caller should free any releasable
returns a pointer to the string.
The caller should free any releasable
memory, when the new string is no longer required, by calling
.Xr acl_free 3
with the
@ -67,7 +69,8 @@ support for POSIX.1e interfaces and features is still under
development at this time.
.Sh RETURN VALUES
Upon successful completion, the function shall return a pointer to the
long text form of an ACL. Otherwise, a value of
long text form of an ACL.
Otherwise, a value of
.Va (char*)NULL
shall be returned and
.Va errno
@ -100,9 +103,11 @@ by the hardware or software-imposed memory management constraints.
.Xr acl_from_text 3 ,
.Xr posix1e 3
.Sh STANDARDS
POSIX.1e is described in IEEE POSIX.1e draft 17. Discussion
POSIX.1e is described in IEEE POSIX.1e draft 17.
Discussion
of the draft continues on the cross-platform POSIX.1e implementation
mailing list. To join this list, see the
mailing list.
To join this list, see the
.Fx
POSIX.1e implementation
page for more information.
@ -122,7 +127,8 @@ rely on the
.Xr getpwent 3
library calls to manage username and uid mapping, as well as the
.Xr getgrent 3
library calls to manage groupname and gid mapping. These calls are not
library calls to manage groupname and gid mapping.
These calls are not
thread safe, and so transitively, neither are
.Fn acl_from_text
and

View File

@ -52,10 +52,12 @@
.Sh DESCRIPTION
These functions check that the ACL referred to by the argument
.Va acl
is valid. The POSIX.1e routine,
is valid.
The POSIX.1e routine,
.Fn acl_valid ,
checks this validity only with POSIX.1e ACL semantics, and irrespective
of the context in which the ACL is to be used. The non-portable forms,
of the context in which the ACL is to be used.
The non-portable forms,
.Fn acl_valid_fd_np ,
.Fn acl_valid_file_np ,
and
@ -140,9 +142,11 @@ The file system does not support ACL retrieval.
.Xr acl_set 3 ,
.Xr posix1e 3
.Sh STANDARDS
POSIX.1e is described in IEEE POSIX.1e draft 17. Discussion
POSIX.1e is described in IEEE POSIX.1e draft 17.
Discussion
of the draft continues on the cross-platform POSIX.1e implementation
mailing list. To join this list, see the
mailing list.
To join this list, see the
.Fx
POSIX.1e implementation
page for more information.

View File

@ -232,7 +232,7 @@ sequence of characters of that collating element.
The sequence is a single element of the bracket expression's list.
A bracket expression containing a multi-character collating element
can thus match more than one character,
e.g. if the collating sequence includes a
e.g.\& if the collating sequence includes a
.Ql ch
collating element,
then the RE

View File

@ -564,7 +564,7 @@ or
.Ql |\&
cannot appear first or last in a (sub)expression or after another
.Ql |\& ,
i.e. an operand of
i.e., an operand of
.Ql |\&
cannot be an empty subexpression.
An empty parenthesized subexpression,
@ -651,7 +651,7 @@ empty (sub)expression
.It Dv REG_ASSERT
can't happen - you found a bug
.It Dv REG_INVARG
invalid argument, e.g. negative-length string
invalid argument, e.g.\& negative-length string
.El
.Sh HISTORY
Originally written by

View File

@ -64,7 +64,8 @@ reads the next line of the file, opening the file if necessary.
The
.Fn setrpcent
function
opens and rewinds the file. If the
opens and rewinds the file.
If the
.Fa stayopen
flag is non-zero,
the net data base will not be closed after each call to

View File

@ -26,7 +26,8 @@ and using protocol
.Fa proto .
It returns 0 if it cannot contact the portmapper, or if
.Fa prognum
is not registered. If
is not registered.
If
.Fa prognum
is registered but not with version
.Fa versnum ,

View File

@ -39,9 +39,11 @@
.Sh DESCRIPTION
These routines are part of the
.Tn RPC
library. They implement
library.
They implement
.Tn DES
Authentication. See
Authentication.
See
.Xr rpc 3
for further details about
.Tn RPC .
@ -81,14 +83,16 @@ derived from the utility routine
but could also represent a user name using
.Fn user2netname .
The second field is window on the validity of
the client credential, given in seconds. A small
the client credential, given in seconds.
A small
window is more secure than a large one, but choosing
too small of a window will increase the frequency of
resynchronizations because of clock drift.
The third
argument
.Fa addr
is optional. If it is
is optional.
If it is
.Dv NULL ,
then the authentication system will assume
that the local clock is always in sync with the server's
@ -104,7 +108,8 @@ address of the
server itself.
The final argument
.Fa ckey
is also optional. If it is
is also optional.
If it is
.Dv NULL ,
then the authentication system will
generate a random
@ -184,7 +189,8 @@ takes a server netname and a
.Tn DES
key, and decrypts the key by
using the public key of the server and the secret key
associated with the effective uid of the calling process. It
associated with the effective uid of the calling process.
It
is the inverse of
.Fn key_encryptsession .
.Pp
@ -195,7 +201,8 @@ is a keyserver interface routine.
It
takes a server netname and a des key, and encrypts
it using the public key of the server and the secret key
associated with the effective uid of the calling process. It
associated with the effective uid of the calling process.
It
is the inverse of
.Fn key_decryptsession .
.Pp
@ -230,7 +237,8 @@ Returns
.Dv TRUE
if it succeeds and
.Dv FALSE
if it fails. Inverse of
if it fails.
Inverse of
.Fn host2netname .
.Pp
The

View File

@ -92,15 +92,19 @@ object is indeterminate (garbage) after a file is closed.
.Pp
A file may be subsequently reopened, by the same or another program
execution, and its contents reclaimed or modified (if it can be repositioned
at the start). If the main function returns to its original caller, or
at the start).
If the main function returns to its original caller, or
the
.Xr exit 3
function is called, all open files are closed (hence all output
streams are flushed) before program termination. Other methods
streams are flushed) before program termination.
Other methods
of program termination may not close files properly and hence
buffered output may be lost. In particular,
buffered output may be lost.
In particular,
.Xr _exit 2
does not flush stdio files. Neither does an exit due to a signal.
does not flush stdio files.
Neither does an exit due to a signal.
Buffers are flushed by
.Xr abort 3
as required by POSIX, although previous implementations did not.

View File

@ -144,13 +144,15 @@ assigning a differently sized
.Fa value
to the same
.Fa name
will result in a memory leak. The
will result in a memory leak.
The
.Fx
semantics for these functions
(namely, that the contents of
.Fa value
are copied and that old values remain accessible indefinitely) make this
bug unavoidable. Future versions may eliminate one or both of these
bug unavoidable.
Future versions may eliminate one or both of these
semantic guarantees in order to fix the bug.
.Sh HISTORY
The functions

View File

@ -149,11 +149,13 @@ The
.Fn qsort
and
.Fn qsort_r
functions are an implementation of C.A.R. Hoare's
functions are an implementation of C.A.R.
Hoare's
.Dq quicksort
algorithm,
a variant of partition-exchange sorting; in particular, see D.E. Knuth's
Algorithm Q.
a variant of partition-exchange sorting; in particular, see
.An D.E. Knuth Ns 's
.%T "Algorithm Q" .
.Sy Quicksort
takes O N lg N average time.
This implementation uses median selection to avoid its
@ -161,10 +163,13 @@ O N**2 worst-case behavior.
.Pp
The
.Fn heapsort
function is an implementation of J.W.J. William's
function is an implementation of
.An "J.W.J. William" Ns 's
.Dq heapsort
algorithm,
a variant of selection sorting; in particular, see D.E. Knuth's Algorithm H.
a variant of selection sorting; in particular, see
.An "D.E. Knuth" Ns 's
.%T "Algorithm H" .
.Sy Heapsort
takes O N lg N worst-case time.
Its

View File

@ -105,7 +105,10 @@ The
function is not stable, but uses no additional memory.
.Pp
These functions are variants of most-significant-byte radix sorting; in
particular, see D.E. Knuth's Algorithm R and section 5.2.5, exercise 10.
particular, see
.An "D.E. Knuth" Ns 's
.%T "Algorithm R"
and section 5.2.5, exercise 10.
They take linear time relative to the number of bytes in the strings.
.Sh RETURN VALUES
.Rv -std radixsort

View File

@ -81,9 +81,11 @@ functions.
The difference is that
.Xr rand 3
produces a much less random sequence \(em in fact, the low dozen bits
generated by rand go through a cyclic pattern. All the bits generated by
generated by rand go through a cyclic pattern.
All the bits generated by
.Fn random
are usable. For example,
are usable.
For example,
.Sq Li random()&01
will produce a random binary
value.
@ -115,13 +117,15 @@ a fixed seed.
The
.Fn initstate
routine allows a state array, passed in as an argument, to be initialized
for future use. The size of the state array (in bytes) is used by
for future use.
The size of the state array (in bytes) is used by
.Fn initstate
to decide how sophisticated a random number generator it should use \(em the
more state, the better the random numbers will be.
(Current "optimal" values for the amount of state information are
8, 32, 64, 128, and 256 bytes; other amounts will be rounded down to
the nearest known amount. Using less than 8 bytes will cause an error.)
the nearest known amount.
Using less than 8 bytes will cause an error.)
The seed for the initialization (which specifies a starting point for
the random number sequence, and provides for restarting at the same
point) is also an argument.

View File

@ -51,7 +51,8 @@ The
and
.Fn twalk
functions manage binary search trees based on algorithms T and D
from Knuth (6.2.2). The comparison function passed in by
from Knuth (6.2.2).
The comparison function passed in by
the user has the same style of return values as
.Xr strcmp 3 .
.Pp
@ -72,7 +73,8 @@ is identical to
.Fn tfind
except that if no match is found,
.Fa key
is inserted into the tree and a pointer to it is returned. If
is inserted into the tree and a pointer to it is returned.
If
.Fa rootp
points to a NULL value a new binary search tree is created.
.Pp

View File

@ -354,7 +354,8 @@ function will modify the same object.
The C Standard provides no mechanism for a program to modify its current
local timezone setting, and the
.Tn POSIX Ns No \&-standard
method is not reentrant. (However, thread-safe implementations are provided
method is not reentrant.
(However, thread-safe implementations are provided
in the
.Tn POSIX
threaded environment.)

View File

@ -184,7 +184,8 @@ is replaced by the weekday (Monday as the first day of the week)
as a decimal number (1-7).
.It Cm \&%V
is replaced by the week number of the year (Monday as the first day of
the week) as a decimal number (01-53). If the week containing January
the week) as a decimal number (01-53).
If the week containing January
1 has four or more days in the new year, then it is week 1; otherwise
it is the last week of the previous year, and the next week is week 1.
.It Cm %v

View File

@ -161,7 +161,8 @@ The
format specifier only accepts time zone abbreviations of the local time zone,
or the value "GMT".
This limitation is because of ambiguity due to of the over loading of time
zone abbreviations. One such example is
zone abbreviations.
One such example is
.Fa EST
which is both Eastern Standard Time and Eastern Australia Summer Time.
.Pp

View File

@ -47,7 +47,8 @@ The
.Fn strlcpy
and
.Fn strlcat
functions copy and concatenate strings respectively. They are designed
functions copy and concatenate strings respectively.
They are designed
to be safer, more consistent, and less error prone replacements for
.Xr strncpy 3
and
@ -108,7 +109,8 @@ The
and
.Fn strlcat
functions return the total length of the string they tried to
create. For
create.
For
.Fn strlcpy
that means the length of
.Fa src .

View File

@ -115,7 +115,7 @@ While the
.Fn strtok
function should be preferred for portability reasons (it conforms to
.St -isoC )
it is unable to handle empty fields, i.e. detect fields delimited by
it is unable to handle empty fields, i.e., detect fields delimited by
two adjacent delimiter characters, or to be used for more than a single
string at a time.
The

View File

@ -76,7 +76,8 @@ connections are present on the queue,
returns an error as described below.
The accepted socket
may not be used
to accept more connections. The original socket
to accept more connections.
The original socket
.Fa s
remains open.
.Pp
@ -130,7 +131,8 @@ For some applications, performance may be enhanced by using an
.Xr accept_filter 9
to pre-process incoming connections.
.Sh RETURN VALUES
The call returns \-1 on error. If it succeeds, it returns a non-negative
The call returns \-1 on error.
If it succeeds, it returns a non-negative
integer that is a descriptor for the accepted socket.
.Sh ERRORS
The

View File

@ -45,9 +45,11 @@ associated with the structure pointed to by
.Sh RETURN VALUES
If the asynchronous I/O request has completed successfully,
.Fn aio_error
returns 0. If the request has not yet completed,
returns 0.
If the request has not yet completed,
.Er EINPROGRESS
is returned. If the request has completed unsuccessfully the error
is returned.
If the request has completed unsuccessfully the error
status is returned as described in
.Xr read 2 ,
.Xr write 2 ,

View File

@ -85,7 +85,8 @@ The Asynchronous I/O Control Block structure pointed to by
and the buffer that the
.Fa iocb->aio_buf
member of that structure references must remain valid until the
operation has completed. For this reason, use of auto (stack) variables
operation has completed.
For this reason, use of auto (stack) variables
for these objects is discouraged.
.Pp
The asynchronous I/O control buffer
@ -122,7 +123,8 @@ system call is not supported.
.Pp
The following conditions may be synchronously detected when the
.Fn aio_read
system call is made, or asynchronously, at any time thereafter. If they
system call is made, or asynchronously, at any time thereafter.
If they
are detected at call time,
.Fn aio_read
returns -1 and sets

View File

@ -50,7 +50,8 @@ The
argument
is an array of
.Fa niocb
pointers to asynchronous I/O requests. Array members containing
pointers to asynchronous I/O requests.
Array members containing
NULL will be silently ignored.
.Pp
If
@ -58,7 +59,8 @@ If
is a non-nil pointer, it specifies a maximum interval to suspend.
If
.Fa timeout
is a nil pointer, the suspend blocks indefinitely. To effect a
is a nil pointer, the suspend blocks indefinitely.
To effect a
poll, the
.Fa timeout
should point to a zero-value timespec structure.
@ -66,7 +68,8 @@ should point to a zero-value timespec structure.
If one or more of the specified asynchronous I/O requests have
completed,
.Fn aio_suspend
returns 0. Otherwise it returns -1 and sets
returns 0.
Otherwise it returns -1 and sets
.Va errno
to indicate the error, as enumerated below.
.Sh ERRORS

View File

@ -47,7 +47,8 @@ to the descriptor
.Fa iocb->aio_fildes .
The call returns immediately after the write request has been enqueued
to the descriptor; the write may or may not have completed at the time
the call returns. If the request could not be enqueued, generally due
the call returns.
If the request could not be enqueued, generally due
to invalid arguments, the call returns without having enqueued the
request.
.Pp
@ -57,7 +58,8 @@ is set for
.Fa iocb->aio_fildes ,
.Fn aio_write
operations append to the file in the same order as the calls were
made. If
made.
If
.Dv O_APPEND
is not set for the file descriptor, the write operation will occur at
the absolute position from the beginning of the file plus
@ -89,7 +91,8 @@ The Asynchronous I/O Control Block structure pointed to by
and the buffer that the
.Fa iocb->aio_buf
member of that structure references must remain valid until the
operation has completed. For this reason, use of auto (stack) variables
operation has completed.
For this reason, use of auto (stack) variables
for these objects is discouraged.
.Pp
The asynchronous I/O control buffer
@ -124,7 +127,8 @@ system call is not supported.
.Pp
The following conditions may be synchronously detected when the
.Fn aio_write
system call is made, or asynchronously, at any time thereafter. If they
system call is made, or asynchronously, at any time thereafter.
If they
are detected at call time,
.Fn aio_write
returns -1 and sets

View File

@ -132,7 +132,8 @@ then the owner of any new files and sub-directories
created within this directory are set
to be the same as the owner of that directory.
If this function is enabled, new directories will inherit
the bit from their parents. Execute bits are removed from
the bit from their parents.
Execute bits are removed from
the file, and it will not be given to root.
This behavior does not change the
requirements for the user to be allowed to write the file, but only the eventual

View File

@ -97,7 +97,8 @@ Any other value for
.Ql kern.chroot_allow_open_directories
will bypass the check for open directories
.Pp
Upon successful completion, a value of 0 is returned. Otherwise,
Upon successful completion, a value of 0 is returned.
Otherwise,
a value of -1 is returned and
.Va errno
is set to indicate an error.

View File

@ -95,7 +95,8 @@ system call even when the system is secure.
.Pp
The resolution (granularity) of a clock is returned by the
.Fn clock_getres
system call. This value is placed in a (non-NULL)
system call.
This value is placed in a (non-NULL)
.Fa *tp .
.Sh RETURN VALUES
.Rv -std

View File

@ -83,7 +83,8 @@ all descriptors for the new child process reference the same
objects as they did in the parent before the fork.
If a new process is then to be run using
.Xr execve 2 ,
the process would normally inherit these descriptors. Most
the process would normally inherit these descriptors.
Most
of the descriptors can be rearranged with
.Xr dup2 2
or deleted with

View File

@ -59,7 +59,8 @@ the calling process
The argument
.Fa oldd
is a small non-negative integer index in
the per-process descriptor table. The value must be less
the per-process descriptor table.
The value must be less
than the size of the table, which is returned by
.Xr getdtablesize 2 .
The new descriptor returned by the call
@ -96,7 +97,8 @@ In
.Fn dup2 ,
the value of the new descriptor
.Fa newd
is specified. If this descriptor is already in use and
is specified.
If this descriptor is already in use and
.Fa oldd
\*(Ne
.Fa newd ,

View File

@ -58,7 +58,8 @@ This file is either an executable object file,
or a file of data for an interpreter.
An executable object file consists of an identifying header,
followed by pages of data representing the initial program (text)
and initialized data pages. Additional pages may be specified
and initialized data pages.
Additional pages may be specified
by the header to be initialized with zero data; see
.Xr elf 5
and
@ -87,7 +88,8 @@ and the name of the originally
file becomes the second argument;
otherwise, the name of the originally
.Sy execve Ap d
file becomes the first argument. The original arguments are shifted over to
file becomes the first argument.
The original arguments are shifted over to
become the subsequent arguments.
The zeroth argument is set to the specified
.Em interpreter .
@ -97,7 +99,8 @@ The argument
is a pointer to a null-terminated array of
character pointers to null-terminated character strings.
These strings construct the argument list to be made available to the new
process. At least one argument must be present in
process.
At least one argument must be present in
the array; by custom, the first element should be
the name of the executed program (for example, the last component of
.Fa path ) .
@ -159,7 +162,8 @@ These values may be used in changing the effective IDs later (see
.Pp
The set-ID bits are not honored if the respective file system has the
.Cm nosuid
option enabled or if the new process file is an interpreter file. Syscall
option enabled or if the new process file is an interpreter file.
Syscall
tracing is disabled if effective IDs are changed.
.Pp
The new process also inherits the following attributes from

View File

@ -52,7 +52,8 @@ The argument
.Fa fd
is a descriptor to be operated on by
.Fa cmd
as described below. Depending on the value of
as described below.
Depending on the value of
.Fa cmd ,
.Fn fcntl
can take an additional third argument
@ -157,8 +158,10 @@ corresponds to the
flag of
.Xr open 2 .
.It Dv O_DIRECT
Minimize or eliminate the cache effects of reading and writing. The system
will attempt to avoid caching the data you read or write. If it cannot
Minimize or eliminate the cache effects of reading and writing.
The system
will attempt to avoid caching the data you read or write.
If it cannot
avoid caching the data, it will minimize the impact the data has on the cache.
Use of this flag can drastically reduce performance if not used with care.
.It Dv O_ASYNC

View File

@ -93,7 +93,8 @@ after other processes have gained and released the lock).
.Pp
Requesting a lock on an object that is already locked
normally causes the caller to be blocked until the lock may be
acquired. If
acquired.
If
.Dv LOCK_NB
is included in
.Fa operation ,
@ -102,13 +103,15 @@ the error
.Er EWOULDBLOCK
will be returned.
.Sh NOTES
Locks are on files, not file descriptors. That is, file descriptors
Locks are on files, not file descriptors.
That is, file descriptors
duplicated through
.Xr dup 2
or
.Xr fork 2
do not result in multiple instances of a lock, but rather multiple
references to a single lock. If a process holding a lock on a file
references to a single lock.
If a process holding a lock on a file
forks and the child explicitly unlocks the file, the parent will
lose its lock.
.Pp

View File

@ -84,7 +84,8 @@ Upon successful completion,
.Fn fork
returns a value
of 0 to the child process and returns the process ID of the child
process to the parent process. Otherwise, a value of -1 is returned
process to the parent process.
Otherwise, a value of -1 is returned
to the parent process, no child process is created, and the global
variable
.Va errno

Some files were not shown because too many files have changed in this diff Show More