-*- buffer-read-only: t -*- !!!!!!! DO NOT EDIT THIS FILE !!!!!!! This file is built by autodoc.pl extracting documentation from the C source files. Any changes made here will be lost! =head1 NAME perlintern - autogenerated documentation of purely B Perl functions =head1 DESCRIPTION X X This file is the autogenerated documentation of functions in the Perl interpreter that are documented using Perl's internal documentation format but are not marked as part of the Perl API. In other words, B! =head1 Array Manipulation Functions =over 8 =item AvFILLp X int AvFILLp(AV* av) =for hackers Found in file av.h =back =head1 Compile-time scope hooks =over 8 =item BhkENTRY X NOTE: this function is experimental and may change or be removed without notice. Return an entry from the BHK structure. C is a preprocessor token indicating which entry to return. If the appropriate flag is not set this will return C. The type of the return value depends on which entry you ask for. void * BhkENTRY(BHK *hk, which) =for hackers Found in file op.h =item BhkFLAGS X NOTE: this function is experimental and may change or be removed without notice. Return the BHK's flags. U32 BhkFLAGS(BHK *hk) =for hackers Found in file op.h =item CALL_BLOCK_HOOKS X NOTE: this function is experimental and may change or be removed without notice. Call all the registered block hooks for type C. C is a preprocessing token; the type of C depends on C. void CALL_BLOCK_HOOKS(which, arg) =for hackers Found in file op.h =back =head1 Custom Operators =over 8 =item core_prototype X This function assigns the prototype of the named core function to C, or to a new mortal SV if C is C. It returns the modified C, or C if the core function has no prototype. C is a code as returned by C. It must not be equal to 0. SV * core_prototype(SV *sv, const char *name, const int code, int * const opnum) =for hackers Found in file op.c =back =head1 CV Manipulation Functions =over 8 =item docatch X Check for the cases 0 or 3 of cur_env.je_ret, only used inside an eval context. 0 is used as continue inside eval, 3 is used for a die caught by an inner eval - continue inner loop See F: je_mustcatch, when set at any runlevel to TRUE, means eval ops must establish a local jmpenv to handle exception traps. OP* docatch(Perl_ppaddr_t firstpp) =for hackers Found in file pp_ctl.c =back =head1 CV reference counts and CvOUTSIDE =over 8 =item CvWEAKOUTSIDE X Each CV has a pointer, C, to its lexically enclosing CV (if any). Because pointers to anonymous sub prototypes are stored in C<&> pad slots, it is a possible to get a circular reference, with the parent pointing to the child and vice-versa. To avoid the ensuing memory leak, we do not increment the reference count of the CV pointed to by C in the I that the parent has a C<&> pad slot pointing back to us. In this case, we set the C flag in the child. This allows us to determine under what circumstances we should decrement the refcount of the parent when freeing the child. There is a further complication with non-closure anonymous subs (i.e. those that do not refer to any lexicals outside that sub). In this case, the anonymous prototype is shared rather than being cloned. This has the consequence that the parent may be freed while there are still active children, I, BEGIN { $a = sub { eval '$x' } } In this case, the BEGIN is freed immediately after execution since there are no active references to it: the anon sub prototype has C set since it's not a closure, and $a points to the same CV, so it doesn't contribute to BEGIN's refcount either. When $a is executed, the C causes the chain of Cs to be followed, and the freed BEGIN is accessed. To avoid this, whenever a CV and its associated pad is freed, any C<&> entries in the pad are explicitly removed from the pad, and if the refcount of the pointed-to anon sub is still positive, then that child's C is set to point to its grandparent. This will only occur in the single specific case of a non-closure anon prototype having one or more active references (such as C<$a> above). One other thing to consider is that a CV may be merely undefined rather than freed, eg C. In this case, its refcount may not have reached zero, but we still delete its pad and its C etc. Since various children may still have their C pointing at this undefined CV, we keep its own C for the time being, so that the chain of lexical scopes is unbroken. For example, the following should print 123: my $x = 123; sub tmp { sub { eval '$x' } } my $a = tmp(); undef &tmp; print $a->(); bool CvWEAKOUTSIDE(CV *cv) =for hackers Found in file cv.h =back =head1 Embedding Functions =over 8 =item cv_dump X dump the contents of a CV void cv_dump(const CV *cv, const char *title) =for hackers Found in file pad.c =item cv_forget_slab X When a CV has a reference count on its slab (C), it is responsible for making sure it is freed. (Hence, no two CVs should ever have a reference count on the same slab.) The CV only needs to reference the slab during compilation. Once it is compiled and C attached, it has finished its job, so it can forget the slab. void cv_forget_slab(CV *cv) =for hackers Found in file pad.c =item do_dump_pad X Dump the contents of a padlist void do_dump_pad(I32 level, PerlIO *file, PADLIST *padlist, int full) =for hackers Found in file pad.c =item pad_alloc_name X Allocates a place in the currently-compiling pad (via L) and then stores a name for that entry. C is adopted and becomes the name entry; it must already contain the name string. C and C and the C flag get added to C. None of the other processing of L is done. Returns the offset of the allocated pad slot. PADOFFSET pad_alloc_name(PADNAME *name, U32 flags, HV *typestash, HV *ourstash) =for hackers Found in file pad.c =item pad_block_start X Update the pad compilation state variables on entry to a new block. void pad_block_start(int full) =for hackers Found in file pad.c =item pad_check_dup X Check for duplicate declarations: report any of: * a 'my' in the current scope with the same name; * an 'our' (anywhere in the pad) with the same name and the same stash as 'ourstash' C indicates that the name to check is an C<"our"> declaration. void pad_check_dup(PADNAME *name, U32 flags, const HV *ourstash) =for hackers Found in file pad.c =item pad_findlex X Find a named lexical anywhere in a chain of nested pads. Add fake entries in the inner pads if it's found in an outer one. Returns the offset in the bottom pad of the lex or the fake lex. C is the CV in which to start the search, and seq is the current C to match against. If C is true, print appropriate warnings. The C* vars return values, and so are pointers to where the returned values should be stored. C, if non-null, requests that the innermost instance of the lexical is captured; C is set to the innermost matched pad name or fake pad name; C returns the flags normally associated with the C field of a fake pad name. Note that C is recursive; it recurses up the chain of CVs, then comes back down, adding fake entries as it goes. It has to be this way because fake names in anon protoypes have to store in C the index into the parent pad. PADOFFSET pad_findlex(const char *namepv, STRLEN namelen, U32 flags, const CV* cv, U32 seq, int warn, SV** out_capture, PADNAME** out_name, int *out_flags) =for hackers Found in file pad.c =item pad_fixup_inner_anons X For any anon CVs in the pad, change C of that CV from C to C if necessary. Needed when a newly-compiled CV has to be moved to a pre-existing CV struct. void pad_fixup_inner_anons(PADLIST *padlist, CV *old_cv, CV *new_cv) =for hackers Found in file pad.c =item pad_free X Free the SV at offset po in the current pad. void pad_free(PADOFFSET po) =for hackers Found in file pad.c =item pad_leavemy X Cleanup at end of scope during compilation: set the max seq number for lexicals in this scope and warn of any lexicals that never got introduced. OP * pad_leavemy() =for hackers Found in file pad.c =item padlist_dup X Duplicates a pad. PADLIST * padlist_dup(PADLIST *srcpad, CLONE_PARAMS *param) =for hackers Found in file pad.c =item padname_dup X Duplicates a pad name. PADNAME * padname_dup(PADNAME *src, CLONE_PARAMS *param) =for hackers Found in file pad.c =item padnamelist_dup X Duplicates a pad name list. PADNAMELIST * padnamelist_dup(PADNAMELIST *srcpad, CLONE_PARAMS *param) =for hackers Found in file pad.c =item pad_push X Push a new pad frame onto the padlist, unless there's already a pad at this depth, in which case don't bother creating a new one. Then give the new pad an C<@_> in slot zero. void pad_push(PADLIST *padlist, int depth) =for hackers Found in file pad.c =item pad_reset X Mark all the current temporaries for reuse void pad_reset() =for hackers Found in file pad.c =item pad_swipe X Abandon the tmp in the current pad at offset C and replace with a new one. void pad_swipe(PADOFFSET po, bool refadjust) =for hackers Found in file pad.c =back =head1 Errno =over 8 =item dSAVEDERRNO X Declare variables needed to save C and any operating system specific error number. void dSAVEDERRNO =for hackers Found in file perl.h =item dSAVE_ERRNO X Declare variables needed to save C and any operating system specific error number, and save them for optional later restoration by C. void dSAVE_ERRNO =for hackers Found in file perl.h =item RESTORE_ERRNO X Restore C and any operating system specific error number that was saved by C or C. void RESTORE_ERRNO =for hackers Found in file perl.h =item SAVE_ERRNO X Save C and any operating system specific error number for optional later restoration by C. Requires C or C in scope. void SAVE_ERRNO =for hackers Found in file perl.h =item SETERRNO X Set C, and on VMS set C. void SETERRNO(int errcode, int vmserrcode) =for hackers Found in file perl.h =back =head1 GV Functions =over 8 =item gv_try_downgrade X NOTE: this function is experimental and may change or be removed without notice. If the typeglob C can be expressed more succinctly, by having something other than a real GV in its place in the stash, replace it with the optimised form. Basic requirements for this are that C is a real typeglob, is sufficiently ordinary, and is only referenced from its package. This function is meant to be used when a GV has been looked up in part to see what was there, causing upgrading, but based on what was found it turns out that the real GV isn't required after all. If C is a completely empty typeglob, it is deleted from the stash. If C is a typeglob containing only a sufficiently-ordinary constant sub, the typeglob is replaced with a scalar-reference placeholder that more compactly represents the same thing. void gv_try_downgrade(GV* gv) =for hackers Found in file gv.c =back =head1 Hash Manipulation Functions =over 8 =item hv_ename_add X Adds a name to a stash's internal list of effective names. See C>. This is called when a stash is assigned to a new location in the symbol table. void hv_ename_add(HV *hv, const char *name, U32 len, U32 flags) =for hackers Found in file hv.c =item hv_ename_delete X Removes a name from a stash's internal list of effective names. If this is the name returned by C, then another name in the list will take its place (C will use it). This is called when a stash is deleted from the symbol table. void hv_ename_delete(HV *hv, const char *name, U32 len, U32 flags) =for hackers Found in file hv.c =item refcounted_he_chain_2hv X Generates and returns a C representing the content of a C chain. C is currently unused and must be zero. HV * refcounted_he_chain_2hv( const struct refcounted_he *c, U32 flags ) =for hackers Found in file hv.c =item refcounted_he_fetch_pv X Like L, but takes a nul-terminated string instead of a string/length pair. SV * refcounted_he_fetch_pv( const struct refcounted_he *chain, const char *key, U32 hash, U32 flags ) =for hackers Found in file hv.c =item refcounted_he_fetch_pvn X Search along a C chain for an entry with the key specified by C and C. If C has the C bit set, the key octets are interpreted as UTF-8, otherwise they are interpreted as Latin-1. C is a precomputed hash of the key string, or zero if it has not been precomputed. Returns a mortal scalar representing the value associated with the key, or C<&PL_sv_placeholder> if there is no value associated with the key. SV * refcounted_he_fetch_pvn( const struct refcounted_he *chain, const char *keypv, STRLEN keylen, U32 hash, U32 flags ) =for hackers Found in file hv.c =item refcounted_he_fetch_pvs X Like L, but takes a literal string instead of a string/length pair, and no precomputed hash. SV * refcounted_he_fetch_pvs( const struct refcounted_he *chain, "key", U32 flags ) =for hackers Found in file hv.h =item refcounted_he_fetch_sv X Like L, but takes a Perl scalar instead of a string/length pair. SV * refcounted_he_fetch_sv( const struct refcounted_he *chain, SV *key, U32 hash, U32 flags ) =for hackers Found in file hv.c =item refcounted_he_free X Decrements the reference count of a C by one. If the reference count reaches zero the structure's memory is freed, which (recursively) causes a reduction of its parent C's reference count. It is safe to pass a null pointer to this function: no action occurs in this case. void refcounted_he_free(struct refcounted_he *he) =for hackers Found in file hv.c =item refcounted_he_inc X Increment the reference count of a C. The pointer to the C is also returned. It is safe to pass a null pointer to this function: no action occurs and a null pointer is returned. struct refcounted_he * refcounted_he_inc( struct refcounted_he *he ) =for hackers Found in file hv.c =item refcounted_he_new_pv X Like L, but takes a nul-terminated string instead of a string/length pair. struct refcounted_he * refcounted_he_new_pv( struct refcounted_he *parent, const char *key, U32 hash, SV *value, U32 flags ) =for hackers Found in file hv.c =item refcounted_he_new_pvn X Creates a new C. This consists of a single key/value pair and a reference to an existing C chain (which may be empty), and thus forms a longer chain. When using the longer chain, the new key/value pair takes precedence over any entry for the same key further along the chain. The new key is specified by C and C. If C has the C bit set, the key octets are interpreted as UTF-8, otherwise they are interpreted as Latin-1. C is a precomputed hash of the key string, or zero if it has not been precomputed. C is the scalar value to store for this key. C is copied by this function, which thus does not take ownership of any reference to it, and later changes to the scalar will not be reflected in the value visible in the C. Complex types of scalar will not be stored with referential integrity, but will be coerced to strings. C may be either null or C<&PL_sv_placeholder> to indicate that no value is to be associated with the key; this, as with any non-null value, takes precedence over the existence of a value for the key further along the chain. C points to the rest of the C chain to be attached to the new C. This function takes ownership of one reference to C, and returns one reference to the new C. struct refcounted_he * refcounted_he_new_pvn( struct refcounted_he *parent, const char *keypv, STRLEN keylen, U32 hash, SV *value, U32 flags ) =for hackers Found in file hv.c =item refcounted_he_new_pvs X Like L, but takes a literal string instead of a string/length pair, and no precomputed hash. struct refcounted_he * refcounted_he_new_pvs( struct refcounted_he *parent, "key", SV *value, U32 flags ) =for hackers Found in file hv.h =item refcounted_he_new_sv X Like L, but takes a Perl scalar instead of a string/length pair. struct refcounted_he * refcounted_he_new_sv( struct refcounted_he *parent, SV *key, U32 hash, SV *value, U32 flags ) =for hackers Found in file hv.c =back =head1 IO Functions =over 8 =item start_glob X NOTE: this function is experimental and may change or be removed without notice. Function called by C to spawn a glob (or do the glob inside perl on VMS). This code used to be inline, but now perl uses C this glob starter is only used by miniperl during the build process, or when PERL_EXTERNAL_GLOB is defined. Moving it away shrinks F; shrinking F helps speed perl up. NOTE: this function must be explicitly called as Perl_start_glob with an aTHX_ parameter. PerlIO* Perl_start_glob(pTHX_ SV *tmpglob, IO *io) =for hackers Found in file doio.c =back =head1 Lexer interface =over 8 =item validate_proto X NOTE: this function is experimental and may change or be removed without notice. This function performs syntax checking on a prototype, C. If C is true, any illegal characters or mismatched brackets will trigger illegalproto warnings, declaring that they were detected in the prototype for C. The return value is C if this is a valid prototype, and C if it is not, regardless of whether C was C or C. Note that C is a valid C and will always return C. bool validate_proto(SV *name, SV *proto, bool warn, bool curstash) =for hackers Found in file toke.c =back =head1 Magical Functions =over 8 =item magic_clearhint X Triggered by a delete from C<%^H>, records the key to C. int magic_clearhint(SV* sv, MAGIC* mg) =for hackers Found in file mg.c =item magic_clearhints X Triggered by clearing C<%^H>, resets C. int magic_clearhints(SV* sv, MAGIC* mg) =for hackers Found in file mg.c =item magic_methcall X Invoke a magic method (like FETCH). C and C are the tied thingy and the tie magic. C is the name of the method to call. C is the number of args (in addition to $self) to pass to the method. The C can be: G_DISCARD invoke method with G_DISCARD flag and don't return a value G_UNDEF_FILL fill the stack with argc pointers to PL_sv_undef The arguments themselves are any values following the C argument. Returns the SV (if any) returned by the method, or C on failure. NOTE: this function must be explicitly called as Perl_magic_methcall with an aTHX_ parameter. SV* Perl_magic_methcall(pTHX_ SV *sv, const MAGIC *mg, SV *meth, U32 flags, U32 argc, ...) =for hackers Found in file mg.c =item magic_sethint X Triggered by a store to C<%^H>, records the key/value pair to C. It is assumed that hints aren't storing anything that would need a deep copy. Maybe we should warn if we find a reference. int magic_sethint(SV* sv, MAGIC* mg) =for hackers Found in file mg.c =item mg_localize X Copy some of the magic from an existing SV to new localized version of that SV. Container magic (I, C<%ENV>, C<$1>, C) gets copied, value magic doesn't (I, C, C). If C is false then no set magic will be called on the new (empty) SV. This typically means that assignment will soon follow (e.g. S>), and that will handle the magic. void mg_localize(SV* sv, SV* nsv, bool setmagic) =for hackers Found in file mg.c =back =head1 Miscellaneous Functions =over 8 =item free_c_backtrace X Deallocates a backtrace received from get_c_bracktrace. void free_c_backtrace(Perl_c_backtrace* bt) =for hackers Found in file util.c =item get_c_backtrace X Collects the backtrace (aka "stacktrace") into a single linear malloced buffer, which the caller B C. Scans the frames back by S>, then drops the C innermost, returning at most C frames. Perl_c_backtrace* get_c_backtrace(int max_depth, int skip) =for hackers Found in file util.c =item quadmath_format_needed X C returns true if the C string seems to contain at least one non-Q-prefixed C<%[efgaEFGA]> format specifier, or returns false otherwise. The format specifier detection is not complete printf-syntax detection, but it should catch most common cases. If true is returned, those arguments B in theory be processed with C, but in case there is more than one such format specifier (see L), and if there is anything else beyond that one (even just a single byte), they B be processed because C is very strict, accepting only one format spec, and nothing else. In this case, the code should probably fail. bool quadmath_format_needed(const char* format) =for hackers Found in file util.c =item quadmath_format_valid X C is very strict about its C string and will fail, returning -1, if the format is invalid. It accepts exactly one format spec. C checks that the intended single spec looks sane: begins with C<%>, has only one C<%>, ends with C<[efgaEFGA]>, and has C before it. This is not a full "printf syntax check", just the basics. Returns true if it is valid, false if not. See also L. bool quadmath_format_valid(const char* format) =for hackers Found in file util.c =back =head1 MRO Functions =over 8 =item mro_get_linear_isa_dfs X Returns the Depth-First Search linearization of C<@ISA> the given stash. The return value is a read-only AV*. C should be 0 (it is used internally in this function's recursion). You are responsible for C on the return value if you plan to store it anywhere semi-permanently (otherwise it might be deleted out from under you the next time the cache is invalidated). AV* mro_get_linear_isa_dfs(HV* stash, U32 level) =for hackers Found in file mro_core.c =item mro_isa_changed_in X Takes the necessary steps (cache invalidations, mostly) when the C<@ISA> of the given package has changed. Invoked by the C magic, should not need to invoke directly. void mro_isa_changed_in(HV* stash) =for hackers Found in file mro_core.c =item mro_package_moved X Call this function to signal to a stash that it has been assigned to another spot in the stash hierarchy. C is the stash that has been assigned. C is the stash it replaces, if any. C is the glob that is actually being assigned to. This can also be called with a null first argument to indicate that C has been deleted. This function invalidates isa caches on the old stash, on all subpackages nested inside it, and on the subclasses of all those, including non-existent packages that have corresponding entries in C. It also sets the effective names (C) on all the stashes as appropriate. If the C is present and is not in the symbol table, then this function simply returns. This checked will be skipped if C. void mro_package_moved(HV * const stash, HV * const oldstash, const GV * const gv, U32 flags) =for hackers Found in file mro_core.c =back =head1 Numeric functions =over 8 =item grok_atoUV X parse a string, looking for a decimal unsigned integer. On entry, C points to the beginning of the string; C points to a UV that will receive the converted value, if found; C is either NULL or points to a variable that points to one byte beyond the point in C that this routine should examine. If C is NULL, C is assumed to be NUL-terminated. Returns FALSE if C doesn't represent a valid unsigned integer value (with no leading zeros). Otherwise it returns TRUE, and sets C<*valptr> to that value. If you constrain the portion of C that is looked at by this function (by passing a non-NULL C), and if the intial bytes of that portion form a valid value, it will return TRUE, setting C<*endptr> to the byte following the final digit of the value. But if there is no constraint at what's looked at, all of C must be valid in order for TRUE to be returned. C<*endptr> is unchanged from its value on input if FALSE is returned; The only characters this accepts are the decimal digits '0'..'9'. As opposed to L or L, C does NOT allow optional leading whitespace, nor negative inputs. If such features are required, the calling code needs to explicitly implement those. Note that this function returns FALSE for inputs that would overflow a UV, or have leading zeros. Thus a single C<0> is accepted, but not C<00> nor C<01>, C<002>, I. Background: C has severe problems with illegal inputs, it cannot be used for incremental parsing, and therefore should be avoided C and C are also affected by locale settings, which can also be seen as a bug (global state controlled by user environment). bool grok_atoUV(const char* pv, UV* valptr, const char** endptr) =for hackers Found in file numeric.c =item isinfnansv X Checks whether the argument would be either an infinity or C when used as a number, but is careful not to trigger non-numeric or uninitialized warnings. it assumes the caller has done C already. bool isinfnansv(SV *sv) =for hackers Found in file numeric.c =back =head1 Obsolete backwards compatibility functions =over 8 =item utf8n_to_uvuni X DEPRECATED! It is planned to remove this function from a future release of Perl. Do not use it for new code; remove it from existing code. Instead use L, or rarely, L. This function was useful for code that wanted to handle both EBCDIC and ASCII platforms with Unicode properties, but starting in Perl v5.20, the distinctions between the platforms have mostly been made invisible to most code, so this function is quite unlikely to be what you want. If you do need this precise functionality, use instead C> or C>. UV utf8n_to_uvuni(const U8 *s, STRLEN curlen, STRLEN *retlen, U32 flags) =for hackers Found in file mathoms.c =item utf8_to_uvuni X DEPRECATED! It is planned to remove this function from a future release of Perl. Do not use it for new code; remove it from existing code. Returns the Unicode code point of the first character in the string C which is assumed to be in UTF-8 encoding; C will be set to the length, in bytes, of that character. Some, but not all, UTF-8 malformations are detected, and in fact, some malformed input could cause reading beyond the end of the input buffer, which is one reason why this function is deprecated. The other is that only in extremely limited circumstances should the Unicode versus native code point be of any interest to you. See L for alternatives. If C points to one of the detected malformations, and UTF8 warnings are enabled, zero is returned and C<*retlen> is set (if C doesn't point to NULL) to -1. If those warnings are off, the computed value if well-defined (or the Unicode REPLACEMENT CHARACTER, if not) is silently returned, and C<*retlen> is set (if C isn't NULL) so that (S + C<*retlen>>) is the next possible position in C that could begin a non-malformed character. See L for details on when the REPLACEMENT CHARACTER is returned. UV utf8_to_uvuni(const U8 *s, STRLEN *retlen) =for hackers Found in file mathoms.c =item uvuni_to_utf8_flags X DEPRECATED! It is planned to remove this function from a future release of Perl. Do not use it for new code; remove it from existing code. Instead you almost certainly want to use L or L. This function is a deprecated synonym for L, which itself, while not deprecated, should be used only in isolated circumstances. These functions were useful for code that wanted to handle both EBCDIC and ASCII platforms with Unicode properties, but starting in Perl v5.20, the distinctions between the platforms have mostly been made invisible to most code, so this function is quite unlikely to be what you want. U8* uvuni_to_utf8_flags(U8 *d, UV uv, UV flags) =for hackers Found in file mathoms.c =back =head1 Optree Manipulation Functions =over 8 =item finalize_optree X This function finalizes the optree. Should be called directly after the complete optree is built. It does some additional checking which can't be done in the normal Cxxx functions and makes the tree thread-safe. void finalize_optree(OP* o) =for hackers Found in file op.c =item newATTRSUB_x X Construct a Perl subroutine, also performing some surrounding jobs. This function is expected to be called in a Perl compilation context, and some aspects of the subroutine are taken from global variables associated with compilation. In particular, C represents the subroutine that is currently being compiled. It must be non-null when this function is called, and some aspects of the subroutine being constructed are taken from it. The constructed subroutine may actually be a reuse of the C object, but will not necessarily be so. If C is null then the subroutine will have no body, and for the time being it will be an error to call it. This represents a forward subroutine declaration such as S>. If C is non-null then it provides the Perl code of the subroutine body, which will be executed when the subroutine is called. This body includes any argument unwrapping code resulting from a subroutine signature or similar. The pad use of the code must correspond to the pad attached to C. The code is not expected to include a C or C op; this function will add such an op. C is consumed by this function and will become part of the constructed subroutine. C specifies the subroutine's prototype, unless one is supplied as an attribute (see below). If C is null, then the subroutine will not have a prototype. If C is non-null, it must point to a C op whose value is a string, and the subroutine will have that string as its prototype. If a prototype is supplied as an attribute, the attribute takes precedence over C, but in that case C should preferably be null. In any case, C is consumed by this function. C supplies attributes to be applied the subroutine. A handful of attributes take effect by built-in means, being applied to C immediately when seen. Other attributes are collected up and attached to the subroutine by this route. C may be null to supply no attributes, or point to a C op for a single attribute, or point to a C op whose children apart from the C are C ops for one or more attributes. Each C op must be a string, giving the attribute name optionally followed by parenthesised arguments, in the manner in which attributes appear in Perl source. The attributes will be applied to the sub by this function. C is consumed by this function. If C is false and C is null, then the subroutine will be anonymous. If C is false and C is non-null, then C must point to a C op, which will be consumed by this function, and its string value supplies a name for the subroutine. The name may be qualified or unqualified, and if it is unqualified then a default stash will be selected in some manner. If C is true, then C doesn't point to an C at all, but is instead a cast pointer to a C by which the subroutine will be named. If there is already a subroutine of the specified name, then the new sub will either replace the existing one in the glob or be merged with the existing one. A warning may be generated about redefinition. If the subroutine has one of a few special names, such as C or C, then it will be claimed by the appropriate queue for automatic running of phase-related subroutines. In this case the relevant glob will be left not containing any subroutine, even if it did contain one before. In the case of C, the subroutine will be executed and the reference to it disposed of before this function returns. The function returns a pointer to the constructed subroutine. If the sub is anonymous then ownership of one counted reference to the subroutine is transferred to the caller. If the sub is named then the caller does not get ownership of a reference. In most such cases, where the sub has a non-phase name, the sub will be alive at the point it is returned by virtue of being contained in the glob that names it. A phase-named subroutine will usually be alive by virtue of the reference owned by the phase's automatic run queue. But a C subroutine, having already been executed, will quite likely have been destroyed already by the time this function returns, making it erroneous for the caller to make any use of the returned pointer. It is the caller's responsibility to ensure that it knows which of these situations applies. CV* newATTRSUB_x(I32 floor, OP *o, OP *proto, OP *attrs, OP *block, bool o_is_gv) =for hackers Found in file op.c =item newXS_len_flags X Construct an XS subroutine, also performing some surrounding jobs. The subroutine will have the entry point C. It will have the prototype specified by the nul-terminated string C, or no prototype if C is null. The prototype string is copied; the caller can mutate the supplied string afterwards. If C is non-null, it must be a nul-terminated filename, and the subroutine will have its C set accordingly. By default C is set to point directly to the supplied string, which must be static. If C has the C bit set, then a copy of the string will be taken instead. Other aspects of the subroutine will be left in their default state. If anything else needs to be done to the subroutine for it to function correctly, it is the caller's responsibility to do that after this function has constructed it. However, beware of the subroutine potentially being destroyed before this function returns, as described below. If C is null then the subroutine will be anonymous, with its C referring to an C<__ANON__> glob. If C is non-null then the subroutine will be named accordingly, referenced by the appropriate glob. C is a string of length C bytes giving a sigilless symbol name, in UTF-8 if C has the C bit set and in Latin-1 otherwise. The name may be either qualified or unqualified, with the stash defaulting in the same manner as for C. C may contain flag bits understood by C with the same meaning as they have there, such as C. The symbol is always added to the stash if necessary, with C semantics. If there is already a subroutine of the specified name, then the new sub will replace the existing one in the glob. A warning may be generated about the redefinition. If the old subroutine was C then the decision about whether to warn is influenced by an expectation about whether the new subroutine will become a constant of similar value. That expectation is determined by C. (Note that the call to this function doesn't make the new subroutine C in any case; that is left to the caller.) If C is null then it indicates that the new subroutine will not become a constant. If C is non-null then it indicates that the new subroutine will become a constant, and it points to an C that provides the constant value that the subroutine will have. If the subroutine has one of a few special names, such as C or C, then it will be claimed by the appropriate queue for automatic running of phase-related subroutines. In this case the relevant glob will be left not containing any subroutine, even if it did contain one before. In the case of C, the subroutine will be executed and the reference to it disposed of before this function returns, and also before its prototype is set. If a C subroutine would not be sufficiently constructed by this function to be ready for execution then the caller must prevent this happening by giving the subroutine a different name. The function returns a pointer to the constructed subroutine. If the sub is anonymous then ownership of one counted reference to the subroutine is transferred to the caller. If the sub is named then the caller does not get ownership of a reference. In most such cases, where the sub has a non-phase name, the sub will be alive at the point it is returned by virtue of being contained in the glob that names it. A phase-named subroutine will usually be alive by virtue of the reference owned by the phase's automatic run queue. But a C subroutine, having already been executed, will quite likely have been destroyed already by the time this function returns, making it erroneous for the caller to make any use of the returned pointer. It is the caller's responsibility to ensure that it knows which of these situations applies. CV * newXS_len_flags(const char *name, STRLEN len, XSUBADDR_t subaddr, const char *const filename, const char *const proto, SV **const_svp, U32 flags) =for hackers Found in file op.c =item optimize_optree X This function applies some optimisations to the optree in top-down order. It is called before the peephole optimizer, which processes ops in execution order. Note that finalize_optree() also does a top-down scan, but is called *after* the peephole optimizer. void optimize_optree(OP* o) =for hackers Found in file op.c =item traverse_op_tree X Return the next op in a depth-first traversal of the op tree, returning NULL when the traversal is complete. The initial call must supply the root of the tree as both top and o. For now it's static, but it may be exposed to the API in the future. OP* traverse_op_tree(OP* top, OP* o) =for hackers Found in file op.c =back =head1 Pad Data Structures =over 8 =item CX_CURPAD_SAVE X Save the current pad in the given context block structure. void CX_CURPAD_SAVE(struct context) =for hackers Found in file pad.h =item CX_CURPAD_SV X Access the SV at offset C in the saved current pad in the given context block structure (can be used as an lvalue). SV * CX_CURPAD_SV(struct context, PADOFFSET po) =for hackers Found in file pad.h =item PAD_BASE_SV X Get the value from slot C in the base (DEPTH=1) pad of a padlist SV * PAD_BASE_SV(PADLIST padlist, PADOFFSET po) =for hackers Found in file pad.h =item PAD_CLONE_VARS X Clone the state variables associated with running and compiling pads. void PAD_CLONE_VARS(PerlInterpreter *proto_perl, CLONE_PARAMS* param) =for hackers Found in file pad.h =item PAD_COMPNAME_FLAGS X Return the flags for the current compiling pad name at offset C. Assumes a valid slot entry. U32 PAD_COMPNAME_FLAGS(PADOFFSET po) =for hackers Found in file pad.h =item PAD_COMPNAME_GEN X The generation number of the name at offset C in the current compiling pad (lvalue). STRLEN PAD_COMPNAME_GEN(PADOFFSET po) =for hackers Found in file pad.h =item PAD_COMPNAME_GEN_set X Sets the generation number of the name at offset C in the current ling pad (lvalue) to C. STRLEN PAD_COMPNAME_GEN_set(PADOFFSET po, int gen) =for hackers Found in file pad.h =item PAD_COMPNAME_OURSTASH X Return the stash associated with an C variable. Assumes the slot entry is a valid C lexical. HV * PAD_COMPNAME_OURSTASH(PADOFFSET po) =for hackers Found in file pad.h =item PAD_COMPNAME_PV X Return the name of the current compiling pad name at offset C. Assumes a valid slot entry. char * PAD_COMPNAME_PV(PADOFFSET po) =for hackers Found in file pad.h =item PAD_COMPNAME_TYPE X Return the type (stash) of the current compiling pad name at offset C. Must be a valid name. Returns null if not typed. HV * PAD_COMPNAME_TYPE(PADOFFSET po) =for hackers Found in file pad.h =item PadnameIsOUR X Whether this is an "our" variable. bool PadnameIsOUR(PADNAME * pn) =for hackers Found in file pad.h =item PadnameIsSTATE X Whether this is a "state" variable. bool PadnameIsSTATE(PADNAME * pn) =for hackers Found in file pad.h =item PadnameOURSTASH X The stash in which this "our" variable was declared. HV * PadnameOURSTASH() =for hackers Found in file pad.h =item PadnameOUTER X Whether this entry belongs to an outer pad. Entries for which this is true are often referred to as 'fake'. bool PadnameOUTER(PADNAME * pn) =for hackers Found in file pad.h =item PadnameTYPE X The stash associated with a typed lexical. This returns the C<%Foo::> hash for C. HV * PadnameTYPE(PADNAME * pn) =for hackers Found in file pad.h =item PAD_RESTORE_LOCAL X Restore the old pad saved into the local variable C by C void PAD_RESTORE_LOCAL(PAD *opad) =for hackers Found in file pad.h =item PAD_SAVE_LOCAL X Save the current pad to the local variable C, then make the current pad equal to C void PAD_SAVE_LOCAL(PAD *opad, PAD *npad) =for hackers Found in file pad.h =item PAD_SAVE_SETNULLPAD X Save the current pad then set it to null. void PAD_SAVE_SETNULLPAD() =for hackers Found in file pad.h =item PAD_SETSV X Set the slot at offset C in the current pad to C SV * PAD_SETSV(PADOFFSET po, SV* sv) =for hackers Found in file pad.h =item PAD_SET_CUR X Set the current pad to be pad C in the padlist, saving the previous current pad. NB currently this macro expands to a string too long for some compilers, so it's best to replace it with SAVECOMPPAD(); PAD_SET_CUR_NOSAVE(padlist,n); void PAD_SET_CUR(PADLIST padlist, I32 n) =for hackers Found in file pad.h =item PAD_SET_CUR_NOSAVE X like PAD_SET_CUR, but without the save void PAD_SET_CUR_NOSAVE(PADLIST padlist, I32 n) =for hackers Found in file pad.h =item PAD_SV X Get the value at offset C in the current pad SV * PAD_SV(PADOFFSET po) =for hackers Found in file pad.h =item PAD_SVl X Lightweight and lvalue version of C. Get or set the value at offset C in the current pad. Unlike C, does not print diagnostics with -DX. For internal use only. SV * PAD_SVl(PADOFFSET po) =for hackers Found in file pad.h =item SAVECLEARSV X Clear the pointed to pad value on scope exit. (i.e. the runtime action of C) void SAVECLEARSV(SV **svp) =for hackers Found in file pad.h =item SAVECOMPPAD X save C and C void SAVECOMPPAD() =for hackers Found in file pad.h =item SAVEPADSV X Save a pad slot (used to restore after an iteration) XXX DAPM it would make more sense to make the arg a PADOFFSET void SAVEPADSV(PADOFFSET po) =for hackers Found in file pad.h =back =head1 Per-Interpreter Variables =over 8 =item PL_DBsingle X When Perl is run in debugging mode, with the B<-d> switch, this SV is a boolean which indicates whether subs are being single-stepped. Single-stepping is automatically turned on after every step. This is the C variable which corresponds to Perl's $DB::single variable. See C>. SV * PL_DBsingle =for hackers Found in file intrpvar.h =item PL_DBsub X When Perl is run in debugging mode, with the B<-d> switch, this GV contains the SV which holds the name of the sub being debugged. This is the C variable which corresponds to Perl's $DB::sub variable. See C>. GV * PL_DBsub =for hackers Found in file intrpvar.h =item PL_DBtrace X Trace variable used when Perl is run in debugging mode, with the B<-d> switch. This is the C variable which corresponds to Perl's $DB::trace variable. See C>. SV * PL_DBtrace =for hackers Found in file intrpvar.h =item PL_dowarn X The C variable that roughly corresponds to Perl's C<$^W> warning variable. However, C<$^W> is treated as a boolean, whereas C is a collection of flag bits. U8 PL_dowarn =for hackers Found in file intrpvar.h =item PL_last_in_gv X The GV which was last used for a filehandle input operation. (C<< >>) GV* PL_last_in_gv =for hackers Found in file intrpvar.h =item PL_ofsgv X The glob containing the output field separator - C<*,> in Perl space. GV* PL_ofsgv =for hackers Found in file intrpvar.h =item PL_rs X The input record separator - C<$/> in Perl space. SV* PL_rs =for hackers Found in file intrpvar.h =back =head1 Stack Manipulation Macros =over 8 =item djSP X Declare Just C. This is actually identical to C, and declares a local copy of perl's stack pointer, available via the C macro. See C>. (Available for backward source code compatibility with the old (Perl 5.005) thread model.) djSP(); =for hackers Found in file pp.h =item LVRET X True if this op will be the return value of an lvalue subroutine =for hackers Found in file pp.h =back =head1 SV Flags =over 8 =item SVt_INVLIST X Type flag for scalars. See L. =for hackers Found in file sv.h =back =head1 SV Manipulation Functions An SV (or AV, HV, etc.) is allocated in two parts: the head (struct sv, av, hv...) contains type and reference count information, and for many types, a pointer to the body (struct xrv, xpv, xpviv...), which contains fields specific to each type. Some types store all they need in the head, so don't have a body. In all but the most memory-paranoid configurations (ex: PURIFY), heads and bodies are allocated out of arenas, which by default are approximately 4K chunks of memory parcelled up into N heads or bodies. Sv-bodies are allocated by their sv-type, guaranteeing size consistency needed to allocate safely from arrays. For SV-heads, the first slot in each arena is reserved, and holds a link to the next arena, some flags, and a note of the number of slots. Snaked through each arena chain is a linked list of free items; when this becomes empty, an extra arena is allocated and divided up into N items which are threaded into the free list. SV-bodies are similar, but they use arena-sets by default, which separate the link and info from the arena itself, and reclaim the 1st slot in the arena. SV-bodies are further described later. The following global variables are associated with arenas: PL_sv_arenaroot pointer to list of SV arenas PL_sv_root pointer to list of free SV structures PL_body_arenas head of linked-list of body arenas PL_body_roots[] array of pointers to list of free bodies of svtype arrays are indexed by the svtype needed A few special SV heads are not allocated from an arena, but are instead directly created in the interpreter structure, eg PL_sv_undef. The size of arenas can be changed from the default by setting PERL_ARENA_SIZE appropriately at compile time. The SV arena serves the secondary purpose of allowing still-live SVs to be located and destroyed during final cleanup. At the lowest level, the macros new_SV() and del_SV() grab and free an SV head. (If debugging with -DD, del_SV() calls the function S_del_sv() to return the SV to the free list with error checking.) new_SV() calls more_sv() / sv_add_arena() to add an extra arena if the free list is empty. SVs in the free list have their SvTYPE field set to all ones. At the time of very final cleanup, sv_free_arenas() is called from perl_destruct() to physically free all the arenas allocated since the start of the interpreter. The function visit() scans the SV arenas list, and calls a specified function for each SV it finds which is still live - ie which has an SvTYPE other than all 1's, and a non-zero SvREFCNT. visit() is used by the following functions (specified as [function that calls visit()] / [function called by visit() for each SV]): sv_report_used() / do_report_used() dump all remaining SVs (debugging aid) sv_clean_objs() / do_clean_objs(),do_clean_named_objs(), do_clean_named_io_objs(),do_curse() Attempt to free all objects pointed to by RVs, try to do the same for all objects indir- ectly referenced by typeglobs too, and then do a final sweep, cursing any objects that remain. Called once from perl_destruct(), prior to calling sv_clean_all() below. sv_clean_all() / do_clean_all() SvREFCNT_dec(sv) each remaining SV, possibly triggering an sv_free(). It also sets the SVf_BREAK flag on the SV to indicate that the refcnt has been artificially lowered, and thus stopping sv_free() from giving spurious warnings about SVs which unexpectedly have a refcnt of zero. called repeatedly from perl_destruct() until there are no SVs left. =over 8 =item sv_2num X NOTE: this function is experimental and may change or be removed without notice. Return an SV with the numeric value of the source SV, doing any necessary reference or overload conversion. The caller is expected to have handled get-magic already. SV* sv_2num(SV *const sv) =for hackers Found in file sv.c =item sv_add_arena X Given a chunk of memory, link it to the head of the list of arenas, and split it into a list of free SVs. void sv_add_arena(char *const ptr, const U32 size, const U32 flags) =for hackers Found in file sv.c =item sv_clean_all X Decrement the refcnt of each remaining SV, possibly triggering a cleanup. This function may have to be called multiple times to free SVs which are in complex self-referential hierarchies. I32 sv_clean_all() =for hackers Found in file sv.c =item sv_clean_objs X Attempt to destroy all objects not yet freed. void sv_clean_objs() =for hackers Found in file sv.c =item sv_free_arenas X Deallocate the memory used by all arenas. Note that all the individual SV heads and bodies within the arenas must already have been freed. void sv_free_arenas() =for hackers Found in file sv.c =item SvTHINKFIRST X A quick flag check to see whether an C should be passed to C to be "downgraded" before C or C can be modified directly. For example, if your scalar is a reference and you want to modify the C slot, you can't just do C, as that will leak the referent. This is used internally by various sv-modifying functions, such as C, C and C. One case that this does not handle is a gv without SvFAKE set. After if (SvTHINKFIRST(gv)) sv_force_normal(gv); it will still be a gv. C sometimes produces false positives. In those cases C does nothing. U32 SvTHINKFIRST(SV *sv) =for hackers Found in file sv.h =back =head1 Unicode Support These are various utility functions for manipulating UTF8-encoded strings. For the uninitiated, this is a method of representing arbitrary Unicode characters as a variable number of bytes, in such a way that characters in the ASCII range are unmodified, and a zero byte never appears within non-zero characters. =over 8 =item find_uninit_var X NOTE: this function is experimental and may change or be removed without notice. Find the name of the undefined variable (if any) that caused the operator to issue a "Use of uninitialized value" warning. If match is true, only return a name if its value matches C. So roughly speaking, if a unary operator (such as C) generates a warning, then following the direct child of the op may yield an C or C that gives the name of the undefined variable. On the other hand, with C there are two branches to follow, so we only print the variable name if we get an exact match. C points to a string pointer holding the description of the op. This may be updated if needed. The name is returned as a mortal SV. Assumes that C is the OP that originally triggered the error, and that C/C points to the currently executing pad. SV* find_uninit_var(const OP *const obase, const SV *const uninit_sv, bool match, const char **desc_p) =for hackers Found in file sv.c =item isSCRIPT_RUN X Returns a bool as to whether or not the sequence of bytes from C up to but not including C form a "script run". C is TRUE iff the sequence starting at C is to be treated as UTF-8. To be precise, except for two degenerate cases given below, this function returns TRUE iff all code points in it come from any combination of three "scripts" given by the Unicode "Script Extensions" property: Common, Inherited, and possibly one other. Additionally all decimal digits must come from the same consecutive sequence of 10. For example, if all the characters in the sequence are Greek, or Common, or Inherited, this function will return TRUE, provided any decimal digits in it are from the same block of digits in Common. (These are the ASCII digits "0".."9" and additionally a block for full width forms of these, and several others used in mathematical notation.) For scripts (unlike Greek) that have their own digits defined this will accept either digits from that set or from one of the Common digit sets, but not a combination of the two. Some scripts, such as Arabic, have more than one set of digits. All digits must come from the same set for this function to return TRUE. C<*ret_script>, if C is not NULL, will on return of TRUE contain the script found, using the C typedef. Its value will be C if the function returns FALSE. If the sequence is empty, TRUE is returned, but C<*ret_script> (if asked for) will be C. If the sequence contains a single code point which is unassigned to a character in the version of Unicode being used, the function will return TRUE, and the script will be C. Any other combination of unassigned code points in the input sequence will result in the function treating the input as not being a script run. The returned script will be C iff all the code points in it are from the Inherited script. Otherwise, the returned script will be C iff all the code points in it are from the Inherited or Common scripts. bool isSCRIPT_RUN(const U8 *s, const U8 *send, const bool utf8_target) =for hackers Found in file regexec.c =item is_utf8_non_invariant_string X Returns TRUE if L returns FALSE for the first C bytes of the string C, but they are, nonetheless, legal Perl-extended UTF-8; otherwise returns FALSE. A TRUE return means that at least one code point represented by the sequence either is a wide character not representable as a single byte, or the representation differs depending on whether the sequence is encoded in UTF-8 or not. See also C>, C> bool is_utf8_non_invariant_string(const U8* const s, STRLEN len) =for hackers Found in file inline.h =item report_uninit X Print appropriate "Use of uninitialized variable" warning. void report_uninit(const SV *uninit_sv) =for hackers Found in file sv.c =item utf8_to_uvuni_buf X DEPRECATED! It is planned to remove this function from a future release of Perl. Do not use it for new code; remove it from existing code. Only in very rare circumstances should code need to be dealing in Unicode (as opposed to native) code points. In those few cases, use C> instead. If you are not absolutely sure this is one of those cases, then assume it isn't and use plain C instead. Returns the Unicode (not-native) code point of the first character in the string C which is assumed to be in UTF-8 encoding; C points to 1 beyond the end of C. C will be set to the length, in bytes, of that character. If C does not point to a well-formed UTF-8 character and UTF8 warnings are enabled, zero is returned and C<*retlen> is set (if C isn't NULL) to -1. If those warnings are off, the computed value if well-defined (or the Unicode REPLACEMENT CHARACTER, if not) is silently returned, and C<*retlen> is set (if C isn't NULL) so that (S + C<*retlen>>) is the next possible position in C that could begin a non-malformed character. See L for details on when the REPLACEMENT CHARACTER is returned. UV utf8_to_uvuni_buf(const U8 *s, const U8 *send, STRLEN *retlen) =for hackers Found in file utf8.c =item uvoffuni_to_utf8_flags X THIS FUNCTION SHOULD BE USED IN ONLY VERY SPECIALIZED CIRCUMSTANCES. Instead, B or L>. This function is like them, but the input is a strict Unicode (as opposed to native) code point. Only in very rare circumstances should code not be using the native code point. For details, see the description for L. U8* uvoffuni_to_utf8_flags(U8 *d, UV uv, const UV flags) =for hackers Found in file utf8.c =item valid_utf8_to_uvchr X Like C>, but should only be called when it is known that the next character in the input UTF-8 string C is well-formed (I, it passes C>. Surrogates, non-character code points, and non-Unicode code points are allowed. UV valid_utf8_to_uvchr(const U8 *s, STRLEN *retlen) =for hackers Found in file inline.h =item variant_under_utf8_count X This function looks at the sequence of bytes between C and C, which are assumed to be encoded in ASCII/Latin1, and returns how many of them would change should the string be translated into UTF-8. Due to the nature of UTF-8, each of these would occupy two bytes instead of the single one in the input string. Thus, this function returns the precise number of bytes the string would expand by when translated to UTF-8. Unlike most of the other functions that have C in their name, the input to this function is NOT a UTF-8-encoded string. The function name is slightly I to emphasize this. This function is internal to Perl because khw thinks that any XS code that would want this is probably operating too close to the internals. Presenting a valid use case could change that. See also C> and C>, Size_t variant_under_utf8_count(const U8* const s, const U8* const e) =for hackers Found in file inline.h =back =head1 Undocumented functions The following functions are currently undocumented. If you use one of them, you may wish to consider creating and submitting documentation for it. =over =item ASCII_TO_NEED X =item NATIVE_TO_NEED X =item POPMARK X =item PadnameIN_SCOPE X =item PerlIO_restore_errno X =item PerlIO_save_errno X =item PerlLIO_dup2_cloexec X =item PerlLIO_dup_cloexec X =item PerlLIO_open3_cloexec X =item PerlLIO_open_cloexec X =item PerlProc_pipe_cloexec X =item PerlSock_accept_cloexec X =item PerlSock_socket_cloexec X =item PerlSock_socketpair_cloexec X =item ReANY X =item Slab_Alloc X =item Slab_Free X =item Slab_to_ro X =item Slab_to_rw X =item TOPMARK X =item _add_range_to_invlist X<_add_range_to_invlist> =item _byte_dump_string X<_byte_dump_string> =item _force_out_malformed_utf8_message X<_force_out_malformed_utf8_message> =item _inverse_folds X<_inverse_folds> =item _invlistEQ X<_invlistEQ> =item _invlist_array_init X<_invlist_array_init> =item _invlist_contains_cp X<_invlist_contains_cp> =item _invlist_dump X<_invlist_dump> =item _invlist_intersection X<_invlist_intersection> =item _invlist_intersection_maybe_complement_2nd X<_invlist_intersection_maybe_complement_2nd> =item _invlist_invert X<_invlist_invert> =item _invlist_len X<_invlist_len> =item _invlist_search X<_invlist_search> =item _invlist_subtract X<_invlist_subtract> =item _invlist_union X<_invlist_union> =item _invlist_union_maybe_complement_2nd X<_invlist_union_maybe_complement_2nd> =item _is_cur_LC_category_utf8 X<_is_cur_LC_category_utf8> =item _is_in_locale_category X<_is_in_locale_category> =item _is_uni_FOO X<_is_uni_FOO> =item _is_uni_perl_idcont X<_is_uni_perl_idcont> =item _is_uni_perl_idstart X<_is_uni_perl_idstart> =item _is_utf8_FOO X<_is_utf8_FOO> =item _is_utf8_perl_idcont X<_is_utf8_perl_idcont> =item _is_utf8_perl_idstart X<_is_utf8_perl_idstart> =item _mem_collxfrm X<_mem_collxfrm> =item _new_invlist X<_new_invlist> =item _new_invlist_C_array X<_new_invlist_C_array> =item _setup_canned_invlist X<_setup_canned_invlist> =item _to_fold_latin1 X<_to_fold_latin1> =item _to_uni_fold_flags X<_to_uni_fold_flags> =item _to_upper_title_latin1 X<_to_upper_title_latin1> =item _to_utf8_fold_flags X<_to_utf8_fold_flags> =item _to_utf8_lower_flags X<_to_utf8_lower_flags> =item _to_utf8_title_flags X<_to_utf8_title_flags> =item _to_utf8_upper_flags X<_to_utf8_upper_flags> =item _utf8n_to_uvchr_msgs_helper X<_utf8n_to_uvchr_msgs_helper> =item _warn_problematic_locale X<_warn_problematic_locale> =item abort_execution X =item add_cp_to_invlist X =item alloc_LOGOP X =item allocmy X =item amagic_cmp X =item amagic_cmp_desc X =item amagic_cmp_locale X =item amagic_cmp_locale_desc X =item amagic_i_ncmp X =item amagic_i_ncmp_desc X =item amagic_is_enabled X =item amagic_ncmp X =item amagic_ncmp_desc X =item append_utf8_from_native_byte X =item apply X =item av_extend_guts X =item av_nonelem X =item av_reify X =item bind_match X =item boot_core_PerlIO X =item boot_core_UNIVERSAL X =item boot_core_mro X =item cando X =item check_utf8_print X =item ck_anoncode X =item ck_backtick X =item ck_bitop X =item ck_cmp X =item ck_concat X =item ck_defined X =item ck_delete X =item ck_each X =item ck_entersub_args_core X =item ck_eof X =item ck_eval X =item ck_exec X =item ck_exists X =item ck_ftst X =item ck_fun X =item ck_glob X =item ck_grep X =item ck_index X =item ck_isa X =item ck_join X =item ck_length X =item ck_lfun X =item ck_listiob X =item ck_match X =item ck_method X =item ck_null X =item ck_open X =item ck_prototype X =item ck_readline X =item ck_refassign X =item ck_repeat X =item ck_require X =item ck_return X =item ck_rfun X =item ck_rvconst X =item ck_sassign X =item ck_select X =item ck_shift X =item ck_smartmatch X =item ck_sort X =item ck_spair X =item ck_split X =item ck_stringify X =item ck_subr X =item ck_substr X =item ck_svconst X =item ck_tell X =item ck_trunc X =item closest_cop X =item cmp_desc X =item cmp_locale_desc X =item cmpchain_extend X =item cmpchain_finish X =item cmpchain_start X =item cntrl_to_mnemonic X =item coresub_op X =item create_eval_scope X =item croak_caller X =item croak_memory_wrap X =item croak_no_mem X =item croak_popstack X =item current_re_engine X =item custom_op_get_field X =item cv_ckproto_len_flags X =item cv_clone_into X =item cv_const_sv_or_av X =item cv_undef_flags X =item cvgv_from_hek X =item cvgv_set X =item cvstash_set X =item deb_stack_all X =item defelem_target X =item delete_eval_scope X =item delimcpy_no_escape X =item die_unwind X =item do_aexec X =item do_aexec5 X =item do_eof X =item do_exec X =item do_exec3 X =item do_ipcctl X =item do_ipcget X =item do_msgrcv X =item do_msgsnd X =item do_ncmp X =item do_open6 X =item do_open_raw X =item do_print X =item do_readline X =item do_seek X =item do_semop X =item do_shmio X =item do_sysseek X =item do_tell X =item do_trans X =item do_uniprop_match X =item do_vecget X =item do_vecset X =item do_vop X =item does_utf8_overflow X =item dofile X =item drand48_init_r X =item drand48_r X =item dtrace_probe_call X =item dtrace_probe_load X =item dtrace_probe_op X =item dtrace_probe_phase X =item dump_all_perl X =item dump_packsubs_perl X =item dump_sub_perl X =item dump_sv_child X =item dup_warnings X =item emulate_cop_io X =item find_first_differing_byte_pos X =item find_lexical_cv X =item find_runcv_where X =item find_script X =item foldEQ_latin1_s2_folded X =item foldEQ_utf8_flags X =item form_alien_digit_msg X =item form_cp_too_large_msg X =item free_tied_hv_pool X =item get_and_check_backslash_N_name X =item get_db_sub X =item get_debug_opts X =item get_deprecated_property_msg X =item get_hash_seed X =item get_invlist_iter_addr X =item get_invlist_offset_addr X =item get_invlist_previous_index_addr X =item get_no_modify X =item get_opargs X =item get_prop_definition X =item get_prop_values X =item get_re_arg X =item get_re_gclass_nonbitmap_data X =item get_regclass_nonbitmap_data X =item get_regex_charset_name X =item getenv_len X =item grok_bin_oct_hex X =item grok_bslash_c X =item grok_bslash_o X =item grok_bslash_x X =item gv_fetchmeth_internal X =item gv_override X =item gv_setref X =item gv_stashpvn_internal X =item gv_stashsvpvn_cached X =item hfree_next_entry X =item hv_backreferences_p X =item hv_kill_backrefs X =item hv_placeholders_p X =item hv_pushkv X =item hv_undef_flags X =item init_argv_symbols X =item init_constants X =item init_dbargs X =item init_debugger X =item init_i18nl10n X =item init_i18nl14n X =item init_named_cv X =item init_uniprops X =item invert X =item invlist_array X =item invlist_clear X =item invlist_clone X =item invlist_contents X =item invlist_extend X =item invlist_highest X =item invlist_is_iterating X =item invlist_iterfinish X =item invlist_iterinit X =item invlist_iternext X =item invlist_lowest X =item invlist_max X =item invlist_previous_index X =item invlist_set_len X =item invlist_set_previous_index X =item invlist_trim X =item invmap_dump X =item io_close X =item isFF_OVERLONG X =item isFOO_lc X =item is_grapheme X =item is_invlist X =item is_utf8_char_helper X =item is_utf8_common X =item is_utf8_overlong_given_start_byte_ok X =item jmaybe X =item keyword X =item keyword_plugin_standard X =item list X =item load_charnames X =item localize X =item lossless_NV_to_IV X =item magic_clear_all_env X =item magic_cleararylen_p X =item magic_clearenv X =item magic_clearisa X =item magic_clearpack X =item magic_clearsig X =item magic_copycallchecker X =item magic_existspack X =item magic_freearylen_p X =item magic_freeovrld X =item magic_get X =item magic_getarylen X =item magic_getdebugvar X =item magic_getdefelem X =item magic_getnkeys X =item magic_getpack X =item magic_getpos X =item magic_getsig X =item magic_getsubstr X =item magic_gettaint X =item magic_getuvar X =item magic_getvec X =item magic_killbackrefs X =item magic_nextpack X =item magic_regdata_cnt X =item magic_regdatum_get X =item magic_regdatum_set X =item magic_scalarpack X =item magic_set X =item magic_set_all_env X =item magic_setarylen X =item magic_setcollxfrm X =item magic_setdbline X =item magic_setdebugvar X =item magic_setdefelem X =item magic_setenv X =item magic_setisa X =item magic_setlvref X =item magic_setmglob X =item magic_setnkeys X =item magic_setnonelem X =item magic_setpack X =item magic_setpos X =item magic_setregexp X =item magic_setsig X =item magic_setsubstr X =item magic_settaint X =item magic_setutf8 X =item magic_setuvar X =item magic_setvec X =item magic_sizepack X =item magic_wipepack X =item malloc_good_size X =item malloced_size X =item mem_collxfrm X =item mem_log_alloc X =item mem_log_free X =item mem_log_realloc X =item mg_find_mglob X =item mode_from_discipline X =item more_bodies X =item mortal_getenv X =item mro_meta_dup X =item mro_meta_init X =item multiconcat_stringify X =item multideref_stringify X =item my_atof2 X =item my_atof3 X =item my_attrs X =item my_clearenv X =item my_lstat_flags X =item my_memrchr X =item my_mkostemp X =item my_mkostemp_cloexec X =item my_mkstemp X =item my_mkstemp_cloexec X =item my_stat_flags X =item my_strerror X =item my_unexec X =item newGP X =item newMETHOP_internal X =item newSTUB X =item newSVavdefelem X =item newXS_deffile X =item new_warnings_bitfield X =item nextargv X =item noperl_die X =item notify_parser_that_changed_to_utf8 X =item oopsAV X =item oopsHV X =item op_clear X =item op_integerize X =item op_lvalue_flags X =item op_refcnt_dec X =item op_refcnt_inc X =item op_relocate_sv X =item op_std_init X =item op_unscope X =item opmethod_stash X =item opslab_force_free X =item opslab_free X =item opslab_free_nopad X =item package X =item package_version X =item pad_add_weakref X =item padlist_store X =item padname_free X =item padnamelist_free X =item parse_unicode_opts X =item parser_free X =item parser_free_nexttoke_ops X =item path_is_searchable X =item peep X =item pmruntime X =item populate_isa X =item ptr_hash X =item qerror X =item re_exec_indentf X =item re_indentf X =item re_intuit_start X =item re_intuit_string X =item re_op_compile X =item re_printf X =item reg_named_buff X =item reg_named_buff_iter X =item reg_numbered_buff_fetch X =item reg_numbered_buff_length X =item reg_numbered_buff_store X =item reg_qr_package X =item reg_skipcomment X =item reg_temp_copy X =item regcurly X =item regprop X =item report_evil_fh X =item report_redefined_cv X =item report_wrongway_fh X =item rpeep X =item rsignal_restore X =item rsignal_save X =item rxres_save X =item same_dirent X =item save_strlen X =item save_to_buffer X =item sawparens X =item scalar X =item scalarvoid X =item scan_str X =item scan_word X =item set_caret_X X =item set_numeric_standard X =item set_numeric_underlying X =item set_padlist X =item setfd_cloexec X =item setfd_cloexec_for_nonsysfd X =item setfd_cloexec_or_inhexec_by_sysfdness X =item setfd_inhexec X =item setfd_inhexec_for_sysfd X =item should_warn_nl X =item should_we_output_Debug_r X =item sighandler X =item sighandler1 X =item sighandler3 X =item skipspace_flags X =item softref2xv X =item sortsv_flags_impl X =item sub_crush_depth X =item sv_add_backref X =item sv_buf_to_ro X =item sv_del_backref X =item sv_free2 X =item sv_i_ncmp X =item sv_i_ncmp_desc X =item sv_kill_backrefs X =item sv_len_utf8_nomg X =item sv_magicext_mglob X =item sv_ncmp X =item sv_ncmp_desc X =item sv_only_taint_gmagic X =item sv_or_pv_pos_u2b X =item sv_resetpvn X =item sv_sethek X =item sv_setsv_cow X =item sv_unglob X =item tied_method X =item tmps_grow_p X =item to_uni_fold X =item to_uni_lower X =item to_uni_title X =item to_uni_upper X =item translate_substr_offsets X =item try_amagic_bin X =item try_amagic_un X =item uiv_2buf X =item unshare_hek X =item utf16_to_utf8 X =item utf16_to_utf8_reversed X =item utf8_to_uvchr_buf_helper X =item utilize X =item uvoffuni_to_utf8_flags_msgs X =item uvuni_to_utf8 X =item valid_utf8_to_uvuni X =item variant_byte_number X =item varname X =item vivify_defelem X =item vivify_ref X =item wait4pid X =item was_lvalue_sub X =item watch X =item win32_croak_not_implemented X =item write_to_stderr X =item xs_boot_epilog X =item xs_handshake X =item yyerror X =item yyerror_pv X =item yyerror_pvn X =item yylex X =item yyparse X =item yyquit X =item yyunlex X =back =head1 AUTHORS The autodocumentation system was originally added to the Perl core by Benjamin Stuhl. Documentation is by whoever was kind enough to document their functions. =head1 SEE ALSO F L L L L L L L L L L =cut ex: set ro: