From f3d5157564992f1ef9f390b3ce0c7d3706ba0f19 Mon Sep 17 00:00:00 2001
From: Laurent Bercot
Date: Sun, 4 Oct 2020 01:06:16 +0000
Subject: doc: fix URLs
---
doc/libstddjb/djbunix.html | 32 ++++++++++++++++----------------
1 file changed, 16 insertions(+), 16 deletions(-)
(limited to 'doc/libstddjb/djbunix.html')
diff --git a/doc/libstddjb/djbunix.html b/doc/libstddjb/djbunix.html
index 6223bf4..2e99dd0 100644
--- a/doc/libstddjb/djbunix.html
+++ b/doc/libstddjb/djbunix.html
@@ -71,21 +71,21 @@ Returns 0 if it succeeds, or -1 (and sets errno) if it fails.
int pipenb (int *p)
Like
-pipe(),
+pipe(),
but both ends of the created pipe are in non-blocking mode.
int pipecoe (int *p)
Like
-pipe(),
+pipe(),
but both ends of the created pipe are close-on-exec.
int pipenbcoe (int *p)
Like
-pipe(),
+pipe(),
but both ends of the created pipe are in non-blocking mode and close-on-exec.
@@ -123,32 +123,32 @@ Returns 0 if it succeeds, or -1 (and sets errno) if it fails.
void fd_close (int fd)
Closes fd.
This is a safe wrapper around
-close().
+close().
int fd_chmod (int fd, unsigned int mode)
Safe wrapper around
-fchmod().
+fchmod().
int fd_chown (int fd, uid_t uid, gid_t gid)
Safe wrapper around
-fchown().
+fchown().
This function requires root privileges.
int fd_sync (int fd)
Safe wrapper around
-fsync().
+fsync().
int fd_chdir (int fd)
Safe wrapper around
-fchdir().
+fchdir().
@@ -165,7 +165,7 @@ supported:
@@ -236,14 +236,14 @@ modifying errno.
int open2 (char const *file, unsigned int flags)
Safe wrapper around
-open()
+open()
when it takes 2 arguments.
int open3 (char const *file, unsigned int flags)
Safe wrapper around
-open()
+open()
when it takes 3 arguments.
@@ -264,7 +264,7 @@ Returns a valid fd number if it succeeds, or -1 (and sets errno) if it fails.
Opens file in read-only, blocking mode.
Returns a valid fd number if it succeeds, or -1 (and sets errno) if it fails.
This call does not block. The
-open()
+open()
system call is actually performed with the O_NONBLOCK option, and blocking mode
is set afterwards; this behaviour allows for more transparent interactions
with FIFOs.
@@ -336,8 +336,8 @@ The function returns if it fails, and sets errno appropriately.
pathexec_run() is the standard skalibs API to perform an
exec call with a path search. It is recommended that you use
it instead of the Single Unix
-execvp() or
-execlp()
+execvp() or
+execlp()
functions, because execvp and execlp default to execution of
the /bin/sh interpreter with file as an argument if they
cannot find a suitable executable file, and this is:
@@ -439,7 +439,7 @@ and the grandchild's PID if the current process is the parent.
pid_t child_spawn0 (char const *file, char const *const *argv, char const *const *envp)
Forks and executes a child as with pathexec_run(file, argv, envp).
Returns 0 if it fails, and the pid of the child if it succeeds.
-Implemented via posix_spawn()
+Implemented via posix_spawn()
on systems that support it.
@@ -522,7 +522,7 @@ or -1 (and sets errno) if it fails.
pid_t waitpid_nointr (pid_t pid, int *wstat, int flags)
Safe wrapper around
-waitpid().
+waitpid().
--
cgit v1.2.3