summary refs log tree commit diff
diff options
context:
space:
mode:
authorUlrich Drepper <drepper@redhat.com>1999-06-16 15:44:59 +0000
committerUlrich Drepper <drepper@redhat.com>1999-06-16 15:44:59 +0000
commitbc938d3de936a8e429b16237180c046139be8247 (patch)
treec827f8afd95d339455d1f551e50eb1425385d8dc
parent2972264e210a742ac9a6d862e3976d93ddc38529 (diff)
downloadglibc-bc938d3de936a8e429b16237180c046139be8247.tar.gz
glibc-bc938d3de936a8e429b16237180c046139be8247.tar.xz
glibc-bc938d3de936a8e429b16237180c046139be8247.zip
Update.
1999-06-16  Ulrich Drepper  <drepper@cygnus.com>

	* manual/errno.texi: Fix typos.
	* manual/memory.texi: Likewise.
	* manual/ctype.texi: Likewise.
	Patches by Brian Youmans <3diff@gnu.org>.
-rw-r--r--ChangeLog7
-rw-r--r--manual/ctype.texi50
-rw-r--r--manual/errno.texi4
-rw-r--r--manual/memory.texi105
4 files changed, 86 insertions, 80 deletions
diff --git a/ChangeLog b/ChangeLog
index 57118116cf..1f191fecc1 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,10 @@
+1999-06-16  Ulrich Drepper  <drepper@cygnus.com>
+
+	* manual/errno.texi: Fix typos.
+	* manual/memory.texi: Likewise.
+	* manual/ctype.texi: Likewise.
+	Patches by Brian Youmans <3diff@gnu.org>.
+
 1999-06-16  Andreas Jaeger  <aj@arthur.rhein-neckar.de>
 
 	* sysdeps/unix/sysv/linux/netax25/ax25.h (AX25_PIDINCL): Added.
diff --git a/manual/ctype.texi b/manual/ctype.texi
index fde864b647..b5ab6bae3d 100644
--- a/manual/ctype.texi
+++ b/manual/ctype.texi
@@ -17,7 +17,7 @@ by the locale currently selected for character classification---the
 
 The @w{ISO C} standard specifies two different sets of functions.  The
 one set works on @code{char} type characters, the other one on
-@code{wchar_t} wide character (@pxref{Extended Char Intro}).
+@code{wchar_t} wide characters (@pxref{Extended Char Intro}).
 
 @menu
 * Classification of Characters::       Testing whether characters are
@@ -266,20 +266,21 @@ with the SVID.
 @section Character class determination for wide characters
 
 The second amendment to @w{ISO C89} defines functions to classify wide
-character.  Although the original @w{ISO C89} standard already defined
-the type @code{wchar_t} but no functions operating on them were defined.
+characters.  The original @w{ISO C89} standard defined the type
+@code{wchar_t} but failed to define any functions to operate on wide
+characters.
 
 The general design of the classification functions for wide characters
-is more general.  It allows to extend the set of available
-classification beyond the set which is always available.  The POSIX
-standard specifies a way how the extension can be done and this is
-already implemented in the GNU C library implementation of the
-@code{localedef} program.
+is more general.  It allows extending the set of available
+classifications beyond the set which is always available.  The POSIX
+standard specifies how the extension can be done and this is already
+implemented in the GNU C library implementation of the @code{localedef}
+program.
 
 The character class functions are normally implemented using bitsets.
 I.e., for the character in question the appropriate bitset is read from
-a table and a test is performed whether a certain bit is set in this
-bitset.  Which bit is tested for is determined by the class.
+a table and a test is performed to determine whether a certain bit is
+set in this bitset.  Which bit is tested for is determined by the class.
 
 For the wide character classification functions this is made visible.
 There is a type representing the classification, a function to retrieve
@@ -338,11 +339,11 @@ by a successful call to @code{wctype}.
 This function is declared in @file{wctype.h}.
 @end deftypefun
 
-The make it easier to use the commonly used classification functions
-they are defined in the C library.  There is no need to use
-@code{wctype} is the property string is one of the known character
+This makes it easier to use the commonly-used classification functions
+that are defined in the C library.  There is no need to use
+@code{wctype} if the property string is one of the known character
 classes.  In some situations it is desirable to construct the property
-string and then it gets important that @code{wctype} can also handle the
+string and then it becomes important that @code{wctype} can also handle the
 standard classes.
 
 @cindex alphanumeric character
@@ -588,7 +589,7 @@ iswctype (wc, wctype ("xdigit"))
 It is declared in @file{wctype.h}.
 @end deftypefun
 
-The GNu C library provides also a function which is not defined in the
+The GNU C library also provides a function which is not defined in the
 @w{ISO C} standard but which is available as a version for single byte
 characters as well.
 
@@ -610,10 +611,9 @@ available as real functions but when the @file{wctype.h} header is
 included the macros will be used.  This is nothing new compared to the
 @code{char} type versions of these functions.
 
-The second notes covers something which is new.  It can be best
-illustrated by a (real-world) example.  The first piece of code is an
-excerpt from the original code.  It is truncated a bit but the intention
-should be clear.
+The second note covers something new.  It can be best illustrated by a
+(real-world) example.  The first piece of code is an excerpt from the
+original code.  It is truncated a bit but the intention should be clear.
 
 @smallexample
 int
@@ -642,7 +642,7 @@ is_in_class (int c, const char *class)
 @}
 @end smallexample
 
-The problem is that it is not guarateed that the wide character
+The problem is that it is not guaranteed that the wide character
 representation of a single-byte character can be found using casting.
 In fact, usually this fails miserably.  The correct solution for this
 problem is to write the code as follows:
@@ -669,9 +669,9 @@ function is probably not the final one.
 @node Wide Character Case Conversion, , Using Wide Char Classes, Character Handling
 @section Mapping of wide characters.
 
-As for the classification functions the @w{ISO C} standard also
+As for the classification functions, the @w{ISO C} standard also
 generalizes the mapping functions.  Instead of only allowing the two
-standard mappings the locale can contain others.  Again, the
+standard mappings, the locale can contain others.  Again, the
 @code{localedef} program already supports generating such locale data
 files.
 
@@ -680,7 +680,7 @@ files.
 @deftp {Data Type} wctrans_t
 This data type is defined as a scalar type which can hold a value
 representing the locale-dependent character mapping.  There is no way to
-construct such a value beside using the return value of the
+construct such a value except using the return value of the
 @code{wctrans} function.
 
 @pindex wctype.h
@@ -715,7 +715,7 @@ This function is declared in @file{wctype.h}.
 @deftypefun wint_t towctrans (wint_t @var{wc}, wctrans_t @var{desc})
 The @code{towctrans} function maps the input character @var{wc}
 according to the rules of the mapping for which @var{desc} is an
-descriptor and returns the so found value.  The @var{desc} value must be
+descriptor and returns the value so found.  The @var{desc} value must be
 obtained by a successful call to @code{wctrans}.
 
 @pindex wctype.h
@@ -765,6 +765,6 @@ This function is declared in @file{wctype.h}.
 @end deftypefun
 
 The same warnings given in the last section for the use of the wide
-character classiffication function applies here.  It is not possible to
+character classification function applies here.  It is not possible to
 simply cast a @code{char} type value to a @code{wint_t} and use it as an
 argument for @code{towctrans} calls.
diff --git a/manual/errno.texi b/manual/errno.texi
index 3782e48c6a..49eb902405 100644
--- a/manual/errno.texi
+++ b/manual/errno.texi
@@ -55,7 +55,7 @@ listed for each function.  These functions do not change @code{errno}
 when they succeed; thus, the value of @code{errno} after a successful
 call is not necessarily zero, and you should not use @code{errno} to
 determine @emph{whether} a call failed.  The proper way to do that is
-documented for each function.  @emph{If} the call the failed, you can
+documented for each function.  @emph{If} the call failed, you can
 examine @code{errno}.
 
 Many library functions can set @code{errno} to a nonzero value as a
@@ -1303,7 +1303,7 @@ exit if any system call fails.  By convention, the error message from
 such a program should start with the program's name, sans directories.
 You can find that name in the variable
 @code{program_invocation_short_name}; the full file name is stored the
-variable @code{program_invocation_name}:
+variable @code{program_invocation_name}.
 
 @comment errno.h
 @comment GNU
diff --git a/manual/memory.texi b/manual/memory.texi
index 958e1d14c5..c957c2f9cf 100644
--- a/manual/memory.texi
+++ b/manual/memory.texi
@@ -446,7 +446,7 @@ more time to minimize the wasted space.
 
 @end ignore
 
-As apposed to other versions, the @code{malloc} in GNU libc does not
+As opposed to other versions, the @code{malloc} in GNU libc does not
 round up block sizes to powers of two, neither for large nor for small
 sizes.  Neighboring chunks can be coalesced on a @code{free} no matter
 what their size is.  This makes the implementation suitable for all
@@ -572,7 +572,7 @@ case.  The function returns @code{-1} if you call it too late, and
 
 The easiest way to arrange to call @code{mcheck} early enough is to use
 the option @samp{-lmcheck} when you link your program; then you don't
-need to modify your program source at all.  Alternately you might use
+need to modify your program source at all.  Alternatively you might use
 a debugger to insert a call to @code{mcheck} whenever the program is
 started, for example these gdb commands will automatically call @code{mcheck}
 whenever the program starts:
@@ -636,7 +636,7 @@ variable @code{MALLOC_CHECK_}.  When @code{MALLOC_CHECK_} is set, a
 special (less efficient) implementation is used which is designed to be
 tolerant against simple errors, such as double calls of @code{free} with
 the same argument, or overruns of a single byte (off-by-one bugs).  Not
-all such errors can be proteced against, however, and memory leaks can
+all such errors can be protected against, however, and memory leaks can
 result.  If @code{MALLOC_CHECK_} is set to @code{0}, any detected heap
 corruption is silently ignored; if set to @code{1}, a diagnostic is
 printed on @code{stderr}; if set to @code{2}, @code{abort} is called
@@ -645,7 +645,7 @@ much later, and the true cause for the problem is then very hard to
 track down.
 
 So, what's the difference between using @code{MALLOC_CHECK_} and linking
-with @samp{-lmcheck}?  @code{MALLOC_CHECK_} is orthognal with respect to
+with @samp{-lmcheck}?  @code{MALLOC_CHECK_} is orthogonal with respect to
 @samp{-lmcheck}.  @samp{-lmcheck} has been added for backward
 compatibility.  Both @code{MALLOC_CHECK_} and @samp{-lmcheck} should
 uncover the same bugs - but using @code{MALLOC_CHECK_} you don't need to
@@ -666,17 +666,17 @@ The hook variables are declared in @file{malloc.h}.
 @comment malloc.h
 @comment GNU
 @defvar __malloc_hook
-The value of this variable is a pointer to function that @code{malloc}
-uses whenever it is called.  You should define this function to look
-like @code{malloc}; that is, like:
+The value of this variable is a pointer to the function that
+@code{malloc} uses whenever it is called.  You should define this
+function to look like @code{malloc}; that is, like:
 
 @smallexample
 void *@var{function} (size_t @var{size}, void *@var{caller})
 @end smallexample
 
 The value of @var{caller} is the return address found on the stack when
-the @code{malloc} function was called.  This value allows to trace the
-memory consumption of the program.
+the @code{malloc} function was called.  This value allows you to trace
+the memory consumption of the program.
 @end defvar
 
 @comment malloc.h
@@ -851,7 +851,7 @@ This is the total size of memory occupied by chunks handed out by
 This is the total size of memory occupied by free (not in use) chunks.
 
 @item int keepcost
-This is the size of the top-most, releaseable chunk that normally
+This is the size of the top-most releaseable chunk that normally
 borders the end of the heap (i.e. the ``brk'' of the process).
 
 @end table
@@ -924,18 +924,17 @@ Return information about the current dynamic memory usage.
 @cindex allocation debugging
 @cindex malloc debugger
 
-An complicated task when programming with languages which do not use
+A complicated task when programming with languages which do not use
 garbage collected dynamic memory allocation is to find memory leaks.
 Long running programs must assure that dynamically allocated objects are
 freed at the end of their lifetime.  If this does not happen the system
 runs out of memory, sooner or later.
 
 The @code{malloc} implementation in the GNU C library provides some
-simple means to detect sich leaks and provide some information to find
+simple means to detect such leaks and obtain some information to find
 the location.  To do this the application must be started in a special
 mode which is enabled by an environment variable.  There are no speed
-penalties if the program is compiled in preparation of the debugging if
-the debug mode is not enabled.
+penalties for the program if the debugging mode is not enabled.
 
 @menu
 * Tracing malloc::               How to install the tracing functionality.
@@ -956,15 +955,15 @@ contain a valid file name.  The user must have write access.  If the
 file already exists it is truncated.  If the environment variable is not
 set or it does not name a valid file which can be opened for writing
 nothing is done.  The behaviour of @code{malloc} etc. is not changed.
-For obvious reasons this also happens if the application is install SUID
-or SGID.
+For obvious reasons this also happens if the application is installed
+with the SUID or SGID bit set.
 
 If the named file is successfully opened @code{mtrace} installs special
 handlers for the functions @code{malloc}, @code{realloc}, and
 @code{free} (@pxref{Hooks for Malloc}).  From now on all uses of these
 functions are traced and protocolled into the file.  There is now of
-course a speed penalty for all calls to the traced functions so that the
-tracing should not be enabled during their normal use.
+course a speed penalty for all calls to the traced functions so tracing
+should not be enabled during their normal use.
 
 This function is a GNU extension and generally not available on other
 systems.  The prototype can be found in @file{mcheck.h}.
@@ -979,22 +978,22 @@ to enable tracing the @code{malloc} calls.  If no (succesful) call of
 
 Otherwise it deinstalls the handlers for @code{malloc}, @code{realloc},
 and @code{free} and then closes the protocol file.  No calls are
-protocolled anymore and the programs runs again with the full speed.
+protocolled anymore and the program runs again at full speed.
 
 This function is a GNU extension and generally not available on other
 systems.  The prototype can be found in @file{mcheck.h}.
 @end deftypefun
 
 @node Using the Memory Debugger
-@subsection Example programs excerpts
+@subsection Example program excerpts
 
 Even though the tracing functionality does not influence the runtime
-behaviour of the program it is no wise idea to call @code{mtrace} in all
-programs.  Just imagine you debug a program using @code{mtrace} and all
-other programs used in the debug sessions also trace their @code{malloc}
-calls.  The output file would be the same for all programs and so is
-unusable.  Therefore one should call @code{mtrace} only if compiled for
-debugging.  A program could therefore start like this:
+behaviour of the program it is not a good idea to call @code{mtrace} in
+all programs.  Just imagine that you debug a program using @code{mtrace}
+and all other programs used in the debugging session also trace their
+@code{malloc} calls.  The output file would be the same for all programs
+and thus is unusable.  Therefore one should call @code{mtrace} only if
+compiled for debugging.  A program could therefore start like this:
 
 @example
 #include <mcheck.h>
@@ -1012,11 +1011,11 @@ main (int argc, char *argv[])
 This is all what is needed if you want to trace the calls during the
 whole runtime of the program.  Alternatively you can stop the tracing at
 any time with a call to @code{muntrace}.  It is even possible to restart
-the tracing again with a new call to @code{mtrace}.  But this can course
-unreliable results since there are possibly calls of the functions which
-are not called.  Please note that not only the application uses the
-traced functions, also libraries (including the C library itself) use
-this function.
+the tracing again with a new call to @code{mtrace}.  But this can cause
+unreliable results since there may be calls of the functions which are
+not called.  Please note that not only the application uses the traced
+functions, also libraries (including the C library itself) use these
+functions.
 
 This last point is also why it is no good idea to call @code{muntrace}
 before the program terminated.  The libraries are informed about the
@@ -1035,10 +1034,10 @@ libraries).
 
 You know the situation.  The program is prepared for debugging and in
 all debugging sessions it runs well.  But once it is started without
-debugging the error shows up.  In our situation here: the memory leaks
-becomes visible only when we just turned off the debugging.  If you
-foresee such situations you can still win.  Simply use something
-equivalent to the following little program:
+debugging the error shows up.  A typical example is a memory leak that
+becomes visible only when we turn off the debugging.  If you foresee
+such situations you can still win.  Simply use something equivalent to
+the following little program:
 
 @example
 #include <mcheck.h>
@@ -1094,14 +1093,14 @@ If you take a look at the output it will look similar to this:
 @end example
 
 What this all means is not really important since the trace file is not
-meant to be read by a human.  Therefore no attention is payed to good
+meant to be read by a human.  Therefore no attention is given to
 readability.  Instead there is a program which comes with the GNU C
-library which interprets the traces and outputs a summary in on
+library which interprets the traces and outputs a summary in an
 user-friendly way.  The program is called @code{mtrace} (it is in fact a
 Perl script) and it takes one or two arguments.  In any case the name of
-the file with the trace output must be specified.  If an optional argument
-precedes the name of the trace file this must be the name of the program
-which generated the trace.
+the file with the trace output must be specified.  If an optional
+argument precedes the name of the trace file this must be the name of
+the program which generated the trace.
 
 @example
 drepper$ mtrace tst-mtrace log
@@ -1136,18 +1135,18 @@ has no chance to find out what is meant with the addresses given in the
 trace.  We can do better:
 
 @example
-drepper$ mtrace tst-mtrace errlog
-- 0x08064cc8 Free 2 was never alloc'd /home/drepper/tst-mtrace.c:39
-- 0x08064ce0 Free 3 was never alloc'd /home/drepper/tst-mtrace.c:39
-- 0x08064cf8 Free 4 was never alloc'd /home/drepper/tst-mtrace.c:39
+drepper$ mtrace tst errlog
+- 0x08064cc8 Free 2 was never alloc'd /home/drepper/tst.c:39
+- 0x08064ce0 Free 3 was never alloc'd /home/drepper/tst.c:39
+- 0x08064cf8 Free 4 was never alloc'd /home/drepper/tst.c:39
 
 Memory not freed:
 -----------------
    Address     Size     Caller
-0x08064c48     0x14  at /home/drepper/tst-mtrace.c:33
-0x08064c60     0x14  at /home/drepper/tst-mtrace.c:33
-0x08064c78     0x14  at /home/drepper/tst-mtrace.c:33
-0x08064c90     0x14  at /home/drepper/tst-mtrace.c:33
+0x08064c48     0x14  at /home/drepper/tst.c:33
+0x08064c60     0x14  at /home/drepper/tst.c:33
+0x08064c78     0x14  at /home/drepper/tst.c:33
+0x08064c90     0x14  at /home/drepper/tst.c:33
 @end example
 
 Suddenly the output makes much more sense and the user can see
@@ -1156,7 +1155,7 @@ immediately where the function calls causing the trouble can be found.
 Interpreting this output is not complicated.  There are at most two
 different situations being detected.  First, @code{free} was called for
 pointers which were never returned by one of the allocation functions.
-This is usually a very bad problem and how this looks like is shown in
+This is usually a very bad problem and what this looks like is shown in
 the first three lines of the output.  Situations like this are quite
 rare and if they appear they show up very drastically: the program
 normally crashes.
@@ -1166,7 +1165,7 @@ you can see in the output the @code{mtrace} function collects all this
 information and so can say that the program calls an allocation function
 from line 33 in the source file @file{/home/drepper/tst-mtrace.c} four
 times without freeing this memory before the program terminates.
-Whether this is a real problem keeps to be investigated.
+Whether this is a real problem remains to be investigated.
 
 @node Obstacks
 @section Obstacks
@@ -1972,9 +1971,9 @@ alloca (4), y)}.
 @node Alloca Example
 @subsection @code{alloca} Example
 
-As an example of use of @code{alloca}, here is a function that opens a file
-name made from concatenating two argument strings, and returns a file
-descriptor or minus one signifying failure:
+As an example of the use of @code{alloca}, here is a function that opens
+a file name made from concatenating two argument strings, and returns a
+file descriptor or minus one signifying failure:
 
 @smallexample
 int