Remove superfluous paragraph macros.
Remove request ".br" if it precedes a line, that begins with a
space, as such lines automatically cause a break.
There is no change in the output from "nroff" and "groff".
###
Examples of warnings from "mandoc -Tlint":
mandoc: bindresvport.3:41:2: WARNING: skipping paragraph macro: PP after SH
mandoc: crypt.3:228:2: WARNING: skipping paragraph macro: PP empty
mandoc: dlinfo.3:151:2: WARNING: skipping paragraph macro: IP empty
mandoc: exec.3:86:2: WARNING: skipping paragraph macro: PP after SS
mandoc: getsubopt.3:45:2: WARNING: skipping paragraph macro: br before text line with leading blank
Signed-off-by: Bjarni Ingi Gislason <bjarniig@rhi.hi.is>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
.B __setfpucw(0x1372)
.PP
Set FPU control word on the i386 architecture to
-.br
\- extended precision
-.br
\- rounding to nearest
-.br
\- exceptions on overflow, zero divide and NaN
.SH SEE ALSO
.BR feclearexcept (3)
.BI "int bindresvport(int " sockfd ", struct sockaddr_in *" sin );
.fi
.SH DESCRIPTION
-.PP
.BR bindresvport ()
is used to bind the socket referred to by the
file descriptor
The return string is
always terminated with a null byte (\(aq\e0\(aq).
.SH RETURN VALUE
-.PP
On success,
.BR catgets ()
returns a pointer to an internal buffer area
.RS
.PP
$\fIid\fP$\fIsalt\fP$\fIencrypted\fP
-.PP
.RE
+.PP
.I id
identifies the encryption method used instead of DES and this
then determines how the rest of the password string is interpreted.
.RS
.PP
$\fIid\fP$\fIrounds=yyy\fP$\fIsalt\fP$\fIencrypted\fP
-.PP
.RE
+.PP
where \fIyyy\fP is the number of hashing rounds actually used.
The number of rounds actually used is 1000 if
.I xxx
6: [0x7f55718afba0; memsz: 460] flags: 0x4; PT_GNU_RELRO
.EE
.in
-.PP
.SS Program source
\&
.EX
Use a
.B RTLD_DI_SERINFO
to obtain the library search paths.
-.IP
.RE
.IP
The
from
.IR <dlfcn.h> .
.PP
-.PP
The function
.BR dlvsym ()
does the same as
EACCES 13 Permission denied
.EE
.in
-.PP
+.\".PP
.\" POSIX.1 (2001 edition) lists the following symbolic error names. Of
.\" these, \fBEDOM\fP and \fBERANGE\fP are in the ISO C standard. ISO C
.\" Amendment 1 defines the additional error number \fBEILSEQ\fP for
The functions can be grouped based on the letters following the "exec" prefix.
.\"
.SS l - execl(), execlp(), execle()
-.PP
The
.I "const char\ *arg"
and subsequent ellipses can be thought of as
command-line arguments of the executed program as a vector.
.\"
.SS v - execv(), execvp(), execvpe()
-.PP
The
.I "char\ *const argv[]"
argument is an array of pointers to null-terminated strings that
.I must
be terminated by a null pointer.
.SS e - execle(), execvpe()
-.PP
The environment of the caller is specified via the argument
.IR envp .
The
.I environ
in the calling process.
.SS p - execlp(), execvp(), execvpe()
-.PP
These functions duplicate the actions of the shell in
searching for an executable file
if the specified filename does not contain a slash (/) character.
.SH CONFORMING TO
POSIX.1-2001, POSIX.1-2008, C89, C99, SVr4, 4.3BSD.
.SH NOTES
-.PP
The behavior is undefined if one of the functions registered using
.BR atexit (3)
and
An overflow floating-point exception
.RB ( FE_OVERFLOW )
is raised.
-.PP
.SH VERSIONS
These functions first appeared in glibc in version 2.1.
.SH ATTRIBUTES
TO FIX: See mount(8).
.EE
.in
-.PP
.SH SEE ALSO
.BR addseverity (3),
.BR perror (3)
.BR clock_gettime (2)
gives nanoseconds but is not as widely available.
.SH BUGS
-.PP
Early glibc2 is buggy and returns 0 in the
.I millitm
field;
for the dynamically allocated linked list
.IR res .
.SS Extensions to getaddrinfo() for Internationalized Domain Names
-.PP
Starting with glibc 2.3.4,
.BR getaddrinfo ()
has been extended to selectively allow the incoming and outgoing
even when the number of groups exceeds
.IR *ngroups .
.SH EXAMPLES
-.PP
The program below displays the group list for the user named in its
first command-line argument.
The second command-line argument specifies the
.IR /etc/host.conf
.RB ( host.conf (5)).
.PP
-.PP
The \fIhostent\fP structure is defined in \fI<netdb.h>\fP as follows:
.PP
.in +4n
.in
.PP
.ad l
-.br
.BR gethostid ():
.RS 4
_BSD_SOURCE || _XOPEN_SOURCE\ >=\ 500
(When not set, this will still happen in case the service's name
cannot be determined.)
.SS Extensions to getnameinfo() for Internationalized Domain Names
-.PP
Starting with glibc 2.3.4,
.BR getnameinfo ()
has been extended to selectively allow
.\" are transmitted as part of the password.
.\" Since libc 5.4.19 also line editing is disabled, so that also
.\" backspace and the like will be seen as part of the password.
-.PP
+.
In the GNU C library implementation, if
.I /dev/tty
cannot be opened, the prompt is written to
.BI "void endrpcent(void);"
.fi
.SH DESCRIPTION
-.PP
The
.BR getrpcent (),
.BR getrpcbyname (),
.PD 0
_XOPEN_SOURCE\ >= 500
.\" || _XOPEN_SOURCE\ &&\ _XOPEN_SOURCE_EXTENDED
-.br
|| /* Since glibc 2.12: */ _POSIX_C_SOURCE\ >=\ 200809L
.PD
.RE
.SH CONFORMING TO
POSIX.1-2001, POSIX.1-2008.
.SH NOTES
-.PP
Since
.BR getsubopt ()
overwrites any commas it finds in the string
.I errno
to indicate the cause of the error.
.SH ERRORS
-.PP
.BR hcreate_r ()
and
.BR hdestroy_r ()
.PP
Individual hash table entries can be added, but not deleted.
.SH EXAMPLES
-.PP
The following program inserts 24 items into a hash table, then prints
some of them.
.PP
is set to
.BR EDOM
(but see BUGS).
-.IP
.TP
Domain error: \fIx\fP is an infinity
An invalid floating-point exception
.BR makecontext (),
to permit this on some 64-bit architectures (e.g., x86-64).
.SH EXAMPLES
-.PP
The example program below demonstrates the use of
.BR getcontext (3),
.BR makecontext (),
_GNU_SOURCE
.ad
.SH DESCRIPTION
-.PP
The
.BR malloc ()
function allocates
.SH CONFORMING TO
POSIX.1-2001, POSIX.1-2008, C89, C99, SVr4, 4.3BSD.
.SH NOTES
-.PP
Do not use
.BR memcmp ()
to compare security critical data, such as cryptographic secrets,
the maximum size of messages that the queue will allow.
This structure is defined as follows:
.PP
-.PP
.in +4n
.EX
struct mq_attr {
};
.EE
.in
-.IP
.TP
.I maxerror
Maximum error, in microseconds.
.BR posix_spawnp ()
functions are available since glibc 2.2.
.SH CONFORMING TO
-.PP
POSIX.1-2001, POSIX.1-2008.
.\" FIXME . This piece belongs in spawnattr_setflags(3)
.\" The
in the corresponding phase of
.BR fork (2)
processing.
-.PP
.SH RETURN VALUE
On success,
.BR pthread_atfork ()
Inherit scheduler: INHERIT
.EE
.in
-.PP
.SS Program source
\&
.EX
These GNU-specific APIs, which first appeared in glibc 2.4,
are nowadays obsolete and should not be used in new programs.
.SH EXAMPLES
-.PP
The program below demonstrates the use of the robustness attribute of a
mutex attributes object.
In this program, a thread holding the mutex
.BR pthread_getname_np ()
retrieves it from the same location.
.SH EXAMPLES
-.PP
The program below demonstrates the use of
.BR pthread_setname_np ()
and
.BR rshd (8)
server (among others).
.SS rcmd()
-.PP
The
.BR rcmd ()
function
The protocol is described in detail in
.BR rshd (8).
.SS rresvport()
-.PP
The
.BR rresvport ()
function is used to obtain a socket with a privileged
on (successful) return, it contains the port number that was bound to.
.\"
.SS iruserok() and ruserok()
-.PP
The
.BR iruserok ()
and
.in
.PP
(But see the BUGS section.)
-.PP
+.\".PP
.\" 2012-05-05, According to Casper Dik, the statement about
.\" Solaris was not true at least as far back as 1997, and
.\" may never have been true.
.SH CONFORMING TO
POSIX.1-2001, POSIX.1-2008.
.SH EXAMPLES
-.PP
The (somewhat trivial) program shown below operates on an
unnamed semaphore.
The program expects two command-line arguments.
.\" On 4.2BSD and 4.3BSD systems,
.\" .BR setbuf ()
.\" always uses a suboptimal buffer size and should be avoided.
-.PP
+.\".PP
You must make sure that the space that
.I buf
points to still exists by the time
If the programmer mistakenly passes the value 0 in
.IR val ,
the "fake" return will instead return 1.
-.PP
.SS sigsetjmp() and siglongjmp()
.BR sigsetjmp ()
and
.BR siglongjmp ()
T} Thread safety MT-Safe
.TE
-.PP
.SH CONFORMING TO
.BR setjmp (),
.BR longjmp ():
or, if the object is visible in the filesystem,
the group ID of the parent directory.
.SH NOTES
-.PP
POSIX leaves the behavior of the combination of
.B O_RDONLY
and
};
.EE
.in
-.PP
.\"
.SS Program source: pshm_ucase_bounce.c
-.PP
The "bounce" program creates a new shared memory object with the name
given in its command-line argument and sizes the object to
match the size of the
}
.EE
.in
-.PP
.\"
.SS Program source: pshm_ucase_send.c
-.PP
The "send" program takes two command-line arguments:
the pathname of a shared memory object previously created by the "bounce"
program and a string that is to be copied into that object.
}
.EE
.in
-.PP
.SH SEE ALSO
.BR close (2),
.BR fchmod (2),
.SH CONFORMING TO
POSIX.1-2001, POSIX.1-2008, SUSv2.
.SH NOTES
-.PP
In principle, this function does not initialize
.I tm
but
where a shell could not be executed in the child process.
.\"
.SS Caveats
-.PP
Do not use
.BR system ()
from a privileged program
The termios functions describe a general terminal interface that is
provided to control asynchronous communications ports.
.SS The termios structure
-.PP
Many of the functions described here have a \fItermios_p\fP argument
that is a pointer to a \fItermios\fP structure.
This structure contains at least the following members:
see the description of
noncanonical mode below.
.SS Retrieving and changing terminal settings
-.PP
.BR tcgetattr ()
gets the parameters associated with the object referred by \fIfd\fP and
stores them in the \fItermios\fP structure referenced by
set to
.BR EAGAIN .
.SS Raw mode
-.PP
.BR cfmakeraw ()
sets the terminal to something like the
"raw" mode of the old Version 7 terminal driver:
.in
.\"
.SS Line control
-.PP
.BR tcsendbreak ()
transmits a continuous stream of zero-valued bits for a specific
duration, if the terminal is using asynchronous serial data
.BR cfsetispeed (),
and sets both input and output speed.
.SH RETURN VALUE
-.PP
.BR cfgetispeed ()
returns the input baud rate stored in the
\fItermios\fP
.SH CONFORMING TO
POSIX.1-2001, POSIX.1-2008, SVr4, 4.3BSD.
.SH NOTES
-.PP
4.3BSD had a function
.BI "char *timezone(" zone ", " dst )
that returned the
.B mtk.manpages@gmail.com
for inclusion in the next man page release.
.SS The list
-.PP
.BR authdes_create (3),
.BR authdes_getucred (3),
.BR authdes_pk_create (3),
.SH NAME
xdr \- library routines for external data representation
.SH SYNOPSIS AND DESCRIPTION
-.PP
These routines allow C programmers to describe
arbitrary data structures in a machine-independent fashion.
Data for remote procedure calls are transmitted using these
.RE
.ad b
.SH DESCRIPTION
-.PP
The
.BR y0 ()
and