From f3d5157564992f1ef9f390b3ce0c7d3706ba0f19 Mon Sep 17 00:00:00 2001 From: Laurent Bercot Date: Sun, 4 Oct 2020 01:06:16 +0000 Subject: doc: fix URLs --- doc/libstddjb/djbunix.html | 32 ++++++++++++++++---------------- 1 file changed, 16 insertions(+), 16 deletions(-) (limited to 'doc/libstddjb/djbunix.html') diff --git a/doc/libstddjb/djbunix.html b/doc/libstddjb/djbunix.html index 6223bf4..2e99dd0 100644 --- a/doc/libstddjb/djbunix.html +++ b/doc/libstddjb/djbunix.html @@ -71,21 +71,21 @@ Returns 0 if it succeeds, or -1 (and sets errno) if it fails.

int pipenb (int *p)
Like -pipe(), +pipe(), but both ends of the created pipe are in non-blocking mode.

int pipecoe (int *p)
Like -pipe(), +pipe(), but both ends of the created pipe are close-on-exec.

int pipenbcoe (int *p)
Like -pipe(), +pipe(), but both ends of the created pipe are in non-blocking mode and close-on-exec.

@@ -123,32 +123,32 @@ Returns 0 if it succeeds, or -1 (and sets errno) if it fails. void fd_close (int fd)
Closes fd. This is a safe wrapper around -close(). +close().

int fd_chmod (int fd, unsigned int mode)
Safe wrapper around -fchmod(). +fchmod().

int fd_chown (int fd, uid_t uid, gid_t gid)
Safe wrapper around -fchown(). +fchown(). This function requires root privileges.

int fd_sync (int fd)
Safe wrapper around -fsync(). +fsync().

int fd_chdir (int fd)
Safe wrapper around -fchdir(). +fchdir().

@@ -165,7 +165,7 @@ supported:

@@ -236,14 +236,14 @@ modifying errno.

int open2 (char const *file, unsigned int flags)
Safe wrapper around -open() +open() when it takes 2 arguments.

int open3 (char const *file, unsigned int flags)
Safe wrapper around -open() +open() when it takes 3 arguments.

@@ -264,7 +264,7 @@ Returns a valid fd number if it succeeds, or -1 (and sets errno) if it fails. Opens file in read-only, blocking mode. Returns a valid fd number if it succeeds, or -1 (and sets errno) if it fails. This call does not block. The -open() +open() system call is actually performed with the O_NONBLOCK option, and blocking mode is set afterwards; this behaviour allows for more transparent interactions with FIFOs. @@ -336,8 +336,8 @@ The function returns if it fails, and sets errno appropriately. pathexec_run() is the standard skalibs API to perform an exec call with a path search. It is recommended that you use it instead of the Single Unix -execvp() or -execlp() +execvp() or +execlp() functions, because execvp and execlp default to execution of the /bin/sh interpreter with file as an argument if they cannot find a suitable executable file, and this is: @@ -439,7 +439,7 @@ and the grandchild's PID if the current process is the parent. pid_t child_spawn0 (char const *file, char const *const *argv, char const *const *envp)
Forks and executes a child as with pathexec_run(file, argv, envp). Returns 0 if it fails, and the pid of the child if it succeeds. -Implemented via posix_spawn() +Implemented via posix_spawn() on systems that support it.

@@ -522,7 +522,7 @@ or -1 (and sets errno) if it fails.

pid_t waitpid_nointr (pid_t pid, int *wstat, int flags)
Safe wrapper around -waitpid(). +waitpid().

-- cgit v1.2.3