diff options
author | unknown <monty@narttu.mysql.fi> | 2000-11-16 00:24:11 +0200 |
---|---|---|
committer | unknown <monty@narttu.mysql.fi> | 2000-11-16 00:24:11 +0200 |
commit | c7d2c59ceb4e3548eb74e5d8fba16e0f41ffc7d9 (patch) | |
tree | 31119bae32d48d3c415144eb5aed588455eefa1a /Docs | |
parent | dcf4e49369d91b78ab73b9de038d2729afb3a2a6 (diff) | |
parent | 9a846a52ae62f701c2d54d3f468e2ead393acf91 (diff) | |
download | mariadb-git-c7d2c59ceb4e3548eb74e5d8fba16e0f41ffc7d9.tar.gz |
merge
configure.in:
Auto merged
include/my_sys.h:
Auto merged
libmysql/libmysql.c:
Auto merged
sql/ha_berkeley.cc:
Auto merged
sql/handler.h:
Auto merged
sql/item_strfunc.cc:
Auto merged
sql/lex.h:
Auto merged
sql/mysqld.cc:
Auto merged
sql/sql_class.cc:
Auto merged
sql/sql_insert.cc:
Auto merged
sql/sql_lex.h:
Auto merged
sql/sql_select.cc:
Auto merged
sql/sql_string.h:
Auto merged
BitKeeper/etc/logging_ok:
Auto merged
Diffstat (limited to 'Docs')
-rw-r--r-- | Docs/manual.texi | 1093 |
1 files changed, 651 insertions, 442 deletions
diff --git a/Docs/manual.texi b/Docs/manual.texi index 7c14318afd8..cdad3c20627 100644 --- a/Docs/manual.texi +++ b/Docs/manual.texi @@ -373,6 +373,7 @@ MySQL Language Reference * ANALYZE TABLE:: @code{ANALYZE TABLE} syntax * REPAIR TABLE:: @code{REPAIR TABLE} syntax * DELETE:: @code{DELETE} syntax +* TRUNCATE:: * SELECT:: @code{SELECT} syntax * JOIN:: @code{JOIN} syntax * INSERT:: @code{INSERT} syntax @@ -591,6 +592,7 @@ Speed of queries that access or update data MySQL Utilites * Programs:: What do the executables do? +* safe_mysqld:: safe_mysqld, the wrapper around mysqld * mysql:: The command line tool * mysqladmin:: Administering a @strong{MySQL} server * mysqldump:: Dumping the structure and data from @strong{MySQL} databases and tables @@ -813,7 +815,7 @@ MySQL change history Changes in release 3.23.x (Recommended; beta) -* News-3.23.28:: Changes in release 3.23.28 +* News-3.23.28:: Changes in release 3.23.28 * News-3.23.27:: Changes in release 3.23.27 * News-3.23.26:: Changes in release 3.23.26 * News-3.23.25:: Changes in release 3.23.25 @@ -2002,6 +2004,8 @@ Hands on tutorial for @strong{MySQL}. The Mac OS Xclave. Running @strong{MySQL} on Mac OS X @item @uref{http://www.prnet.de/RegEx/mysql.html}@* MySQL for Mac OS X Server. +@item @uref{http://www.latencyzero.com/macosx/mysql.html}@* +Bulding MySQL for Mac OS X @item @uref{http://www.lilback.com/macsql/}@* Client libraries for the Macintosh. @end itemize @@ -3606,10 +3610,13 @@ similar system. In the worst case, we may require access to your system to be able to create a binary distribution. @item -If you can provide accommodations and pay for traveler fares, you can even -get a @strong{MySQL} developer to visit you and offer you help with your -troubles. Extended login support entitles you to one personal -encounter per year, but we are always very flexible towards our customers! +If you can provide accommodations and pay for traveler fares, you can +even get a @strong{MySQL} developer to visit you and offer you help with +your troubles. Extended login support entitles you to one personal +encounter per year, but we are always very flexible towards our +customers! If the visit takes 16 hours or more, the first 8 hours is +without charge. For the hours above 8 hours, you will be charged with a +rate that is at least 20 % less than our standard rates. @end itemize @node Installing, Compatibility, Licensing and Support, Top @@ -4940,6 +4947,8 @@ You can start the @strong{MySQL} server with the following command: shell> bin/safe_mysqld --user=mysql & @end example +@xref{safe_mysqld}. + @xref{Post-installation}. @cindex RPM file @@ -6655,7 +6664,7 @@ table. @xref{Crashing}. To get a core dump on Linux if mysqld dies with a SIGSEGV signal, you can start mysqld with the @code{--core-file} option. Note that you also probably need to raise the @code{core file size} by adding -@code{ulimit -c 1000000} to @code{safe_mysqld}. +@code{ulimit -c 1000000} to @code{safe_mysqld}. @xref{safe_mysqld}. If you are using LinuxThreads and @code{mysqladmin shutdown} doesn't work, you must upgrade to LinuxThreads Version 0.7.1 or newer. @@ -7017,6 +7026,7 @@ shell> nohup mysqld [options] & @code{nohup} causes the command following it to ignore any @code{SIGHUP} signal sent from the terminal. Alternatively, start the server by running @code{safe_mysqld}, which invokes @code{mysqld} using @code{nohup} for you. +@xref{safe_mysqld}. If you get a problem when compiling mysys/get_opt.c, just remove the line #define _NO_PROTO from the start of that file! @@ -7271,7 +7281,7 @@ FreeBSD is also known to have a very low default file handle limit. safe_mysqld or raise the limits for the mysqld user in /etc/login.conf (and rebuild it witg cap_mkdb /etc/login.conf.) Also be sure you set the appropriate class for this user in the password file if you are not -using the default (use: chpass mysqld-user-name) +using the default (use: chpass mysqld-user-name). @xref{safe_mysqld}. If you get problems with the current date in @strong{MySQL}, setting the @code{TZ} variable will probably help. @xref{Environment variables}. @@ -7358,7 +7368,7 @@ You can change the directory locations if you wish, or just use the defaults by not specifying any locations. If you have problems with performance under heavy load, try using the -@code{--skip-thread-priority} option to @code{safe_mysqld}! This will run +@code{--skip-thread-priority} option to @code{mysqld}! This will run all threads with the same priority; on BSDI Version 3.1, this gives better performance (at least until BSDI fixes their thread scheduler). @@ -8516,6 +8526,7 @@ mysqld: Can't find file: 'host.frm' The above may also happen with a binary @strong{MySQL} distribution if you don't start @strong{MySQL} by executing exactly @code{./bin/safe_mysqld}! +@xref{safe_mysqld}. You might need to run @code{mysql_install_db} as @code{root}. However, if you prefer, you can run the @strong{MySQL} server as an unprivileged @@ -8829,7 +8840,7 @@ system startup and shutdown, and is described more fully in @ref{Automatic start}. @item By invoking @code{safe_mysqld}, which tries to determine the proper options -for @code{mysqld} and then runs it with those options. +for @code{mysqld} and then runs it with those options. @xref{safe_mysqld}. @item On NT you should install @code{mysqld} as a service as follows: @example @@ -8925,47 +8936,6 @@ the command @code{telnet your-host-name tcp-ip-port-number} and press something is using the TCP/IP port @code{mysqld} is trying to use. See @ref{mysql_install_db} and @ref{Multiple servers}. -The @code{safe_mysqld} script is written so that it normally is able to start -a server that was installed from either a source or a binary version of -@strong{MySQL}, even if these install the server in slightly different -locations. @code{safe_mysqld} expects one of these conditions to be true: - -@itemize @bullet -@item -The server and databases can be found relative to the directory from which -@code{safe_mysqld} is invoked. @code{safe_mysqld} looks under its working -directory for @file{bin} and @file{data} directories (for binary -distributions) or for @file{libexec} and @file{var} directories (for source -distributions). This condition should be met if you execute -@code{safe_mysqld} from your @strong{MySQL} installation directory (for -example, @file{/usr/local/mysql} for a binary distribution). - -@item -If the server and databases cannot be found relative to the working directory, -@code{safe_mysqld} attempts to locate them by absolute pathnames. Typical -locations are @file{/usr/local/libexec} and @file{/usr/local/var}. -The actual locations are determined when the distribution was built from which -@code{safe_mysqld} comes. They should be correct if -@strong{MySQL} was installed in a standard location. -@end itemize - -Because @code{safe_mysqld} will try to find the server and databases relative -to its own working directory, you can install a binary distribution of -@strong{MySQL} anywhere, as long as you start @code{safe_mysqld} from the -@strong{MySQL} installation directory: - -@example -shell> cd mysql_installation_directory -shell> bin/safe_mysqld & -@end example - -If @code{safe_mysqld} fails, even when invoked from the @strong{MySQL} -installation directory, you can modify it to use the path to @code{mysqld} -and the pathname options that are correct for your system. Note that if you -upgrade @strong{MySQL} in the future, your modified version of -@code{safe_mysqld} will be overwritten, so you should make a copy of your -edited version that you can reinstall. - If @code{mysqld} is currently running, you can find out what path settings it is using by executing this command: @@ -9065,7 +9035,7 @@ The @code{mysql.server} script uses the following variables: @findex command-line options @cindex options, command-line @node Command-line options, Option files, Automatic start, Post-installation -@subsection Command-line Options +@subsection mysqld command-line options @code{mysqld} accepts the following command-line options: @@ -10109,6 +10079,7 @@ The following will not yet work in @strong{MySQL}: @example SELECT * FROM table1 WHERE id IN (SELECT id FROM table2); SELECT * FROM table1 WHERE id NOT IN (SELECT id FROM table2); +SELECT * FROM table1 WHERE NOT EXISTS (SELECT id FROM table2 where table1.id=table2.id); @end example However, in many cases you can rewrite the query without a sub-select: @@ -10388,6 +10359,11 @@ unless you do so in a very specific order. It's very easy to do ``allowed'' circular definitions that make the tables impossible to re-create each table with a single create statement, even if the definition works and is usable. + +@item +It's very easy to overlook @code{FOREIGN KEY ... ON DELETE} rules when +one codes an application. It's not unusual that one loses a lot of +important information just because a wrong or misused @code{ON DELETE} rule. @end itemize The only nice aspect of @code{FOREIGN KEY} is that it gives ODBC and some @@ -12612,6 +12588,7 @@ to restart @code{mysqld} with @code{--skip-grant-tables} to run * ANALYZE TABLE:: @code{ANALYZE TABLE} syntax * REPAIR TABLE:: @code{REPAIR TABLE} syntax * DELETE:: @code{DELETE} syntax +* TRUNCATE:: * SELECT:: @code{SELECT} syntax * JOIN:: @code{JOIN} syntax * INSERT:: @code{INSERT} syntax @@ -15224,6 +15201,9 @@ mysql> select BINARY "a" = "A"; @end example @code{BINARY} was introduced in @strong{MySQL} Version 3.23.0. + +Note that in some context @strong{MySQL} will not be able to use the +index efficiently when you cast an indexed column to @code{BINARY}. @end table @findex control flow functions @@ -17702,6 +17682,8 @@ alter_specification: or ADD PRIMARY KEY (index_col_name,...) or ADD UNIQUE [index_name] (index_col_name,...) or ADD FULLTEXT [index_name] (index_col_name,...) + or ADD [CONSTRAINT symbol] FOREIGN KEY index_name (index_col_name,...) + [reference_definition] or ALTER [COLUMN] col_name @{SET DEFAULT literal | DROP DEFAULT@} or CHANGE [COLUMN] old_col_name create_definition or MODIFY [COLUMN] create_definition @@ -17761,6 +17743,9 @@ INDEX} are @strong{MySQL} extensions to ANSI SQL92. @code{MODIFY} is an Oracle extension to @code{ALTER TABLE}. @item +@code{TRUNCATE} is an Oracle extension. @xref{TRUNCATE}. + +@item The optional word @code{COLUMN} is a pure noise word and can be omitted. @item @@ -18116,7 +18101,6 @@ as they are being backed up. If you want to backup several tables as a snapshot, you must first issue @code{LOCK TABLES} obtaining a read lock for each table in the group. - The command returns a table with the following columns: @multitable @columnfractions .35 .65 @@ -18127,6 +18111,8 @@ The command returns a table with the following columns: @item Msg_text @tab The message. @end multitable +Note that @code{BACKUP TABLE} is only available in @strong{MySQL} +version 3.23.25 and later. @findex RESTORE TABLE @node RESTORE TABLE, ANALYZE TABLE, BACKUP TABLE, Reference @@ -18225,7 +18211,7 @@ better than sorting on fixed length keys if you have long @code{char()} keys that compress very good. @findex DELETE -@node DELETE, SELECT, REPAIR TABLE, Reference +@node DELETE, TRUNCATE, REPAIR TABLE, Reference @section @code{DELETE} syntax @example @@ -18237,14 +18223,10 @@ DELETE [LOW_PRIORITY] FROM tbl_name given by @code{where_definition}, and returns the number of records deleted. If you issue a @code{DELETE} with no @code{WHERE} clause, all rows are -deleted. If you do this in @code{AUTOCOMMIT} mode, @strong{MySQL} does -this by recreating the table as an empty table, which is much faster -than deleting each row. In this case, @code{DELETE} returns zero as the -number of affected records. (@strong{MySQL} can't return the number of -rows that were actually deleted, because the recreate is done without -opening the data files. As long as the table definition file -@file{tbl_name.frm} is valid, the table can be recreated this way, even -if the data or index files have become corrupted.). +deleted. If you do this in @code{AUTOCOMMIT} mode, this works as +@code{TRUNCATE}. @xref{TRUNCATE}. One problem with this is that +@code{DELETE} will return zero as the number of affected records, but +this will be fixed in 4.0. If you really want to know how many records are deleted when you are deleting all rows, and are willing to suffer a speed penalty, you can use a @@ -18275,8 +18257,34 @@ returned to the client. This can be used to ensure that a specific the @code{DELETE} command until the number of affected rows is less than the @code{LIMIT} value. +@findex TRUNCATE +@node TRUNCATE, SELECT, DELETE, Reference +@section @code{TRUNCATE} syntax + +@example +TRUNCATE TABLE table_name +@end example + +Is in 3.23 and the same thing as @code{DELETE FROM table_name}. @xref{DELETE}. +The differences are: + +@table @bullet +@item +Implemented as a drop and recreate of the table, which makes this +much faster when deleting many rows. +@item +Not transaction safe; @code{TRUNCATE} will automaticly end the current +transaction as if @code{COMMIT} would have been called. +@item +Doesn't return the number of deleted rows. +@item +As long as the table definition file @file{table_name.frm} is +valid, the table can be recreated this way, even if the data or index +files have become corrupted.. +@end table + @findex SELECT -@node SELECT, JOIN, DELETE, Reference +@node SELECT, JOIN, TRUNCATE, Reference @section @code{SELECT} syntax @c help SELECT @@ -18918,6 +18926,9 @@ record in the table has the same value as a new record on a unique index, the old record is deleted before the new record is inserted. @xref{INSERT, , @code{INSERT}}. +In other words, you can't access the values of the old row from a +@code{REPLACE} statement. + @findex LOAD DATA INFILE @node LOAD DATA, UPDATE, REPLACE, Reference @section @code{LOAD DATA INFILE} syntax @@ -19920,11 +19931,17 @@ call should have more details. Check your OS documentation for the maximum value for this variable. Attempting to set @code{back_log} higher than your operating system limit will be ineffective. +@item @code{basedir} +The value of the @code{--basedir} option. + @item @code{bdb_cache_size} The buffer that is allocated to cache index and rows for @code{BDB} tables. If you don't use @code{BDB} tables, you should set this to 0 or start @code{mysqld} with @code{--skip-bdb} o not waste memory for this cache. +@item @code{bdb_home} +The value of the @code{--bdb-home} option. + @item @code{bdb_lock_max} The maximum number of locks (1000 by default) you can have active on a BDB table. You should increase this if you get errors of type @@ -19932,6 +19949,18 @@ table. You should increase this if you get errors of type transactions or when mysqld has to examine a lot of rows to calculate the query. +@item @code{bdb_logdir} +The value of the @code{--bdb-logdir} option. + +@item @code{bdb_tmpdir} +The value of the @code{--bdb-tmpdir} option. + +@item @code{character_set} +The default character set. + +@item @code{character_sets} +The supported character sets. + @item @code{concurrent_inserts} If @code{ON} (the default), @strong{MySQL} will allow you to use @code{INSERT} on @code{MyISAM} tables at the same time as you run @code{SELECT} queries @@ -19942,14 +19971,8 @@ or @code{--skip-new}. The number of seconds the @code{mysqld} server is waiting for a connect packet before responding with @code{Bad handshake}. -@item @code{delayed_insert_timeout} -How long a @code{INSERT DELAYED} thread should wait for @code{INSERT} -statements before terminating. - -@item @code{delayed_insert_limit} -After inserting @code{delayed_insert_limit} rows, the @code{INSERT -DELAYED} handler will check if there are any @code{SELECT} statements -pending. If so, it allows these to execute before continuing. +@item @code{datadir} +The value of the @code{--datadir} option. @item @code{delay_key_write} If enabled (is on by default), @strong{MySQL} will honor the @@ -19963,14 +19986,22 @@ option this means that all tables will be treated as if they were created with the @code{delay_key_write} option. You can clear this flag by starting @code{mysqld} with @code{--skip-new} or @code{--safe-mode}. +@item @code{delayed_insert_limit} +After inserting @code{delayed_insert_limit} rows, the @code{INSERT +DELAYED} handler will check if there are any @code{SELECT} statements +pending. If so, it allows these to execute before continuing. + +@item @code{delayed_insert_timeout} +How long a @code{INSERT DELAYED} thread should wait for @code{INSERT} +statements before terminating. + @item @code{delayed_queue_size} What size queue (in rows) should be allocated for handling @code{INSERT DELAYED}. If the queue becomes full, any client that does @code{INSERT DELAYED} will wait until there is room in the queue again. @item @code{flush} -This is @code{ON} if you have started @strong{MySQL} with the @code{--flush} -option. +This is @code{ON} if you started @code{mysqld} with @code{--flush}. @item @code{flush_time} If this is set to a non-zero value, then every @code{flush_time} seconds all @@ -20023,14 +20054,35 @@ using @code{delay_key_write}. @xref{SHOW}. To get even more speed when writing many rows at the same time use @code{LOCK TABLES}. @xref{LOCK TABLES, , @code{LOCK TABLES}}. -@item @code{lower_case_table_names} -Change all table names to lower case on disk. +@item @code{language} +The language used for error messages. + +@item @code{large_file_support} +If @code{mysqld} was compiled with options for big file support. + +@item @code{locked_in_memory} +If @code{mysqld} was locked in memory with @code{--memlock} + +@item @code{log} +If logging of all queries is enabled. + +@item @code{log_update} +If the update log is enabled. + +@item @code{log_bin} +If the binary log is enabled. + +@item @code{log_slave_updates} +If the updates from the slave should be logged. @item @code{long_query_time} If a query takes longer than this (in seconds), the @code{Slow_queries} counter will be incremented. If you are using @code{--log-slow-queries}, the query will be logged to the slow query logfile. @xref{Slow query log}. +@item @code{lower_case_table_names} +Table names are stored in lower case on disk. + @item @code{max_allowed_packet} The maximum size of one packet. The message buffer is initialized to @code{net_buffer_length} bytes, but can grow up to @code{max_allowed_packet} @@ -20055,15 +20107,15 @@ statements. If you try to insert data into a new table after all @code{INSERT DELAYED} threads are in use, the row will be inserted as if the @code{DELAYED} attribute wasn't specified. +@item @code{max_heap_table_size} +Don't allow creation of heap tables bigger than this. + @item @code{max_join_size} Joins that are probably going to read more than @code{max_join_size} records return an error. Set this value if your users tend to perform joins without a @code{WHERE} clause that take a long time and return millions of rows. -@item @code{max_heap_table_size} -Don't allow creation of heap tables bigger than this. - @item @code{max_sort_length} The number of bytes to use when sorting @code{BLOB} or @code{TEXT} values (only the first @code{max_sort_length} bytes of each value @@ -20076,6 +20128,9 @@ Maximum number of temporary tables a client can keep open at the same time. @item @code{max_write_lock_count} After this many write locks, allow some read locks to run in between. +@item @code{myisam_recover_options} +The value of the @code{--myisam-recover} option. + @item @code{myisam_sort_buffer_size} The buffer that is allocated when sorting the index when doing a @code{REPAIR} or when creating indexes with @code{CREATE INDEX} or @@ -20088,20 +20143,29 @@ can set it to the expected size of a query. (That is, the expected length of SQL statements sent by clients. If statements exceed this length, the buffer is automatically enlarged, up to @code{max_allowed_packet} bytes.) -@item @code{net_retry_count} -If a read on a communication port is interrupted, retry this many times -before giving up. This value should be quite high on @code{FreeBSD} as -internal interrupts is sent to all threads. - @item @code{net_read_timeout} Number of seconds to wait for more data from a connection before aborting the read. Note that when we don't expect data from a connection, the timeout is defined by @code{write_timeout}. +@item @code{net_retry_count} +If a read on a communication port is interrupted, retry this many times +before giving up. This value should be quite high on @code{FreeBSD} as +internal interrupts is sent to all threads. + @item @code{net_write_timeout} Number of seconds to wait for a block to be written to a connection before aborting the write. +@item @code{pid_file} +The value of the @code{--pid-file} option. + +@item @code{port} +The value of the @code{--port} option. + +@item @code{protocol_version} +The protocol version used by the @code{MySQL} server. + @item @code{record_buffer} Each thread that does a sequential scan allocates a buffer of this size for each table it scans. If you do many sequential scans, you may @@ -20111,6 +20175,15 @@ want to increase this value. The initial allocation of the query buffer. If most of your queries are long (like when inserting blobs), you should increase this! +@item @code{server_id} +The value of the @code{--server-id} option. + +@item @code{skip_locking} +Is OFF if @code{mysqld} uses external locking. + +@item @code{skip_networking} +Is ON if we only allow local (socket) connections. + @item @code{skip_show_databases} This prevents people from doing @code{SHOW DATABASES}, if they don't have the @code{PROCESS_PRIV} privilege. This can improve security if @@ -20121,6 +20194,9 @@ tables other users have. If the creating of the thread longer than this (in seconds), the @code{Slow_launch_threads} counter will be incremented. +@item @code{socket} +The unix socket used by the server. + @item @code{sort_buffer} Each thread that needs to do a sort allocates a buffer of this size. Increase this value for faster @code{ORDER BY} or @code{GROUP BY} @@ -20144,6 +20220,9 @@ connections, fail to perform queries, and be very unreliable. For information about how the table cache works, see @ref{Table cache}. +@item @code{table_type} +The default table type + @item @code{thread_cache_size} How many threads we should keep keep in a cache for reuse. When a client disconnects the clients threads is put in the cache if there @@ -20165,12 +20244,21 @@ The stack size for each thread. Many of the limits detected by the @code{crash-me} test are dependent on this value. The default is large enough for normal operation. @xref{Benchmarks}. +@item @code{timezone} +The timezone for the server. + @item @code{tmp_table_size} If an in-memory temporary table exceeds this size, @strong{MySQL} will automatically convert it to an on-disk @code{MyISAM} table. Increase the value of @code{tmp_table_size} if you do many advanced @code{GROUP BY} queries and you have lots of memory. +@item @code{tmpdir} +The directory used for temporary files and temporary tables. + +@item @code{version} +The version number for the server. + @item @code{wait_timeout} The number of seconds the server waits for activity on a connection before closing it. See also @code{interactive_timeout}. @@ -22003,8 +22091,8 @@ reused when you insert new data into the table. You need enough extra memory for all HEAP tables that you want to use at the same time. @item -To free memory, you should execute @code{DELETE FROM heap_table} or -@code{DROP TABLE heap_table}. +To free memory, you should execute @code{DELETE FROM heap_table}, +@code{TRUNCATE TABLE heap_table} or @code{DROP TABLE heap_table}. @item @strong{MySQL} cannot find out how approximately many rows there are between two values (this is used by the range optimizer to decide which @@ -24974,154 +25062,136 @@ what they do. The old @code{FLUSH} variants still work, though for compatibility. @item -Starting in Version 3.23.21 you can use LOAD TABLE FROM MASTER for network -backup and to set up replication initially. +Starting in Version 3.23.21 you can use @code{LOAD TABLE FROM MASTER} for +network backup and to set up replication initially. @item Starting in Version 3.23.23, you can change masters with @code{CHANGE MASTER -TO } +TO}. @item Starting in Version 3.23.23, you tell the master that updates in certain -databases should not be logged to the binary log with @code{binlog-ignore-db} +databases should not be logged to the binary log with @code{binlog-ignore-db}. @item Starting in Version 3.23.26, you can use @code{replicate-rewrite-db} to tell the slave to apply updates from one database on the master to the one -with a different name on the slave +with a different name on the slave. @item Starting in Version 3.23.28, you can use @code{PURGE MASTER LOGS TO 'log-name'} -to get rid of old logs while the slave is running +to get rid of old logs while the slave is running. @end itemize @node Replication Options, Replication SQL, Replication Features, Replication @section Replication Options in my.cnf -The table below explains the replications options in @code{my.cnf} . All -of the are available starting in Version 3.23.15 unless indicated otherwise. +If you are using replication, we recommend you to use MySQL Version 3.23.27 or +later. + +On both master and slave you need to use the @code{server-id} option. +This sets an unique replication id. You should pick a unique value in the +range between 1 to 2^32-1 for each master and slave. +Example: @code{server-id=3} + +The following table has the options you can use for the @strong{MASTER}: @multitable @columnfractions .3 .7 @item @strong{Option} @tab @strong{Description} -@item -@code{log-bin} - @tab Should be set on the master. Tells it to keep a binary update log. -If a parameter is specified, the log will be written to the specified -location. Note that if you give it a parameter with an extention -(eg. @code{log-bin=/mysql/logs/replication.log} ) versions up to -3.23.24 will not work right during replication if you do -@code{FLUSH LOGS} . The problem is fixed -in Version 3.23.25. If you are using this kind of log name, @code{FLUSH LOGS} -will be ignored on binlog. To clear the log, run @code{FLUSH MASTER}, -and do not forget to run @code{FLUSH SLAVE} on all slaves. In Version 3.23.26 -and later versions you should use @code{RESET MASTER} and @code{RESET -SLAVE} - -@item -@code{log-bin-index} - @tab Because the user could issue @code{FLUSH LOGS} command, we need to +@item @code{log-bin=filename} @tab +Write to a binary update log to the specified location. Note that if you +give it a parameter with an extension +(eg. @code{log-bin=/mysql/logs/replication.log} ) versions up to 3.23.24 +will not work right during replication if you do @code{FLUSH LOGS} . The +problem is fixed in 3.23.25. If you are using this kind of log name, +@code{FLUSH LOGS} will be ignored on binlog. To clear the log, run +@code{FLUSH MASTER}, and do not forget to run @code{FLUSH SLAVE} on all +slaves. In 3.23.26 and later versions you should use @code{RESET MASTER} +and @code{RESET SLAVE} + +@item @code{log-bin-index=filename} @tab +Because the user could issue @code{FLUSH LOGS} command, we need to know which log is currently active and which ones have been rotated out and it what sequence. This info is stored in the binary log index file. -The default is `hostname`.index . You can use this option -if you want to be a rebel. -(Set on @strong{Master}, Example: @code{log-bin-index=db.index}) +The default is `hostname`.index . You can use this option if you want to +be a rebel. (Example: @code{log-bin-index=db.index}) -@item -@code{master-host} - @tab Master hostname or IP address for replication. If not set, the slave -thread will not be started. -(Set on @strong{Slave}, Example: @code{master-host=db-master.mycompany.com}) +@item @code{sql-bin-update-same} @tab +If set, setting @code{SQL_LOG_BIN} to a value will automatically set +@code{SQL_LOG_UPDATE} to the same value and vice versa. -@item -@code{master-user} - @tab The user the slave thread will authenticate as when connecting to -the master. The user must have @code{FILE} privilige. If the master user -is not set, user @code{test} is assumed. -(Set on @strong{Slave}, Example: @code{master-user=scott}) +@item @code{binlog-do-db=database_name} @tab +Tells the master it should log updates for the specified database, and +exclude all others not explicitly mentioned. +(Example: @code{binlog-do-db=some_database}) -@item -@code{master-password} - @tab The password the slave thread will authenticate with when connecting -to the master. If not set, empty password is assumed -(Set on @strong{Slave}, Example: @code{master-password=tiger}) +@item @code{binlog-ignore-db=database_name} @tab +Tells the master that updates to the given database should not be logged +to the binary log (Example: @code{binlog-ignore-db=some_database}) +@end multitable -@item -@code{master-port} - @tab The port the master is listening on. If not set, the compiled setting -of @code{MYSQL_PORT} is assumed. If you have not tinkered with @code{configure} -options, this should be 3306. -(Set on @strong{Slave}, Example: @code{master-port=3306}) +The following table has the options you can use for the @strong{SLAVE}: -@item -@code{master-connect-retry} - @tab The number of seconds the slave thread will sleep before retrying to -connect to the master in case the master goes down or the connection is lost. -Default is 60. -(Set on @strong{Slave}, Example: @code{master-connect-retry=60}) +@multitable @columnfractions .3 .7 -@item -@code{master-info-file} - @tab The location of the file that remembers where we left off on the master +@item @strong{Option} @tab @strong{Description} +@item @code{master-host=host} @tab +Master hostname or IP address for replication. If not set, the slave +thread will not be started. +(Example: @code{master-host=db-master.mycompany.com}) + +@item @code{master-user=username} @tab +The user the slave thread will us for authentication when connecting to +the master. The user must have @code{FILE} privilege. If the master user +is not set, user @code{test} is assumed. (Example: +@code{master-user=scott}) + +@item @code{master-password=password} @tab +The password the slave thread will authenticate with when connecting to +the master. If not set, an empty password is assumed (Example: +@code{master-password=tiger}) + +@item @code{master-port=portnumber} @tab +The port the master is listening on. If not set, the compiled setting of +@code{MYSQL_PORT} is assumed. If you have not tinkered with +@code{configure} options, this should be 3306. (Example: +@code{master-port=3306}) + +@item @code{master-connect-retry=seconds} @tab +The number of seconds the slave thread will sleep before retrying to +connect to the master in case the master goes down or the connection is +lost. Default is 60. (Example: @code{master-connect-retry=60}) + +@item @code{master-info-file=filename} @tab +The location of the file that remembers where we left off on the master during the replication process. The default is master.info in the data directory. Sasha: The only reason I see for ever changing the default -is the desire to be rebelious. -(Set on @strong{Slave}, Example: @code{master-info-file=master.info}) - -@item -@code{replicate-do-db} - @tab Tells the slave thread to restrict replication to the specified database. -To specify more than one database, use the directive multiple times, once for -each database. Note that this will only work if you do not use cross-database -queries such as @code{UPDATE some_db.some_table SET foo='bar'} while having -selected a different or no database. -(Set on @strong{Slave}, Example: @code{replicate-do-db=some_db}) - -@item -@code{replicate-ignore-db} - @tab Tells the slave thread to not replicate to the specified database. To -specify more than one database to ignore, use the directive multiple times, -once for each database. You must not use cross database updates for this -option. -(Set on @strong{Slave}, Example: @code{replicate-ignore-db=some_db}) - -@item -@code{sql-bin-update-same} - @tab If set, setting @code{SQL_LOG_BIN} to a value will automatically set -@code{SQL_LOG_UPDATE} to the same value and vice versa. -(Set on @strong{Master}, Example: @code{sql-bin-update-same}) - -@item -@code{log-slave-updates} - @tab Tells the slave to log the updates from the slave thread to the binary -log. Off by default. You will need to turn it on if you plan to daisy-chain -the slaves -(Set on @strong{Slave}, Example: @code{log-slave-updates}) - -@item -@code{binlog-do-db} - @tab Tells the master it should log updates for the specified database, and -exclude all others not explicitly mentioned. -(Set on @strong{Master}, Example: @code{binlog-do-db=some_database}) - -@item -@code{binlog-ignore-db} - @tab Tells the master that updates to the given database should not be logged -to the binary log -(Set on @strong{Master}, Example: @code{binlog-ignore-db=some_database}) - -@item -@code{replicate-rewrite-db} - @tab Tells the slave to apply updates to a database with a different -name than the original ( Set on @strong{Slave}, Example: +is the desire to be rebelious. (Example: +@code{master-info-file=master.info}) + +@item @code{replicate-do-db=database_name} @tab +Tells the slave thread to restrict replication to the specified database. +To specify more than one database, use the directive multiple times, +once for each database. Note that this will only work if you do not use +cross-database queries such as @code{UPDATE some_db.some_table SET +foo='bar'} while having selected a different or no database. +(Example: @code{replicate-do-db=some_db}) + +@item @code{replicate-ignore-db=database_name} @tab +Tells the slave thread to not replicate to the specified database. To +specify more than one database to ignore, use the directive multiple +times, once for each database. This option will not work if you use cross +database updates. (Example: @code{replicate-ignore-db=some_db}) + +@item @code{log-slave-updates} @tab +Tells the slave to log the updates from the slave thread to the binary +log. Off by default. You will need to turn it on if you plan to +daisy-chain the slaves. + +@item @code{replicate-rewrite-db=from_name->to_name} @tab +Updates to a database with a different name than the original (Example: @code{replicate-rewrite-db=master_db_name->slave_db_name} -@item -@code{skip-slave-start} - @tab Tells the slave server not to start the slave on the startup. -The user can start it later with @code{SLAVE START} - -@item -@code{server-id} - @tab Sets the unique replicaiton numeric server id. You should pick one to assign. -The range is from 1 to 2^32-1. (Set on both @strong{Master} and -@strong{Slave}. Example: @code{server-id=3}) +@item @code{skip-slave-start} @tab +Tells the slave server not to start the slave on the startup. The user +can start it later with @code{SLAVE START}. @end multitable @cindex SQL commands, replication @@ -26183,7 +26253,7 @@ This can be done with the following code: @example mysql> LOCK TABLES real_table WRITE, insert_table WRITE; mysql> insert into real_table select * from insert_table; -mysql> delete from insert_table; +mysql> TRUNCATE TABLE insert_table; mysql> UNLOCK TABLES; @end example @@ -27037,13 +27107,13 @@ it is very important to @code{OPTIMIZE TABLE} sometimes. @node Delete speed, , Update speed, Query Speed @subsection Speed of @code{DELETE} queries +If you want to delete all rows in the table, you should use +@code{TRUNCATE TABLE table_name}. @xref{TRUNCATE}. + The time to delete a record is exactly proportional to the number of indexes. To delete records more quickly, you can increase the size of the index cache. @xref{Server parameters}. -It's also much faster to remove all rows than to remove a big part of the -rows from a table. - @cindex optimization, tips @cindex tips, optimization @node Tips, Benchmarks, Query Speed, Performance @@ -27074,7 +27144,7 @@ In some cases it may make sense to introduce a column that is 'hashed' based on information from other columns. If this column is short and reasonably unique it may be much faster than a big index on many columns. In @strong{MySQL} its very easy to use this extra column: -@code{SELECT * FROM table_name WHERE hash=MP5(concat(col1,col2)) +@code{SELECT * FROM table_name WHERE hash=MD5(concat(col1,col2)) AND col_1='constant' AND col_2='constant'} @item For tables that changes a lot you should try to avoid all @code{VARCHAR} @@ -27512,6 +27582,7 @@ How big a @code{VARCHAR} column can be @menu * Programs:: What do the executables do? +* safe_mysqld:: * mysql:: The command line tool * mysqladmin:: Administering a @strong{MySQL} server * mysqldump:: Dumping the structure and data from @strong{MySQL} databases and tables @@ -27522,7 +27593,7 @@ How big a @code{VARCHAR} column can be @cindex environment variables @cindex programs, list of -@node Programs, mysql, Tools, Tools +@node Programs, safe_mysqld, Tools, Tools @section Overview of the different MySQL programs All @strong{MySQL} clients that communicate with the server using the @@ -27643,20 +27714,106 @@ swaps @code{a} and @code{b} in the given files: @example shell> replace a b b a -- file1 file2 ... @end example +@end table +@cindex tools, safe_mysqld +@cindex scripts @cindex @code{safe_mysqld} +@node safe_mysqld, mysql, Programs, Tools +@section safe_mysqld, the wrapper around mysqld + +@code{safe_mysqld} is the recommended way to start a @code{mysqld} +daemon on Unix. @code{safe_mysqld} adds some safety features such as +restarting the server when an error occurs and logging runtime +information to a log file. + +Normally one should never edit the @code{safe_mysqld} script, but +instead put the options to @code{safe_mysqld} in the +@code{[safe_mysqld]} section in the @code{my.cnf} +file. @code{safe_mysqld} will read all options from the @code{[mysqld]} +and @code{[safe_mysqld]} sections from the option files. +@xref{Option files}. + +Note that all options on the command line to @code{safe_mysqld} are passed +to @code{mysqld}. If you wants to use any options in @code{safe_mysqld} that +@code{mysqld} doesn't support, you must specify these in the option file. + +Most of the options to @code{safe_mysqld} are the same as the options to +@code{mysqld}. @xref{Command-line options}. -@item safe_mysqld -A script that starts the @code{mysqld} daemon with some safety features, such -as restarting the server when an error occurs and logging runtime information -to a log file. +@code{safe_mysqld} supports the following options: + +@table @code +@item --basedir=path +@item --core-file-size=# +@item --defaults-extra-file=path +@item --defaults-file=path +@item --open-files=# +Size of the core file @code{mysqld} should be able to create. Passed to +@code{ulimit -c}. +@item --datadir=path +@item --err-log=path +@item --ledir=path +Path to @code{mysqld} +@item --log=path +@item --no-defaults +@item --open-files=# +Number of files @code{mysqld} should be able to open. Passed to +@code{ulimit -n}. +@item --pid-file=path +@item --port=# +@item --socket=path +@item --timezone=# +Set the timezone (the @code{TZ}) variable to the value of this parameter. +@item --user=# @end table +The @code{safe_mysqld} script is written so that it normally is able to start +a server that was installed from either a source or a binary version of +@strong{MySQL}, even if these install the server in slightly different +locations. @code{safe_mysqld} expects one of these conditions to be true: + +@itemize @bullet +@item +The server and databases can be found relative to the directory from which +@code{safe_mysqld} is invoked. @code{safe_mysqld} looks under its working +directory for @file{bin} and @file{data} directories (for binary +distributions) or for @file{libexec} and @file{var} directories (for source +distributions). This condition should be met if you execute +@code{safe_mysqld} from your @strong{MySQL} installation directory (for +example, @file{/usr/local/mysql} for a binary distribution). + +@item +If the server and databases cannot be found relative to the working directory, +@code{safe_mysqld} attempts to locate them by absolute pathnames. Typical +locations are @file{/usr/local/libexec} and @file{/usr/local/var}. +The actual locations are determined when the distribution was built from which +@code{safe_mysqld} comes. They should be correct if +@strong{MySQL} was installed in a standard location. +@end itemize + +Because @code{safe_mysqld} will try to find the server and databases relative +to its own working directory, you can install a binary distribution of +@strong{MySQL} anywhere, as long as you start @code{safe_mysqld} from the +@strong{MySQL} installation directory: + +@example +shell> cd mysql_installation_directory +shell> bin/safe_mysqld & +@end example + +If @code{safe_mysqld} fails, even when invoked from the @strong{MySQL} +installation directory, you can modify it to use the path to @code{mysqld} +and the pathname options that are correct for your system. Note that if you +upgrade @strong{MySQL} in the future, your modified version of +@code{safe_mysqld} will be overwritten, so you should make a copy of your +edited version that you can reinstall. + @cindex command line tool @cindex tools, command line @cindex scripts @cindex @code{mysql} -@node mysql, mysqladmin, Programs, Tools +@node mysql, mysqladmin, safe_mysqld, Tools @section The command line tool @code{mysql} is a simple SQL shell (with GNU @code{readline} capabilities). @@ -29666,10 +29823,13 @@ Use the table description file to create new (empty) data and index files: @example shell> mysql db_name mysql> SET AUTOCOMMIT=1; -mysql> DELETE FROM tbl_name; +mysql> TRUNCATE TABLE table_name; mysql> quit @end example +If your SQL version doesn't have @code{TRUNCATE}, use @code{DELETE FROM +table_name} instead. + @item Copy the old data file back onto the newly created data file. (Don't just move the old file back onto the new file; you want to retain @@ -32650,7 +32810,7 @@ something like this: @example shell> ./configure --with-tcp-port=port_number \ - --with-unix-socket=file_name \ + --with-unix-socket-path=file_name \ --prefix=/usr/local/mysql-3.22.9 @end example @@ -34661,7 +34821,9 @@ The specified group in the option file may contain the following options: @item @code{port} @tab Default port number. @item @code{return-found-rows} @tab Tell @code{mysql_info()} to return found rows instead of updated rows when using @code{UPDATE}. @item @code{socket} @tab Default socket number. -@item @code{timeout} @tab Connect timeout in seconds. +@item +@code{timeout} @tab Connect timeout in seconds. On Linux this timeout also +is used for waiting for the first answer from the server. @item @code{user} @tab Default user. @end multitable @@ -34871,14 +35033,20 @@ client library that uses a different protocol version. This can happen if you use a very old client library to connect to a new server that wasn't started with the @code{--old-protocol} option. -@item CR_NAMEDPIPEOPEN_ERROR; +@item CR_NAMEDPIPEOPEN_ERROR Failed to create a named pipe on Windows. -@item CR_NAMEDPIPEWAIT_ERROR; +@item CR_NAMEDPIPEWAIT_ERROR Failed to wait for a named pipe on Windows. -@item CR_NAMEDPIPESETSTATE_ERROR; +@item CR_NAMEDPIPESETSTATE_ERROR Failed to get a pipe handler on Windows. + +@item CR_SERVER_LOST +If @code{timeout} > 0 and it took longer then @code{timeout} seconds to +connect to the server or if the server died while executing the +@code{init-command}. + @end table @subsubheading Example @@ -37494,6 +37662,10 @@ Fernandez Herrero. @itemize @bullet @item Graphical clients @itemize @bullet +@item @uref{http://www.ideit.com/products/dbvis: DbVisualizer} +Freeware JDBC client to graphically visualize the data and structure +of several databases simultaneously. By Innovative-IT Development AB. + @item @uref{http://www.mysql.com/download_clients.html, mysqlgui homepage} The @strong{MySQL} GUI client homepage. By Sinisa at MySQL AB. @item @uref{http://www.mysql.com/Downloads/Contrib/kmysqladmin-0.4.1.tar.gz, kmysqladmin-0.4.1.tar.gz} @@ -37914,6 +38086,13 @@ Prints the storage usage of a @strong{MySQL} database. sprintf() function for SQL queries that can escape blobs. By Chunhua Liu. @end itemize +@appendixsec Windows programs +@itemize @bullet +@item @uref{http://www.mysql.com/Downloads/Contrib/LaunchMySQL.zip, LaunchMySQL.zip} +The program launches the @strong{MySQL} server, shuts it down, and +display status information. By Bill Thompson +@end itemize + @appendixsec Uncategorized @itemize @bullet @@ -38304,10 +38483,35 @@ though, so Version 3.23 is not released as a stable version yet. @appendixsubsec Changes in release 3.23.28 @itemize @bullet @item +Changed all log files to use our own IO_CACHE mechanism instead of +FILE:s to avoid OS problems when there is many files open. +@item +Added options @code{--open-files} and @code{--timezone} to @code{safe_mysqld}. +@item +Fixed fatal bug in @code{CREATE TEMPORARY TABLE ...SELECT ...}. +@item +Fixed problem with @code{CREATE TABLE .. SELECT NULL}. +@item +Added status variables @code{large_file_support},@code{net_read_timeout}, +@code{net_write_timeout} and @code{query_buffer_size} to @code{SHOW VARIABLES}. +@item +Fixed bug where we didn't allow an index name after the +@code{FOREIGN KEY} definition. +@item +Added @code{TRUNCATE TABLE table_name} as a synonym for +@code{DELETE FROM table_name}. +@item Fixed bug in a BDB key compare function when comparing part keys. @item Added variable @code{bdb_lock_max} to @code{mysqld}. @item +Added more tests to the benchmark suite. +@item +Fixed a overflow bug in the client code when using too long database names. +@item +@code{mysql_connect()} now aborts on Linux if the server doesn't answer in +@code{timeout} seconds. +@item @code{SLAVE START} did not work if you started with @code{--skip-slave-start} and had not explicitly run @code{CHANGE MASTER TO}. @@ -38325,7 +38529,7 @@ shortage when compiled @code{--with-debug=full} Fixed several coredumps in out-of-memory conditions @item @code{SHOW SLAVE STATUS} was using unititialized mutex if the slave had -not been started yet +not been started yet @item Fixed bug in @code{ELT()} and @code{MAKE_SET()} when the query used a temporary table @@ -38335,7 +38539,6 @@ set it to 0 instead of 4 and hit the magic number in the master binlog. @item @code{ALTER TABLE ... ORDER BY ...} syntax added. This will create the new table with the rows in a specific order. - @end itemize @node News-3.23.27, News-3.23.26, News-3.23.28, News-3.23.x @@ -40726,8 +40929,8 @@ The @code{mysql_real_connect()} call is changed to: @example mysql_real_connect(MYSQL *mysql, const char *host, const char *user, - const char *passwd, const char *db, uint port, - const char *unix_socket, uint client_flag) + const char *passwd, const char *db, uint port, + const char *unix_socket, uint client_flag) @end example @item Each connection is handled by its own thread, rather than by the @@ -41854,7 +42057,7 @@ Fixed bug that you couldn't use @code{tbl_name.field_name} in @code{UPDATE}. Fixed @code{SELECT DISTINCT} when using 'hidden group'. For example: @example mysql> SELECT DISTINCT MOD(some_field,10) FROM test - GROUP BY some_field; + GROUP BY some_field; @end example Note: @code{some_field} is normally in the @code{SELECT} part. ANSI SQL should require it. @@ -41927,8 +42130,8 @@ New range optimizer that can resolve ranges when some keypart prefix is constant. Example: @example mysql> SELECT * FROM tbl_name - WHERE key_part_1="customer" - AND key_part_2>=10 AND key_part_2<=10; + WHERE key_part_1="customer" + AND key_part_2>=10 AND key_part_2<=10; @end example @end itemize @@ -42368,7 +42571,7 @@ lookups. The column that is used should be a constant for each group because the value is calculated only once for the first row that is found for a group. @example mysql> SELECT id,lookup.text,sum(*) FROM test,lookup - WHERE test.id=lookup.id GROUP BY id; + WHERE test.id=lookup.id GROUP BY id; @end example @item Fixed bug in @code{SUM(function)} (could cause a core dump). @@ -42744,6 +42947,8 @@ Allow users to change startup options. @item Subqueries. @code{select id from t where grp in (select grp from g where u > 100)} @item +Don't allow more than # threads to run MyISAM recover at the same time. +@item @code{INSERT SQL_CONCURRENT ...}; This will force the insert to happen at the end of the data file if the table is in use by an select to allow concurrent inserts. @@ -42954,6 +43159,10 @@ insert into t1 values (now()); create table t2 select max(a) from t1; show columns from t2; @end example +@item +Come up with a nice syntax for a statement that will @code{UPDATE} the row +if it exists and @code{INSERT} a new row if the row didn't exist. +(Like @code{REPLACE} works with @code{INSERT} / @code{DELETE}) @end itemize @node TODO sometime, TODO unplanned, TODO future, TODO @@ -43960,17 +44169,17 @@ All new development is concentrated to @strong{MySQL}. @appendix GNU General Public License @example - GNU GENERAL PUBLIC LICENSE - Version 2, June 1991 + GNU GENERAL PUBLIC LICENSE + Version 2, June 1991 - Copyright (C) 1989, 1991 Free Software Foundation, Inc. - 675 Mass Ave, Cambridge, MA 02139, USA - Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed. +Copyright (C) 1989, 1991 Free Software Foundation, Inc. + 675 Mass Ave, Cambridge, MA 02139, USA +Everyone is permitted to copy and distribute verbatim copies +of this license document, but changing it is not allowed. - Preamble + Preamble - The licenses for most software are designed to take away your +The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This @@ -43980,48 +44189,48 @@ using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. - When we speak of free software, we are referring to freedom, not +When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. - To protect your rights, we need to make restrictions that forbid +To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. - For example, if you distribute copies of such a program, whether +For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. - We protect your rights with two steps: (1) copyright the software, and +We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. - Also, for each author's protection and ours, we want to make certain +Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. - Finally, any free program is threatened constantly by software +Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. - The precise terms and conditions for copying, distribution and +The precise terms and conditions for copying, distribution and modification follow. - GNU GENERAL PUBLIC LICENSE - TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION + GNU GENERAL PUBLIC LICENSE +TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION - 0. This License applies to any program or other work which contains +0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" @@ -44038,7 +44247,7 @@ is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. - 1. You may copy and distribute verbatim copies of the Program's +1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the @@ -44049,29 +44258,29 @@ along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. - 2. You may modify your copy or copies of the Program or any portion +2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: - a) You must cause the modified files to carry prominent notices - stating that you changed the files and the date of any change. - - b) You must cause any work that you distribute or publish, that in - whole or in part contains or is derived from the Program or any - part thereof, to be licensed as a whole at no charge to all third - parties under the terms of this License. - - c) If the modified program normally reads commands interactively - when run, you must cause it, when started running for such - interactive use in the most ordinary way, to print or display an - announcement including an appropriate copyright notice and a - notice that there is no warranty (or else, saying that you provide - a warranty) and that users may redistribute the program under - these conditions, and telling the user how to view a copy of this - License. (Exception: if the Program itself is interactive but - does not normally print such an announcement, your work based on - the Program is not required to print an announcement.) +a) You must cause the modified files to carry prominent notices +stating that you changed the files and the date of any change. + +b) You must cause any work that you distribute or publish, that in +whole or in part contains or is derived from the Program or any +part thereof, to be licensed as a whole at no charge to all third +parties under the terms of this License. + +c) If the modified program normally reads commands interactively +when run, you must cause it, when started running for such +interactive use in the most ordinary way, to print or display an +announcement including an appropriate copyright notice and a +notice that there is no warranty (or else, saying that you provide +a warranty) and that users may redistribute the program under +these conditions, and telling the user how to view a copy of this +License. (Exception: if the Program itself is interactive but +does not normally print such an announcement, your work based on +the Program is not required to print an announcement.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, @@ -44093,26 +44302,26 @@ with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. - 3. You may copy and distribute the Program (or a work based on it, +3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following: - a) Accompany it with the complete corresponding machine-readable - source code, which must be distributed under the terms of Sections - 1 and 2 above on a medium customarily used for software interchange; or, +a) Accompany it with the complete corresponding machine-readable +source code, which must be distributed under the terms of Sections +1 and 2 above on a medium customarily used for software interchange; or, - b) Accompany it with a written offer, valid for at least three - years, to give any third party, for a charge no more than your - cost of physically performing source distribution, a complete - machine-readable copy of the corresponding source code, to be - distributed under the terms of Sections 1 and 2 above on a medium - customarily used for software interchange; or, +b) Accompany it with a written offer, valid for at least three +years, to give any third party, for a charge no more than your +cost of physically performing source distribution, a complete +machine-readable copy of the corresponding source code, to be +distributed under the terms of Sections 1 and 2 above on a medium +customarily used for software interchange; or, - c) Accompany it with the information you received as to the offer - to distribute corresponding source code. (This alternative is - allowed only for noncommercial distribution and only if you - received the program in object code or executable form with such - an offer, in accord with Subsection b above.) +c) Accompany it with the information you received as to the offer +to distribute corresponding source code. (This alternative is +allowed only for noncommercial distribution and only if you +received the program in object code or executable form with such +an offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source @@ -44131,7 +44340,7 @@ access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. - 4. You may not copy, modify, sublicense, or distribute the Program +4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. @@ -44139,7 +44348,7 @@ However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. - 5. You are not required to accept this License, since you have not +5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by @@ -44148,7 +44357,7 @@ Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it. - 6. Each time you redistribute the Program (or any work based on the +6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further @@ -44156,7 +44365,7 @@ restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License. - 7. If, as a consequence of a court judgment or allegation of patent +7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not @@ -44188,7 +44397,7 @@ impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. - 8. If the distribution and/or use of the Program is restricted in +8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding @@ -44196,7 +44405,7 @@ those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. - 9. The Free Software Foundation may publish revised and/or new versions +9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. @@ -44209,7 +44418,7 @@ Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation. - 10. If you wish to incorporate parts of the Program into other free +10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes @@ -44217,9 +44426,9 @@ make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. - NO WARRANTY + NO WARRANTY - 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY +11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED @@ -44229,7 +44438,7 @@ TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. - 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING @@ -44239,45 +44448,45 @@ YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. - END OF TERMS AND CONDITIONS + END OF TERMS AND CONDITIONS - Appendix: How to Apply These Terms to Your New Programs +Appendix: How to Apply These Terms to Your New Programs - If you develop a new program, and you want it to be of the greatest +If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. - To do so, attach the following notices to the program. It is safest +To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to where the full notice is found. - <one line to give the program's name and a brief idea of what it does.> - Copyright (C) 19yy <name of author> +<one line to give the program's name and a brief idea of what it does.> +Copyright (C) 19yy <name of author> - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. +This program is free software; you can redistribute it and/or modify +it under the terms of the GNU General Public License as published by +the Free Software Foundation; either version 2 of the License, or +(at your option) any later version. - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. +This program is distributed in the hope that it will be useful, +but WITHOUT ANY WARRANTY; without even the implied warranty of +MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +GNU General Public License for more details. - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. +You should have received a copy of the GNU General Public License +along with this program; if not, write to the Free Software +Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. Also add information on how to contact you by electronic and paper mail. If the program is interactive, make it output a short notice like this when it starts in an interactive mode: - Gnomovision version 69, Copyright (C) 19yy name of author - Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. - This is free software, and you are welcome to redistribute it - under certain conditions; type `show c' for details. +Gnomovision version 69, Copyright (C) 19yy name of author +Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. +This is free software, and you are welcome to redistribute it +under certain conditions; type `show c' for details. The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, the commands you use may @@ -44288,11 +44497,11 @@ You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the program, if necessary. Here is a sample; alter the names: - Yoyodyne, Inc., hereby disclaims all copyright interest in the program - `Gnomovision' (which makes passes at compilers) written by James Hacker. +Yoyodyne, Inc., hereby disclaims all copyright interest in the program +`Gnomovision' (which makes passes at compilers) written by James Hacker. - <signature of Ty Coon>, 1 April 1989 - Ty Coon, President of Vice +<signature of Ty Coon>, 1 April 1989 +Ty Coon, President of Vice This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may @@ -44308,42 +44517,42 @@ Public License instead of this License. @appendix GNU Library General Public License @example - GNU LIBRARY GENERAL PUBLIC LICENSE - Version 2, June 1991 + GNU LIBRARY GENERAL PUBLIC LICENSE + Version 2, June 1991 - Copyright (C) 1991 Free Software Foundation, Inc. - 675 Mass Ave, Cambridge, MA 02139, USA - Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed. +Copyright (C) 1991 Free Software Foundation, Inc. + 675 Mass Ave, Cambridge, MA 02139, USA +Everyone is permitted to copy and distribute verbatim copies +of this license document, but changing it is not allowed. [This is the first released version of the library GPL. It is - numbered 2 because it goes with version 2 of the ordinary GPL.] +numbered 2 because it goes with version 2 of the ordinary GPL.] - Preamble + Preamble - The licenses for most software are designed to take away your +The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. - This license, the Library General Public License, applies to some +This license, the Library General Public License, applies to some specially designated Free Software Foundation software, and to any other libraries whose authors decide to use it. You can use it for your libraries, too. - When we speak of free software, we are referring to freedom, not +When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. - To protect your rights, we need to make restrictions that forbid +To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library, or if you modify it. - For example, if you distribute copies of the library, whether gratis +For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you. You must make sure that they, too, receive or can get the source code. If you link a program with the library, you must provide @@ -44351,32 +44560,32 @@ complete object files to the recipients so that they can relink them with the library, after making changes to the library and recompiling it. And you must show them these terms so they know their rights. - Our method of protecting your rights has two steps: (1) copyright +Our method of protecting your rights has two steps: (1) copyright the library, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the library. - Also, for each distributor's protection, we want to make certain +Also, for each distributor's protection, we want to make certain that everyone understands that there is no warranty for this free library. If the library is modified by someone else and passed on, we want its recipients to know that what they have is not the original version, so that any problems introduced by others will not reflect on the original authors' reputations. - Finally, any free program is threatened constantly by software +Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that companies distributing free software will individually obtain patent licenses, thus in effect transforming the program into proprietary software. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. - Most GNU software, including some libraries, is covered by the ordinary +Most GNU software, including some libraries, is covered by the ordinary GNU General Public License, which was designed for utility programs. This license, the GNU Library General Public License, applies to certain designated libraries. This license is quite different from the ordinary one; be sure to read it in full, and don't assume that anything in it is the same as in the ordinary license. - The reason we have a separate public license for some libraries is that +The reason we have a separate public license for some libraries is that they blur the distinction we usually make between modifying or adding to a program and simply using it. Linking a program with a library, without changing the library, is in some sense simply using the library, and is @@ -44385,12 +44594,12 @@ a textual and legal sense, the linked executable is a combined work, a derivative of the original library, and the ordinary General Public License treats it as such. - Because of this blurred distinction, using the ordinary General +Because of this blurred distinction, using the ordinary General Public License for libraries did not effectively promote software sharing, because most developers did not use the libraries. We concluded that weaker conditions might promote sharing better. - However, unrestricted linking of non-free programs would deprive the +However, unrestricted linking of non-free programs would deprive the users of those programs of all benefit from the free status of the libraries themselves. This Library General Public License is intended to permit developers of non-free programs to use free libraries, while @@ -44400,29 +44609,29 @@ this as regards changes in header files, but we have achieved it as regards changes in the actual functions of the Library.) The hope is that this will lead to faster development of free libraries. - The precise terms and conditions for copying, distribution and +The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a "work based on the library" and a "work that uses the library". The former contains code derived from the library, while the latter only works together with the library. - Note that it is possible for a library to be covered by the ordinary +Note that it is possible for a library to be covered by the ordinary General Public License rather than by this special one. - GNU LIBRARY GENERAL PUBLIC LICENSE - TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION + GNU LIBRARY GENERAL PUBLIC LICENSE +TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION - 0. This License Agreement applies to any software library which +0. This License Agreement applies to any software library which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Library General Public License (also called "this License"). Each licensee is addressed as "you". - A "library" means a collection of software functions and/or data +A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables. - The "Library", below, refers to any such software library or work +The "Library", below, refers to any such software library or work which has been distributed under these terms. A "work based on the Library" means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a @@ -44430,13 +44639,13 @@ portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the term "modification".) - "Source code" for a work means the preferred form of the work for +"Source code" for a work means the preferred form of the work for making modifications to it. For a library, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the library. - Activities other than copying, distribution and modification are not +Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running a program using the Library is not restricted, and output from such a program is covered only if its contents constitute a work based @@ -44444,7 +44653,7 @@ on the Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does. - 1. You may copy and distribute verbatim copies of the Library's +1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact @@ -44452,37 +44661,37 @@ all the notices that refer to this License and to the absence of any warranty; and distribute a copy of this License along with the Library. - You may charge a fee for the physical act of transferring a copy, +You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. - 2. You may modify your copy or copies of the Library or any portion +2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: - a) The modified work must itself be a software library. +a) The modified work must itself be a software library. - b) You must cause the files modified to carry prominent notices - stating that you changed the files and the date of any change. +b) You must cause the files modified to carry prominent notices +stating that you changed the files and the date of any change. - c) You must cause the whole of the work to be licensed at no - charge to all third parties under the terms of this License. +c) You must cause the whole of the work to be licensed at no +charge to all third parties under the terms of this License. - d) If a facility in the modified Library refers to a function or a - table of data to be supplied by an application program that uses - the facility, other than as an argument passed when the facility - is invoked, then you must make a good faith effort to ensure that, - in the event an application does not supply such function or - table, the facility still operates, and performs whatever part of - its purpose remains meaningful. +d) If a facility in the modified Library refers to a function or a +table of data to be supplied by an application program that uses +the facility, other than as an argument passed when the facility +is invoked, then you must make a good faith effort to ensure that, +in the event an application does not supply such function or +table, the facility still operates, and performs whatever part of +its purpose remains meaningful. - (For example, a function in a library to compute square roots has - a purpose that is entirely well-defined independent of the - application. Therefore, Subsection 2d requires that any - application-supplied function or table used by this function must - be optional: if the application does not supply it, the square - root function must still compute square roots.) +(For example, a function in a library to compute square roots has +a purpose that is entirely well-defined independent of the +application. Therefore, Subsection 2d requires that any +application-supplied function or table used by this function must +be optional: if the application does not supply it, the square +root function must still compute square roots.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Library, @@ -44505,7 +44714,7 @@ with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. - 3. You may opt to apply the terms of the ordinary GNU General Public +3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, @@ -44514,65 +44723,65 @@ ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.) Do not make any other change in these notices. - Once this change is made in a given copy, it is irreversible for +Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy. - This option is useful when you wish to copy part of the code of +This option is useful when you wish to copy part of the code of the Library into a program that is not a library. - 4. You may copy and distribute the Library (or a portion or +4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange. - If distribution of object code is made by offering access to copy +If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code. - 5. A program that contains no derivative of any portion of the +5. A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or linked with it, is called a "work that uses the Library". Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License. - However, linking a "work that uses the Library" with the Library +However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a "work that uses the library". The executable is therefore covered by this License. Section 6 states terms for distribution of such executables. - When a "work that uses the Library" uses material from a header file +When a "work that uses the Library" uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library. The threshold for this to be true is not precisely defined by law. - If such an object file uses only numerical parameters, data +If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whether it is legally a derivative work. (Executables containing this object code plus portions of the Library will still fall under Section 6.) - Otherwise, if the work is a derivative of the Library, you may +Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked directly with the Library itself. - 6. As an exception to the Sections above, you may also compile or +6. As an exception to the Sections above, you may also compile or link a "work that uses the Library" with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications. - You must give prominent notice with each copy of the work that the +You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License. You must supply a copy of this License. If the work during execution displays copyright notices, you must include the @@ -44580,31 +44789,31 @@ copyright notice for the Library among them, as well as a reference directing the user to the copy of this License. Also, you must do one of these things: - a) Accompany the work with the complete corresponding - machine-readable source code for the Library including whatever - changes were used in the work (which must be distributed under - Sections 1 and 2 above); and, if the work is an executable linked - with the Library, with the complete machine-readable "work that - uses the Library", as object code and/or source code, so that the - user can modify the Library and then relink to produce a modified - executable containing the modified Library. (It is understood - that the user who changes the contents of definitions files in the - Library will not necessarily be able to recompile the application - to use the modified definitions.) - - b) Accompany the work with a written offer, valid for at - least three years, to give the same user the materials - specified in Subsection 6a, above, for a charge no more - than the cost of performing this distribution. - - c) If distribution of the work is made by offering access to copy - from a designated place, offer equivalent access to copy the above - specified materials from the same place. - - d) Verify that the user has already received a copy of these - materials or that you have already sent this user a copy. - - For an executable, the required form of the "work that uses the +a) Accompany the work with the complete corresponding +machine-readable source code for the Library including whatever +changes were used in the work (which must be distributed under +Sections 1 and 2 above); and, if the work is an executable linked +with the Library, with the complete machine-readable "work that +uses the Library", as object code and/or source code, so that the +user can modify the Library and then relink to produce a modified +executable containing the modified Library. (It is understood +that the user who changes the contents of definitions files in the +Library will not necessarily be able to recompile the application +to use the modified definitions.) + +b) Accompany the work with a written offer, valid for at +least three years, to give the same user the materials +specified in Subsection 6a, above, for a charge no more +than the cost of performing this distribution. + +c) If distribution of the work is made by offering access to copy +from a designated place, offer equivalent access to copy the above +specified materials from the same place. + +d) Verify that the user has already received a copy of these +materials or that you have already sent this user a copy. + +For an executable, the required form of the "work that uses the Library" must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the source code distributed need not include anything that is normally @@ -44613,29 +44822,29 @@ components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. - It may happen that this requirement contradicts the license +It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an executable that you distribute. - 7. You may place library facilities that are a work based on the +7. You may place library facilities that are a work based on the Library side-by-side in a single library together with other library facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted, and provided that you do these two things: - a) Accompany the combined library with a copy of the same work - based on the Library, uncombined with any other library - facilities. This must be distributed under the terms of the - Sections above. +a) Accompany the combined library with a copy of the same work +based on the Library, uncombined with any other library +facilities. This must be distributed under the terms of the +Sections above. - b) Give prominent notice with the combined library of the fact - that part of it is a work based on the Library, and explaining - where to find the accompanying uncombined form of the same work. +b) Give prominent notice with the combined library of the fact +that part of it is a work based on the Library, and explaining +where to find the accompanying uncombined form of the same work. - 8. You may not copy, modify, sublicense, link with, or distribute +8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your @@ -44643,7 +44852,7 @@ rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. - 9. You are not required to accept this License, since you have not +9. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by @@ -44652,7 +44861,7 @@ Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it. - 10. Each time you redistribute the Library (or any work based on the +10. Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and conditions. You may not impose any further @@ -44660,7 +44869,7 @@ restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License. - 11. If, as a consequence of a court judgment or allegation of patent +11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not @@ -44691,7 +44900,7 @@ impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. - 12. If the distribution and/or use of the Library is restricted in +12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries, @@ -44699,7 +44908,7 @@ so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. - 13. The Free Software Foundation may publish revised and/or new +13. The Free Software Foundation may publish revised and/or new versions of the Library General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. @@ -44712,7 +44921,7 @@ the Free Software Foundation. If the Library does not specify a license version number, you may choose any version ever published by the Free Software Foundation. - 14. If you wish to incorporate parts of the Library into other free +14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free @@ -44721,9 +44930,9 @@ decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. - NO WARRANTY + NO WARRANTY - 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO +15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY @@ -44733,7 +44942,7 @@ PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. - 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN +16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR @@ -44744,37 +44953,37 @@ FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. - END OF TERMS AND CONDITIONS + END OF TERMS AND CONDITIONS - Appendix: How to Apply These Terms to Your New Libraries +Appendix: How to Apply These Terms to Your New Libraries - If you develop a new library, and you want it to be of the greatest +If you develop a new library, and you want it to be of the greatest possible use to the public, we recommend making it free software that everyone can redistribute and change. You can do so by permitting redistribution under these terms (or, alternatively, under the terms of the ordinary General Public License). - To apply these terms, attach the following notices to the library. It is +To apply these terms, attach the following notices to the library. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to where the full notice is found. - <one line to give the library's name and a brief idea of what it does.> - Copyright (C) <year> <name of author> +<one line to give the library's name and a brief idea of what it does.> +Copyright (C) <year> <name of author> - This library is free software; you can redistribute it and/or - modify it under the terms of the GNU Library General Public - License as published by the Free Software Foundation; either - version 2 of the License, or (at your option) any later version. +This library is free software; you can redistribute it and/or +modify it under the terms of the GNU Library General Public +License as published by the Free Software Foundation; either +version 2 of the License, or (at your option) any later version. - This library is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU - Library General Public License for more details. +This library is distributed in the hope that it will be useful, +but WITHOUT ANY WARRANTY; without even the implied warranty of +MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU +Library General Public License for more details. - You should have received a copy of the GNU Library General Public - License along with this library; if not, write to the Free - Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. +You should have received a copy of the GNU Library General Public +License along with this library; if not, write to the Free +Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. Also add information on how to contact you by electronic and paper mail. @@ -44782,11 +44991,11 @@ You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the library, if necessary. Here is a sample; alter the names: - Yoyodyne, Inc., hereby disclaims all copyright interest in the - library `Frob' (a library for tweaking knobs) written by James Random Hacker. +Yoyodyne, Inc., hereby disclaims all copyright interest in the +library `Frob' (a library for tweaking knobs) written by James Random Hacker. - <signature of Ty Coon>, 1 April 1990 - Ty Coon, President of Vice +<signature of Ty Coon>, 1 April 1990 +Ty Coon, President of Vice That's all there is to it! @end example |