DataMuseum.dk

Presents historical artifacts from the history of:

ICL Comet 32

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about ICL Comet 32

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download

⟦b759d21cf⟧ TextFile

    Length: 971 (0x3cb)
    Types: TextFile
    Notes: UNIX file
    Names: »alarm.2«

Derivation

└─⟦26887b7e0⟧ Bits:30009717 Comet 32 harddisk image
    └─⟦28c352965⟧ »/a« UNIX Filesystem
        └─⟦this⟧ »usr/man/man2/alarm.2« 

TextFile

.ig
	@(#)alarm.2	2.1	7/1/84
	@(#)Copyright (C) 1983 by National Semiconductor Corp.
..
.TH ALARM 2 
.SH NAME
alarm \- schedule signal after specified time
.SH SYNOPSIS
.nf
.B alarm(seconds)
.B unsigned seconds;
.fi
.SH DESCRIPTION
.I Alarm
causes signal SIGALRM, see
.IR signal (2),
to be sent to the invoking process
in the number of seconds given by the argument.
Unless caught or ignored, the signal terminates the process.
.PP
Alarm requests are not stacked;
successive calls reset the alarm clock.
If the argument is 0, any alarm request is canceled.
Because the clock has a 1-second resolution,
the signal may occur up to one second early;
because of scheduling delays,
resumption of execution when the signal is
caught may be delayed an arbitrary amount.
The longest specifiable delay time is 2147483647 seconds.
.PP
The return value is the amount of time
previously remaining in the alarm clock.
.SH "SEE ALSO"
pause(2), signal(2), sigsys(2), sigset(3), sleep(3)