/glibc-2.36/manual/ |
D | probes.texi | 12 regard to them is that, if we find a need to remove or modify the 29 This probe is triggered after the main arena is extended by calling 30 @code{sbrk}. Argument @var{$arg1} is the additional size requested to 31 @code{sbrk}, and @var{$arg2} is the pointer that marks the end of the 36 This probe is triggered after the size of the main arena is decreased by 37 calling @code{sbrk}. Argument @var{$arg1} is the size released by 39 to @code{sbrk}), and @var{$arg2} is the pointer that marks the end of 44 This probe is triggered after a new heap is @code{mmap}ed. Argument 45 @var{$arg1} is a pointer to the base of the memory area, where the 46 @code{heap_info} data structure is held, and @var{$arg2} is the size of [all …]
|
D | ctype.texi | 6 character---is it alphabetic, is it a digit, is it whitespace, and so 42 For example, @code{isalpha} is the function to test for an alphabetic 44 nonzero integer if the character is alphabetic, and zero otherwise. You 49 printf ("The character `%c' is alphabetic.\n", c); 53 particular class of characters; each has a name starting with @samp{is}. 54 Each of them takes one argument, which is a character to test, and 55 returns an @code{int} which is treated as a boolean value. The 56 character argument is passed as an @code{int}, and it may be the 69 @c The is* macros call __ctype_b_loc to get the ctype array from the 74 @c locale data, is undeletable, so there's no thread-safety issue. We [all …]
|
D | sysinfo.texi | 27 program is running. First, let's review the various ways computer systems 28 are named, which is a little complicated because of the history of the 38 (DNS). In the DNS, every host name is composed of two parts: 51 You will note that ``hostname'' looks a lot like ``host name'', but is 55 In the DNS, the full host name is properly called the FQDN (Fully Qualified 60 its FQDN (which is its host name) is @samp{chicken.ai.mit.edu}. 63 Adding to the confusion, though, is that the DNS is not the only name space 64 in which a computer needs to be known. Another name space is the 65 NIS (aka YP) name space. For NIS purposes, there is another domain 66 name, which is called the NIS domain name or the YP domain name. It [all …]
|
D | search.texi | 33 Comparison}) does: negative if the first argument is ``less'' than the 35 is ``greater''. 37 Here is an example of a comparison function which works with an array of 52 comparison functions. This type is a GNU extension. 78 by @var{compar} is used to decide whether two elements match. 80 The return value is a pointer to the matching element in the array 81 starting at @var{base} if it is found. If no matching element is 82 available @code{NULL} is returned. 84 The mean runtime of this function is @code{*@var{nmemb}}/2. This 96 @c prevailing, and another uninitialized element), but this is just a [all …]
|
D | charset.texi | 41 A distinction we have to make right away is between internal and 44 External representations are used when text is stored or transmitted 54 One of the problems to overcome with the internal representation is 55 handling text that is externally encoded using different character 81 16-bit space is already in progress. A number of encodings have been 87 UCS-2 is a 16-bit word that can only represent characters 88 from the BMP, UCS-4 is a 32-bit word than can represent any Unicode 89 and @w{ISO 10646} character, UTF-8 is an ASCII compatible encoding where 91 by sequences of 2-6 non-ASCII bytes, and finally UTF-16 is an extension 95 To represent wide characters the @code{char} type is not suitable. For [all …]
|
D | terminal.texi | 13 descriptor is and how to open a file descriptor for a terminal device. 16 * Is It a Terminal:: How to determine if a file is a terminal 17 device, and what its name is. 38 descriptor is associated with a terminal by using the @code{isatty} 50 This function returns @code{1} if @var{filedes} is a file descriptor 54 If a file descriptor is associated with a terminal, you can get its 74 If the file descriptor @var{filedes} is associated with a terminal 77 the terminal file. The value is a null pointer if the file descriptor 95 The @code{ttyname_r} function is similar to the @code{ttyname} function 99 The normal return value from @code{ttyname_r} is @math{0}. Otherwise an [all …]
|
D | llio.texi | 11 Stream-level I/O is more flexible and usually more convenient; 78 declared in the header file @file{fcntl.h}, while @code{close} is 88 indicator for the file is at the beginning of the file. The argument 89 @var{mode} (@pxref{Permission Bits}) is used only when a file is 92 The @var{flags} argument controls how the file is to be opened. This is 97 The normal return value from @code{open} is a non-negative integer file 98 descriptor. In the case of an error, a value of @math{-1} is returned 105 The file exists but is not readable/writable as requested by the @var{flags} 106 argument, or the file does not exist and the directory is unwritable so 118 The @var{flags} argument specified write access, and the file is a directory. [all …]
|
D | stdio.texi | 11 Overview}, a stream is a fairly abstract, high-level concept 47 a stream is called @code{FILE} rather than ``stream''. Since most of 49 the term @dfn{file pointer} is also used to mean ``stream''. This leads 51 manual, however, is careful to use the terms ``file'' and ``stream'' 56 The @code{FILE} type is declared in the header file @file{stdio.h}. 60 This is the data type used to represent stream objects. A @code{FILE} 71 deal only with pointers to these objects (that is, @code{FILE *} values) 80 When the @code{main} function of your program is invoked, it already has 90 The @dfn{standard input} stream, which is the normal source of input for the 97 The @dfn{standard output} stream, which is used for normal output from [all …]
|
D | filesys.texi | 16 * Working Directory:: This is used to resolve relative 39 working directory} or simply @dfn{working directory}, that is used in 42 When you log in and begin a new session, your working directory is 61 @c If buffer is NULL, this function calls malloc and realloc, and, in 63 @c GNU/Linux systems, but it may fail if the pathname is too long. As a 66 @c directory stream with malloc. If a fstatat64 syscall is not 73 @c malloc/realloc/free if buffer is NULL, or if dir is too deep 81 @var{buffer} that you provide. The @var{size} argument is how you tell 87 (@pxref{Unconstrained Allocation}). If the @var{size} is greater than 88 zero, then the buffer is that large; otherwise, the buffer is as large [all …]
|
D | message.texi | 6 task. One way to ease the user's task is to use messages in whatever 11 choose among the variants every time a message has to be printed. This is 12 certainly not a good solution since extending the set of languages is 16 A better solution is to keep the message sets for each language 21 message translation. The problem is that neither of the interfaces is 23 functions is defined in the X/Open standard but this is derived from 59 identifier is used. 64 message catalogs is always the same. 68 to find whatever catalog the user wants. This is separated from what 114 @var{cat_name} and loads it when found. The return value is of an [all …]
|
D | resource.texi | 44 The return value of @code{getrusage} is zero for success, and @code{-1} 49 The argument @var{processes} is not valid. 53 One way of getting resource usage for a particular child process is with 70 The maximum resident set size used, in kilobytes. That is, the maximum 80 An integral value expressed the same way, which is the amount of 84 An integral value expressed the same way, which is the amount of 141 The current limit is the value the system will not allow usage to 142 exceed. It is also called the ``soft limit'' because the process being 148 The maximum limit is the maximum value to which a process is allowed to 149 set its current limit. It is also called the ``hard limit'' because [all …]
|
D | nss.texi | 15 @Theglibc{} contains a cleaner solution to this problem. It is 20 Though the interface might be similar to Sun's version there is no 22 so the internal interface is incompatible. This also manifests in the 27 * NSS Basics:: What is this NSS good for. 36 The basic idea is to put the implementation of the different services 46 The C library image is smaller. 50 below. For getting the implementation of a new service right it is 118 this reason there is the file @file{/etc/nsswitch.conf}. For each 126 The first column is the database as you can guess from the table above. 163 this service is implemented in a module called @file{libnss_@var{name}}. [all …]
|
D | startup.texi | 26 Writing the program is what this manual is all about. This chapter 30 system, and telling the system the program is done. 56 is up to you to write a function named @code{main}---otherwise, you 72 program can look at its command line arguments is via the arguments of 76 The value of the @var{argc} argument is the number of command line 77 arguments. The @var{argv} argument is a vector of C strings; its 79 name of the program being run is also included in the vector as the 82 is this null pointer. 84 For the command @samp{cat foo bar}, @var{argc} is 3 and @var{argv} has 94 @var{envp} gives the program's environment; it is the same as the value [all …]
|
D | tunables.texi | 10 modified in different ways. The current default method to do this is via 25 It is possible to implement multiple `frontends' for the tunables allowing 87 A tunable name is split into three components, a top namespace, a tunable 89 @theglibc{} is @code{glibc}. Distributions that choose to add custom tunables 93 The tunable namespace is a logical grouping of tunables in a single 97 The tunable name is the actual name of the tunable. It is possible that 115 This tunable supersedes the @env{MALLOC_CHECK_} environment variable and is 121 efficient) memory allocator for the @code{malloc} family of functions that is 131 is disabled by default for SUID and SGID binaries. This can be enabled again 137 This tunable supersedes the @env{MALLOC_TOP_PAD_} environment variable and is [all …]
|
D | time.texi | 6 including functions for determining what time it is and conversion 27 use the simple word ``time'' for is to talk about the abstract concept. 29 A @dfn{calendar time} is a point in the time continuum, for example 30 November 4, 1990, at 18:02.5 UTC. Sometimes this is called ``absolute 34 We don't speak of a ``date'', because that is inherent in a calendar 38 An @dfn{interval} is a contiguous part of the time continuum between two 43 An @dfn{elapsed time} is the length of an interval, for example, 35 49 An @dfn{amount of time} is a sum of elapsed times, which need not be of 52 sittings it is read. 54 A @dfn{period} is the elapsed time of an interval between two events, [all …]
|
D | string.texi | 49 This section is a quick summary of string concepts for beginning C 55 A @dfn{string} is a null-terminated array of bytes of type @code{char}, 69 A @dfn{multibyte character} is a sequence of one or more bytes that 72 string} is a string that consists entirely of multibyte 73 characters. In contrast, a @dfn{wide string} is a null-terminated 74 sequence of @code{wchar_t} objects. A wide-string variable is usually 87 A null byte is quite different conceptually from a null pointer, 93 initial double-quote character is immediately preceded by a capital 94 @samp{L} (ell) character (as in @code{L"foo"}), it is a wide string 96 concatenation}: @code{"a" "b"} is the same as @code{"ab"}. [all …]
|
D | signal.texi | 6 A @dfn{signal} is a software interrupt delivered to a process. The 31 particular signal is delivered. 48 happens after a signal is delivered, and how programs can handle 73 terminate it with @kbd{C-c}. Whatever key sequence is used, the 110 fact, most do not. For example, opening a nonexistent file is an error, 123 @code{kill} whose purpose is specifically to generate a signal. 126 synchronous signal pertains to a specific action in the program, and is 139 A given type of signal is either typically synchronous or typically 151 When a signal is generated, it becomes @dfn{pending}. Normally it 152 remains pending for just a short period of time and then is [all …]
|
D | locale.texi | 80 is to use @code{strcoll} or @code{strxfrm} to compare strings. 85 output in the user's favorite language is to program this more or less 96 The simplest way for the user to choose a locale is to set the 116 currency formatting. This might make sense if the user is a 132 independently. Here is a table of categories; each name is both an 175 This is not a category; it is only a macro that you can use 182 If this environment variable is defined, its value specifies the locale 188 functionality provided by the variables above is not sufficient. For 192 to specify that the first choice of language is Swedish, the second 193 German, and if this also fails to use English. This is [all …]
|
D | creature.texi | 6 is controlled by which @dfn{feature test macros} you define. 17 is best to make them the very first thing in the file, preceded only by 26 is not mere pedantry --- it has been a problem in practice. For instance, 32 standard. It is insufficient for this purpose, as it will not protect you 39 standard (IEEE Standard 1003.1) is available, as well as all of the 42 The state of @code{_POSIX_SOURCE} is irrelevant if you define the 49 functionality is made available. The greater the value of this macro, 50 the more functionality is made available. 54 (IEEE Standard 1003.1-1990) is made available. 58 (IEEE Standard 1003.2-1992) is made available. [all …]
|
D | process.texi | 28 need more control over the details of how this is done, you can use the 49 The easy way to run another program is to use the @code{system} 95 programs to execute. The return value is @code{-1} if it wasn't 96 possible to create the shell process, and otherwise is the status of the 100 If the @var{command} argument is a null pointer, a return value of zero 101 indicates that no command processor is available. 103 This function is a cancellation point in multi-threaded programs. This 104 is a problem if the thread allocates some resources (like memory, file 105 descriptors, semaphores or whatever) at the time @code{system} is 112 The @code{system} function is declared in the header file [all …]
|
D | lang.texi | 40 Once you think your program is debugged, you can disable the error 45 But disabling these consistency checks is undesirable unless they make 47 checking is good no matter who is running the program. A wise user 55 Verify the programmer's belief that @var{expression} is nonzero at 58 If @code{NDEBUG} is not defined, @code{assert} tests the value of 59 @var{expression}. If it is false (zero), @code{assert} aborts the 72 the function which calls @code{assert} is taken from the built-in 76 If the preprocessor macro @code{NDEBUG} is defined before 77 @file{assert.h} is included, the @code{assert} macro is defined to do 80 @strong{Warning:} Even the argument expression @var{expression} is not [all …]
|
/glibc-2.36/misc/bits/ |
D | stab.def | 3 This file is part of the GNU C Library. 5 The GNU C Library is free software; you can redistribute it and/or 10 The GNU C Library is distributed in the hope that it will be useful, 21 /* Global variable. Only the name is significant. 25 /* Function name for BSD Fortran. Only the name is significant. 29 /* Function name or text-segment variable for C. Value is its address. 30 Desc is supposedly starting line number, but GCC doesn't set it 34 /* Data-segment variable with internal linkage. Value is its address. 38 /* BSS-segment variable with internal linkage. Value is its address. */ 41 /* Name of main routine. Only the name is significant. [all …]
|
/glibc-2.36/elf/ |
D | rtld-debugger-interface.txt | 5 to interface with it. This structure, r_debug, is defined in link.h. 20 is not currently being modified and may safely be inspected. RT_ADD 21 means that an object is being added to r_map, and that the list is 23 object is being removed from the list. 26 The address of a function internal to the run-time linker which is 27 called whenever r_state is changed. The debugger should set a 30 This protocol is widely supported, but somewhat limited in that it 33 debugger is notified that a new object has been added, for instance, 34 but there is no way for the debugger to discover whether any of the 41 The r_debug_extended structure is an extension of the r_debug interface. [all …]
|
/glibc-2.36/mach/ |
D | err_kern.sub | 7 * documentation is hereby granted, provided that both the copyright 84 "(os/device) device is shut down", 100 "(os/unix) argument list is too long", 113 "(os/unix) object is not a directory", 114 "(os/unix) object is a directory", 118 "(os/unix) object is not a tty-like device", 119 "(os/unix) executable object is in use", 120 "(os/unix) file is too large", 121 "(os/unix) no space is left on device", 126 "(os/unix) argument is too large", [all …]
|
/glibc-2.36/iconvdata/testdata/ |
D | suntzus | 13 [This is the basic text of Sun Tzu on the Art of War. It was 17 This is being released only as an adjunct to that work, which 26 1. Sun Tzu said: The art of war is of vital importance 29 2. It is a matter of life and death, a road either 30 to safety or to ruin. Hence it is a subject of inquiry 33 3. The art of war, then, is governed by five constant 68 13. (1) Which of the two sovereigns is imbued 73 (4) On which side is discipline most rigorously enforced? 74 (5) Which army is stronger? 76 (7) In which army is there the greater constancy [all …]
|