Gfortran Manual
Gfortran Manual
Published by the Free Software Foundation 51 Franklin Street, Fifth Floor Boston, MA 02110-1301, USA
Copyright c 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with the Invariant Sections being Funding Free Software, the Front-Cover Texts being (a) (see below), and with the Back-Cover Texts being (b) (see below). A copy of the license is included in the section entitled GNU Free Documentation License. (a) The FSFs Front-Cover Text is: A GNU Manual (b) The FSFs Back-Cover Text is: You have freedom to copy and modify this GNU Manual, like GNU software. Copies published by the Free Software Foundation raise funds for GNU development.
Short Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Part I: Invoking GNU Fortran . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2 GNU Fortran Command Options . . . . . . . . . . . . . . . . . . . . . . . . 7 3 Runtime: Influencing runtime behavior with environment variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Part II: Language Reference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 4 Fortran 2003 and 2008 Status . . . . . . . . . . . . . . . . . . . . . . . . . . 31 5 Compiler Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 6 Extensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 7 Mixed-Language Programming . . . . . . . . . . . . . . . . . . . . . . . . . 49 8 Intrinsic Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 9 Intrinsic Modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 Contributing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . GNU General Public License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . GNU Free Documentation License . . . . . . . . . . . . . . . . . . . . . . . . . Funding Free Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Option Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Keyword Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 215 227 235 237 239
iii
Table of Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 1.2 1.3 1.4 1.5 1.6 About GNU Fortran . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . GNU Fortran and GCC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Preprocessing and conditional compilation . . . . . . . . . . . . . . . . . . . . . . GNU Fortran and G77 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Project Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.6.1 Varying Length Character Strings . . . . . . . . . . . . . . . . . . . . . . . . . 1 2 2 3 3 4 4
iv
Compiler Characteristics . . . . . . . . . . . . . . . . . . . . . 35
5.1 5.2 5.3 KIND Type Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Internal representation of LOGICAL variables . . . . . . . . . . . . . . . . . 35 Thread-safety of the runtime library . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Extensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
6.1 Extensions implemented in GNU Fortran . . . . . . . . . . . . . . . . . . . . . . 6.1.1 Old-style kind specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.1.2 Old-style variable initialization . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.1.3 Extensions to namelist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.1.4 X format descriptor without count field . . . . . . . . . . . . . . . . . . . 6.1.5 Commas in FORMAT specifications . . . . . . . . . . . . . . . . . . . . . . . . . 6.1.6 Missing period in FORMAT specifications . . . . . . . . . . . . . . . . . . . 6.1.7 I/O item lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.1.8 Q exponent-letter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.1.9 BOZ literal constants. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.1.10 Real array indices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.1.11 Unary operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.1.12 Implicitly convert LOGICAL and INTEGER values . . . . . . . . . . 6.1.13 Hollerith constants support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.1.14 Cray pointers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.1.15 CONVERT specifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.1.16 OpenMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.1.17 Argument list functions %VAL, %REF and %LOC . . . . . . . . . . . . 6.2 Extensions not implemented in GNU Fortran . . . . . . . . . . . . . . . . . . 6.2.1 STRUCTURE and RECORD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2.2 ENCODE and DECODE statements . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2.3 Variable FORMAT expressions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2.4 Alternate complex function syntax. . . . . . . . . . . . . . . . . . . . . . . . 37 37 37 38 39 39 39 39 39 39 40 40 40 40 41 43 43 44 45 45 46 47 47
Mixed-Language Programming . . . . . . . . . . . . . . . 49
7.1 Interoperability with C . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 7.1.1 Intrinsic Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 7.1.2 Derived Types and struct. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 7.1.3 Interoperable Global Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 7.1.4 Interoperable Subroutines and Functions . . . . . . . . . . . . . . . . . . 50 7.1.5 Working with Pointers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 7.1.6 Further Interoperability of Fortran with C . . . . . . . . . . . . . . . . 53 7.2 GNU Fortran Compiler Directives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 7.3 Non-Fortran Main Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 7.3.1 _gfortran_set_args Save command-line arguments . . . 55 7.3.2 _gfortran_set_options Set library option flags. . . . . . . 55 7.3.3 _gfortran_set_convert Set endian conversion . . . . . . . . 56 7.3.4 _gfortran_set_record_marker Set length of record markers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 7.3.5 _gfortran_set_fpe Set when a Floating Point Exception should be raised . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 7.3.6 _gfortran_set_max_subrecord_length Set subrecord length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Intrinsic Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
8.1 8.2 8.3 8.4 8.5 8.6 8.7 8.8 8.9 8.10 8.11 8.12 8.13 8.14 8.15 8.16 8.17 8.18 8.19 8.20 8.21 8.22 8.23 8.24 8.25 8.26 8.27 Introduction to intrinsic procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . ABORT Abort the program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ABS Absolute value . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ACCESS Checks file access modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . ACHAR Character in ASCII collating sequence . . . . . . . . . . . . . . . . ACOS Arccosine function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ACOSH Inverse hyperbolic cosine function. . . . . . . . . . . . . . . . . . . . ADJUSTL Left adjust a string . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ADJUSTR Right adjust a string . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . AIMAG Imaginary part of complex number . . . . . . . . . . . . . . . . . AINT Truncate to a whole number . . . . . . . . . . . . . . . . . . . . . . . . . ALARM Execute a routine after a given delay . . . . . . . . . . . . . . . ALL All values in MASK along DIM are true . . . . . . . . . . . . . . ALLOCATED Status of an allocatable entity . . . . . . . . . . . . . . . . . AND Bitwise logical AND . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ANINT Nearest whole number . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ANY Any value in MASK along DIM is true . . . . . . . . . . . . . . . ASIN Arcsine function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ASINH Inverse hyperbolic sine function. . . . . . . . . . . . . . . . . . . . . ASSOCIATED Status of a pointer or pointer/target pair . . . . . ATAN Arctangent function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ATAN2 Arctangent function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ATANH Inverse hyperbolic tangent function . . . . . . . . . . . . . . . . . BESSEL_J0 Bessel function of the first kind of order 0 . . . . . . BESSEL_J1 Bessel function of the first kind of order 1 . . . . . . BESSEL_JN Bessel function of the first kind . . . . . . . . . . . . . . . . BESSEL_Y0 Bessel function of the second kind of order 0 . . . 59 59 60 60 61 62 62 63 63 64 65 65 66 67 67 68 69 70 70 71 72 73 73 74 74 75 76
vi 8.28 8.29 8.30 8.31 8.32 8.33 8.34 8.35 8.36 8.37 8.38
The GNU Fortran Compiler BESSEL_Y1 Bessel function of the second kind of order 1 . . . 76 BESSEL_YN Bessel function of the second kind . . . . . . . . . . . . . 77 BGE Bitwise greater than or equal to . . . . . . . . . . . . . . . . . . . . . . . 78 BGT Bitwise greater than . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 BIT_SIZE Bit size inquiry function . . . . . . . . . . . . . . . . . . . . . . . . 78 BLE Bitwise less than or equal to . . . . . . . . . . . . . . . . . . . . . . . . . . 79 BLT Bitwise less than. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 BTEST Bit test function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 C_ASSOCIATED Status of a C pointer . . . . . . . . . . . . . . . . . . . . . . . 80 C_FUNLOC Obtain the C address of a procedure . . . . . . . . . . . . 81 C_F_PROCPOINTER Convert C into Fortran procedure pointer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 8.39 C_F_POINTER Convert C into Fortran pointer . . . . . . . . . . . . . . 82 8.40 C_LOC Obtain the C address of an object . . . . . . . . . . . . . . . . . . 83 8.41 C_SIZEOF Size in bytes of an expression . . . . . . . . . . . . . . . . . . . 83 8.42 CEILING Integer ceiling function . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 8.43 CHAR Character conversion function . . . . . . . . . . . . . . . . . . . . . . . 85 8.44 CHDIR Change working directory . . . . . . . . . . . . . . . . . . . . . . . . . . 85 8.45 CHMOD Change access permissions of files. . . . . . . . . . . . . . . . . . . 86 8.46 CMPLX Complex conversion function . . . . . . . . . . . . . . . . . . . . . . . 87 8.47 COMMAND_ARGUMENT_COUNT Get number of command line arguments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 8.48 COMPILER_OPTIONS Options passed to the compiler . . . . . . . . 88 8.49 COMPILER_VERSION Compiler version string . . . . . . . . . . . . . . . . 88 8.50 COMPLEX Complex conversion function . . . . . . . . . . . . . . . . . . . . . 89 8.51 CONJG Complex conjugate function . . . . . . . . . . . . . . . . . . . . . . . . 90 8.52 COS Cosine function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 8.53 COSH Hyperbolic cosine function . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 8.54 COUNT Count function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 8.55 CPU_TIME CPU elapsed time in seconds . . . . . . . . . . . . . . . . . . . . 92 8.56 CSHIFT Circular shift elements of an array . . . . . . . . . . . . . . . . . 93 8.57 CTIME Convert a time into a string . . . . . . . . . . . . . . . . . . . . . . . . 94 8.58 DATE_AND_TIME Date and time subroutine . . . . . . . . . . . . . . . . . 94 8.59 DBLE Double conversion function . . . . . . . . . . . . . . . . . . . . . . . . . . 95 8.60 DCMPLX Double complex conversion function . . . . . . . . . . . . . . . 96 8.61 DIGITS Significant binary digits function . . . . . . . . . . . . . . . . . . 96 8.62 DIM Positive difference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 8.63 DOT_PRODUCT Dot product function . . . . . . . . . . . . . . . . . . . . . . . . 98 8.64 DPROD Double product function. . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 8.65 DREAL Double real part function . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 8.66 DSHIFTL Combined left shift . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 8.67 DSHIFTR Combined right shift . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 8.68 DTIME Execution time subroutine (or function) . . . . . . . . . . . 100 8.69 EOSHIFT End-off shift elements of an array . . . . . . . . . . . . . . . 101 8.70 EPSILON Epsilon function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 8.71 ERF Error function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 8.72 ERFC Error function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 8.73 ERFC_SCALED Error function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
vii 8.74 ETIME Execution time subroutine (or function) . . . . . . . . . . . 104 8.75 EXECUTE_COMMAND_LINE Execute a shell command . . . . . . . . 105 8.76 EXIT Exit the program with status. . . . . . . . . . . . . . . . . . . . . . . 106 8.77 EXP Exponential function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 8.78 EXPONENT Exponent function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 8.79 EXTENDS_TYPE_OF Query dynamic type for extension . . . . . 108 8.80 FDATE Get the current time as a string . . . . . . . . . . . . . . . . . . . 108 8.81 FGET Read a single character in stream mode from stdin . . 109 8.82 FGETC Read a single character in stream mode. . . . . . . . . . . . 110 8.83 FLOOR Integer floor function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 8.84 FLUSH Flush I/O unit(s) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 8.85 FNUM File number function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 8.86 FPUT Write a single character in stream mode to stdout. . . 112 8.87 FPUTC Write a single character in stream mode . . . . . . . . . . . 113 8.88 FRACTION Fractional part of the model representation . . . . 114 8.89 FREE Frees memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 8.90 FSEEK Low level file positioning subroutine . . . . . . . . . . . . . . . 115 8.91 FSTAT Get file status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 8.92 FTELL Current stream position . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 8.93 GAMMA Gamma function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 8.94 GERROR Get last system error message . . . . . . . . . . . . . . . . . . . . 118 8.95 GETARG Get command line arguments . . . . . . . . . . . . . . . . . . . . 118 8.96 GET_COMMAND Get the entire command line . . . . . . . . . . . . . . . 119 8.97 GET_COMMAND_ARGUMENT Get command line arguments . . . . 119 8.98 GETCWD Get current working directory . . . . . . . . . . . . . . . . . . . . 120 8.99 GETENV Get an environmental variable. . . . . . . . . . . . . . . . . . . . 121 8.100 GET_ENVIRONMENT_VARIABLE Get an environmental variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 8.101 GETGID Group ID function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 8.102 GETLOG Get login name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 8.103 GETPID Process ID function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 8.104 GETUID User ID function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 8.105 GMTIME Convert time to GMT info . . . . . . . . . . . . . . . . . . . . . . 124 8.106 HOSTNM Get system host name . . . . . . . . . . . . . . . . . . . . . . . . . . 125 8.107 HUGE Largest number of a kind . . . . . . . . . . . . . . . . . . . . . . . . . . 125 8.108 HYPOT Euclidean distance function . . . . . . . . . . . . . . . . . . . . . . 125 8.109 IACHAR Code in ASCII collating sequence . . . . . . . . . . . . . . . . 126 8.110 IALL Bitwise AND of array elements . . . . . . . . . . . . . . . . . . . . 126 8.111 IAND Bitwise logical and . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 8.112 IANY Bitwise OR of array elements . . . . . . . . . . . . . . . . . . . . . . 128 8.113 IARGC Get the number of command line arguments . . . . . . 129 8.114 IBCLR Clear bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 8.115 IBITS Bit extraction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 8.116 IBSET Set bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 8.117 ICHAR Character-to-integer conversion function . . . . . . . . . . 130 8.118 IDATE Get current local time subroutine (day/month/year) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 8.119 IEOR Bitwise logical exclusive or . . . . . . . . . . . . . . . . . . . . . . . . 132
viii
The GNU Fortran Compiler 8.120 IERRNO Get the last system error number . . . . . . . . . . . . . . . 132 8.121 IMAGE_INDEX Function that converts a cosubscript to an image index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 8.122 INDEX Position of a substring within a string . . . . . . . . . . . . 133 8.123 INT Convert to integer type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 8.124 INT2 Convert to 16-bit integer type . . . . . . . . . . . . . . . . . . . . . 135 8.125 INT8 Convert to 64-bit integer type . . . . . . . . . . . . . . . . . . . . . 135 8.126 IOR Bitwise logical or . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 8.127 IPARITY Bitwise XOR of array elements. . . . . . . . . . . . . . . . . 136 8.128 IRAND Integer pseudo-random number . . . . . . . . . . . . . . . . . . . 137 8.129 IS_IOSTAT_END Test for end-of-file value . . . . . . . . . . . . . . . . 137 8.130 IS_IOSTAT_EOR Test for end-of-record value . . . . . . . . . . . . . 138 8.131 ISATTY Whether a unit is a terminal device.. . . . . . . . . . . . . 138 8.132 ISHFT Shift bits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 8.133 ISHFTC Shift bits circularly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 8.134 ISNAN Test for a NaN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 8.135 ITIME Get current local time subroutine (hour/minutes/seconds) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 8.136 KILL Send a signal to a process . . . . . . . . . . . . . . . . . . . . . . . . . 141 8.137 KIND Kind of an entity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 8.138 LBOUND Lower dimension bounds of an array . . . . . . . . . . . . 142 8.139 LCOBOUND Lower codimension bounds of an array . . . . . . . . 142 8.140 LEADZ Number of leading zero bits of an integer . . . . . . . . . 143 8.141 LEN Length of a character entity . . . . . . . . . . . . . . . . . . . . . . . . 143 8.142 LEN_TRIM Length of a character entity without trailing blank characters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 8.143 LGE Lexical greater than or equal . . . . . . . . . . . . . . . . . . . . . . . 144 8.144 LGT Lexical greater than . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 8.145 LINK Create a hard link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 8.146 LLE Lexical less than or equal . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 8.147 LLT Lexical less than. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 8.148 LNBLNK Index of the last non-blank character in a string . . 147 8.149 LOC Returns the address of a variable . . . . . . . . . . . . . . . . . . . 148 8.150 LOG Natural logarithm function . . . . . . . . . . . . . . . . . . . . . . . . . 148 8.151 LOG10 Base 10 logarithm function . . . . . . . . . . . . . . . . . . . . . . . 149 8.152 LOG_GAMMA Logarithm of the Gamma function . . . . . . . . . . . 149 8.153 LOGICAL Convert to logical type. . . . . . . . . . . . . . . . . . . . . . . . . 150 8.154 LONG Convert to integer type . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 8.155 LSHIFT Left shift bits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 8.156 LSTAT Get file status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 8.157 LTIME Convert time to local time info . . . . . . . . . . . . . . . . . . . 152 8.158 MALLOC Allocate dynamic memory . . . . . . . . . . . . . . . . . . . . . . 152 8.159 MASKL Left justified mask . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 8.160 MASKR Right justified mask . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 8.161 MATMUL matrix multiplication . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 8.162 MAX Maximum value of an argument list . . . . . . . . . . . . . . . . . 154 8.163 MAXEXPONENT Maximum exponent of a real kind . . . . . . . . . 155 8.164 MAXLOC Location of the maximum value within an array . . 155
ix 8.165 MAXVAL Maximum value of an array . . . . . . . . . . . . . . . . . . . . . 156 8.166 MCLOCK Time function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 8.167 MCLOCK8 Time function (64-bit) . . . . . . . . . . . . . . . . . . . . . . . . . 157 8.168 MERGE Merge variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 8.169 MERGE_BITS Merge of bits under mask . . . . . . . . . . . . . . . . . . 158 8.170 MIN Minimum value of an argument list . . . . . . . . . . . . . . . . . 159 8.171 MINEXPONENT Minimum exponent of a real kind . . . . . . . . . 159 8.172 MINLOC Location of the minimum value within an array . . 159 8.173 MINVAL Minimum value of an array . . . . . . . . . . . . . . . . . . . . . 160 8.174 MOD Remainder function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 8.175 MODULO Modulo function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 8.176 MOVE_ALLOC Move allocation from one object to another . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 8.177 MVBITS Move bits from one integer to another . . . . . . . . . . . 163 8.178 NEAREST Nearest representable number . . . . . . . . . . . . . . . . . . 163 8.179 NEW_LINE New line character . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 8.180 NINT Nearest whole number . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 8.181 NORM2 Euclidean vector norms . . . . . . . . . . . . . . . . . . . . . . . . . . 165 8.182 NOT Logical negation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 8.183 NULL Function that returns an disassociated pointer . . . . . 166 8.184 NUM_IMAGES Function that returns the number of images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 8.185 OR Bitwise logical OR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 8.186 PACK Pack an array into an array of rank one. . . . . . . . . . . . 168 8.187 PARITY Reduction with exclusive OR. . . . . . . . . . . . . . . . . . . . 168 8.188 PERROR Print system error message . . . . . . . . . . . . . . . . . . . . . . 169 8.189 PRECISION Decimal precision of a real kind. . . . . . . . . . . . . . 169 8.190 POPCNT Number of bits set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 8.191 POPPAR Parity of the number of bits set . . . . . . . . . . . . . . . . . 170 8.192 PRESENT Determine whether an optional dummy argument is specified . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 8.193 PRODUCT Product of array elements. . . . . . . . . . . . . . . . . . . . . . 171 8.194 RADIX Base of a model number . . . . . . . . . . . . . . . . . . . . . . . . . . 172 8.195 RAN Real pseudo-random number. . . . . . . . . . . . . . . . . . . . . . . . 172 8.196 RAND Real pseudo-random number . . . . . . . . . . . . . . . . . . . . . . 173 8.197 RANDOM_NUMBER Pseudo-random number. . . . . . . . . . . . . . . . . 173 8.198 RANDOM_SEED Initialize a pseudo-random number sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 8.199 RANGE Decimal exponent range . . . . . . . . . . . . . . . . . . . . . . . . . . 175 8.200 REAL Convert to real type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 8.201 RENAME Rename a file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 8.202 REPEAT Repeated string concatenation . . . . . . . . . . . . . . . . . . 177 8.203 RESHAPE Function to reshape an array. . . . . . . . . . . . . . . . . . . 177 8.204 RRSPACING Reciprocal of the relative spacing . . . . . . . . . . . . 178 8.205 RSHIFT Right shift bits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 8.206 SAME_TYPE_AS Query dynamic types for equality . . . . . . . . 178 8.207 SCALE Scale a real value . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
The GNU Fortran Compiler 8.208 SCAN Scan a string for the presence of a set of characters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179 8.209 SECNDS Time function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 8.210 SECOND CPU time function. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 8.211 SELECTED_CHAR_KIND Choose character kind . . . . . . . . . . . . 181 8.212 SELECTED_INT_KIND Choose integer kind . . . . . . . . . . . . . . . . 182 8.213 SELECTED_REAL_KIND Choose real kind . . . . . . . . . . . . . . . . . . 182 8.214 SET_EXPONENT Set the exponent of the model . . . . . . . . . . . 183 8.215 SHAPE Determine the shape of an array. . . . . . . . . . . . . . . . . . 184 8.216 SHIFTA Right shift with fill . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 8.217 SHIFTL Left shift . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 8.218 SHIFTR Right shift . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 8.219 SIGN Sign copying function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 8.220 SIGNAL Signal handling subroutine (or function) . . . . . . . . . 186 8.221 SIN Sine function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 8.222 SINH Hyperbolic sine function . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 8.223 SIZE Determine the size of an array . . . . . . . . . . . . . . . . . . . . . 188 8.224 SIZEOF Size in bytes of an expression . . . . . . . . . . . . . . . . . . . 189 8.225 SLEEP Sleep for the specified number of seconds . . . . . . . . . 189 8.226 SPACING Smallest distance between two numbers of a given type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 8.227 SPREAD Add a dimension to an array . . . . . . . . . . . . . . . . . . . . 190 8.228 SQRT Square-root function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 8.229 SRAND Reinitialize the random number generator . . . . . . . . 191 8.230 STAT Get file status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 8.231 STORAGE_SIZE Storage size in bits . . . . . . . . . . . . . . . . . . . . . . . 193 8.232 SUM Sum of array elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 8.233 SYMLNK Create a symbolic link . . . . . . . . . . . . . . . . . . . . . . . . . . 194 8.234 SYSTEM Execute a shell command . . . . . . . . . . . . . . . . . . . . . . . 195 8.235 SYSTEM_CLOCK Time function . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 8.236 TAN Tangent function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 8.237 TANH Hyperbolic tangent function . . . . . . . . . . . . . . . . . . . . . . . 197 8.238 THIS_IMAGE Function that returns the cosubscript index of this image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 8.239 TIME Time function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198 8.240 TIME8 Time function (64-bit) . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 8.241 TINY Smallest positive number of a real kind . . . . . . . . . . . . 199 8.242 TRAILZ Number of trailing zero bits of an integer . . . . . . . . 199 8.243 TRANSFER Transfer bit patterns . . . . . . . . . . . . . . . . . . . . . . . . . 200 8.244 TRANSPOSE Transpose an array of rank two . . . . . . . . . . . . . . 201 8.245 TRIM Remove trailing blank characters of a string . . . . . . . 201 8.246 TTYNAM Get the name of a terminal device. . . . . . . . . . . . . . . 201 8.247 UBOUND Upper dimension bounds of an array . . . . . . . . . . . . 202 8.248 UCOBOUND Upper codimension bounds of an array . . . . . . . . 203 8.249 UMASK Set the file creation mask . . . . . . . . . . . . . . . . . . . . . . . . 203 8.250 UNLINK Remove a file from the file system . . . . . . . . . . . . . . . 203 8.251 UNPACK Unpack an array of rank one into an array . . . . . . 204 8.252 VERIFY Scan a string for characters not a given set . . . . . . 204
Contributing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
Contributors to GNU Fortran . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Proposed Extensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Compiler extensions: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Environment Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 212 212 212 213
GNU General Public License . . . . . . . . . . . . . . . . . . . 215 GNU Free Documentation License . . . . . . . . . . . . . 227
ADDENDUM: How to use this License for your documents . . . . . . . . 234
Funding Free Software . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 Option Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 Keyword Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
Chapter 1: Introduction
1 Introduction
This manual documents the use of gfortran, the GNU Fortran compiler. You can find in this manual how to invoke gfortran, as well as its features and incompatibilities. The GNU Fortran compiler front end was designed initially as a free replacement for, or alternative to, the unix f95 command; gfortran is the command youll use to invoke the compiler.
The gfortran command itself, which also might be installed as the systems f95 command. gfortran is just another driver program, but specifically for the Fortran compiler only. The difference with gcc is that gfortran will automatically link the correct libraries to your program. A collection of run-time libraries. These libraries contain the machine code needed to support capabilities of the Fortran language that are not directly provided by the machine code generated by the gfortran compilation phase, such as intrinsic functions and subroutines, and routines for interaction with files and the operating system. The Fortran compiler itself, (f951). This is the GNU Fortran parser and code generator, linked to and interfaced with the GCC backend library. f951 translates the source code to assembler code. You would typically not use this program directly; instead, the gcc or gfortran driver programs will call it for you.
Chapter 1: Introduction
.F95, .F03 or .F08. To manually invoke the preprocessor on any file, use -cpp, to disable preprocessing on files where the preprocessor is run automatically, use -nocpp. If a preprocessed file includes another file with the Fortran INCLUDE statement, the included file is not preprocessed. To preprocess included files, use the equivalent preprocessor statement #include. If GNU Fortran invokes the preprocessor, __GFORTRAN__ is defined and __GNUC__, _ _GNUC_MINOR__ and __GNUC_PATCHLEVEL__ can be used to determine the version of the compiler. See Section Overview in The C Preprocessor for details. While CPP is the de-facto standard for preprocessing Fortran code, Part 3 of the Fortran 95 standard (ISO/IEC 1539-3:1998) defines Conditional Compilation, which is not widely used and not directly supported by the GNU Fortran compiler. You can use the program coco to preprocess such files (http://www.daniellnagle.com/coco.html).
messages), improving the compiler optimizations and the performance of compiled code, and extending the compiler to support future standardsin particular, Fortran 2003 and Fortran 2008.
1.6 Standards
The GNU Fortran compiler implements ISO/IEC 1539:1997 (Fortran 95). As such, it can also compile essentially all standard-compliant Fortran 90 and Fortran 77 programs. It also supports the ISO/IEC TR-15581 enhancements to allocatable arrays. In the future, the GNU Fortran compiler will also support ISO/IEC 1539-1:2004 (Fortran 2003), ISO/IEC 1539-1:2010 (Fortran 2008) and future Fortran standards. Partial support of the Fortran 2003 and Fortran 2008 standard is already provided; the current status of the support is reported in the Section 4.1 [Fortran 2003 status], page 31 and Section 4.2 [Fortran 2008 status], page 32 sections of the documentation. Additionally, the GNU Fortran compilers supports the OpenMP specification (version 3.0, http://openmp.org/wp/openmp-specifications/).
Chapter 1: Introduction
Preprocessing Options See Section 2.3 [Enable and customize preprocessing], page 10.
-cpp -dD -dI -dM -dN -dU -fworking-directory -imultilib dir -iprefix file -isysroot dir -iquote -isystem dir -nocpp -nostdinc -undef -Aquestion =answer -A-question [=answer ] -C -CC -Dmacro [=defn ] -Umacro -H -P
Error and Warning Options See Section 2.4 [Options to request or suppress errors and warnings], page 13.
-fmax-errors=n -fsyntax-only -pedantic -pedantic-errors -Wall -Waliasing -Wampersand -Warray-bounds -Wcharacter-truncation -Wconversion -Wimplicit-interface -Wimplicit-procedure -Wline-truncation -Wintrinsics-std -Wsurprising -Wno-tabs -Wunderflow -Wunused-parameter -Wintrinsic-shadow -Wno-align-commons
Debugging Options See Section 2.5 [Options for debugging your program or GNU Fortran], page 16.
-fdump-fortran-original -fdump-fortran-optimized -ffpe-trap=list -fdump-core -fbacktrace -fdump-parse-tree
Directory Options See Section 2.6 [Options for directory search], page 17.
Link Options See Section 2.7 [Options for influencing the linking step], page 18.
-static-libgfortran
Runtime Options See Section 2.8 [Options for influencing runtime behavior], page 18.
-fconvert=conversion -fno-range-check -frecord-marker=length -fmax-subrecord-length=length -fsign-zero
Code Generation Options See Section 2.9 [Options for code generation conventions], page 19.
-fno-automatic -ff2c -fno-underscoring -fno-whole-file -fsecond-underscore -fbounds-check -fcheck-array-temporaries -fmax-array-constructor =n -fcheck=<all|array-temps|bounds|do|mem|pointer|recursion> -fcoarray=<none|single> -fmax-stack-var-size=n -fpack-derived -frepack-arrays -fshort-enums -fexternal-blas -fblas-matmul-limit=n -frecursive -finit-local-zero -finit-integer=n -finit-real=<zero|inf|-inf|nan|snan> -finit-logical=<true|false> -finit-character=n -fno-align-commons -fno-protect-parens -frealloc-lhs
and -fdefault-double-8 can be used to prevent this. The kind of real constants like 1.d0 will not be changed by -fdefault-real-8 though, so also -fdefault-double-8 does not affect it. -fdefault-integer-8 Set the default integer and logical types to an 8 byte wide type. Do nothing if this is already the default. This option also affects the kind of integer constants like 42. -fdefault-real-8 Set the default real type to an 8 byte wide type. Do nothing if this is already the default. This option also affects the kind of non-double real constants like 1.0, and does promote the default width of DOUBLE PRECISION to 16 bytes if possible, unless -fdefault-double-8 is given, too. -fdollar-ok Allow $ as a valid non-first character in a symbol name. Symbols that start with $ are rejected since it is unclear which rules to apply to implicit typing as different vendors implement different rules. Using $ in IMPLICIT statements is also rejected. -fbackslash Change the interpretation of backslashes in string literals from a single backslash character to C-style escape characters. The following combinations are expanded \a, \b, \f, \n, \r, \t, \v, \\, and \0 to the ASCII characters alert, backspace, form feed, newline, carriage return, horizontal tab, vertical tab, backslash, and NUL, respectively. Additionally, \xnn, \unnnn and \Unnnnnnnn (where each n is a hexadecimal digit) are translated into the Unicode characters corresponding to the specified code points. All other combinations of a character preceded by \ are unexpanded. -fmodule-private Set the default accessibility of module entities to PRIVATE. Use-associated entities will not be accessible unless they are explicitly declared as PUBLIC. -ffixed-line-length-n Set column after which characters are ignored in typical fixed-form lines in the source file, and through which spaces are assumed (as if padded to that length) after the ends of short fixed-form lines. Popular values for n include 72 (the standard and the default), 80 (card image), and 132 (corresponding to extended-source options in some popular compilers). n may also be none, meaning that the entire line is meaningful and that continued character constants never have implicit spaces appended to them to fill out the line. -ffixed-line-length-0 means the same thing as -ffixed-line-length-none. -ffree-line-length-n Set column after which characters are ignored in typical free-form lines in the source file. The default value is 132. n may be none, meaning that the entire line is meaningful. -ffree-line-length-0 means the same thing as -ffree-line-length-none.
10
-fmax-identifier-length=n Specify the maximum allowed identifier length. Typical values are 31 (Fortran 95) and 63 (Fortran 2003 and Fortran 2008). -fimplicit-none Specify that no implicit typing is allowed, unless overridden by explicit IMPLICIT statements. This is the equivalent of adding implicit none to the start of every procedure. -fcray-pointer Enable the Cray pointer extension, which provides C-like pointer functionality. -fopenmp Enable the OpenMP extensions. This includes OpenMP !$omp directives in free form and c$omp, *$omp and !$omp directives in fixed form, !$ conditional compilation sentinels in free form and c$, *$ and !$ sentinels in fixed form, and when linking arranges for the OpenMP runtime library to be linked in. The option -fopenmp implies -frecursive.
-fno-range-check Disable range checking on results of simplification of constant expressions during compilation. For example, GNU Fortran will give an error at compile time when simplifying a = 1. / 0. With this option, no error will be given and a will be assigned the value +Infinity. If an expression evaluates to a value outside of the relevant range of [-HUGE():HUGE()], then the expression will be replaced by -Inf or +Inf as appropriate. Similarly, DATA i/ZFFFFFFFF/ will result in an integer overflow on most systems, but with -fno-range-check the value will wrap around and i will be initialized to 1 instead. -std=std Specify the standard to which the program is expected to conform, which may be one of f95, f2003, f2008, gnu, or legacy. The default value for std is gnu, which specifies a superset of the Fortran 95 standard that includes all of the extensions supported by GNU Fortran, although warnings will be given for obsolete extensions not recommended for use in new code. The legacy value is equivalent but without the warnings for obsolete extensions, and may be useful for old non-standard programs. The f95, f2003 and f2008 values specify strict conformance to the Fortran 95, Fortran 2003 and Fortran 2008 standards, respectively; errors are given for all extensions beyond the relevant language standard, and warnings are given for the Fortran 77 features that are permitted but obsolescent in later standards.
11
The preprocessor is run in traditional mode. Any restrictions of the fileformat, especially the limits on line length, apply for preprocessed output as well, so it might be advisable to use the -ffree-line-length-none or -ffixed-line-length-none options. -dM Instead of the normal output, generate a list of #define directives for all the macros defined during the execution of the preprocessor, including predefined macros. This gives you a way of finding out what is predefined in your version of the preprocessor. Assuming you have no file foo.f90, the command
touch foo.f90; gfortran -cpp -E -dM foo.f90
will show all the predefined macros. -dD Like -dM except in two respects: it does not include the predefined macros, and it outputs both the #define directives and the result of preprocessing. Both kinds of output go to the standard output file. Like -dD, but emit only the macro names, not their expansions. Like dD except that only macros that are expanded, or whose definedness is tested in preprocessor directives, are output; the output is delayed until the use or test of the macro; and #undef directives are also output for macros tested but undefined at the time. Output #include directives in addition to the result of preprocessing.
-dN -dU
-dI
-fworking-directory Enable generation of linemarkers in the preprocessor output that will let the compiler know the current working directory at the time of preprocessing. When this option is enabled, the preprocessor will emit, after the initial linemarker, a second linemarker with the current working directory followed by two slashes. GCC will use this directory, when its present in the preprocessed input, as the directory emitted as the current working directory in some debugging information formats. This option is implicitly enabled if debugging information is enabled, but this can be inhibited with the negated form -fno-working-directory. If the -P flag is present in the command line, this option has no effect, since no #line directives are emitted whatsoever. -idirafter dir Search dir for include files, but do it after all directories specified with -I and the standard system directories have been exhausted. dir is treated as a system include directory. If dir begins with =, then the = will be replaced by the sysroot prefix; see --sysroot and -isysroot. -imultilib dir Use dir as a subdirectory of the directory containing target-specific C++ headers. -iprefix prefix Specify prefix as the prefix for subsequent -iwithprefix options. If the prefix represents a directory, you should include the final /. -isysroot dir This option is like the --sysroot option, but applies only to header files. See the --sysroot option for more information.
12
-iquote dir Search dir only for header files requested with #include "file"; they are not searched for #include <file>, before all directories specified by -I and before the standard system directories. If dir begins with =, then the = will be replaced by the sysroot prefix; see --sysroot and -isysroot. -isystem dir Search dir for header files, after all directories specified by -I but before the standard system directories. Mark it as a system directory, so that it gets the same special treatment as is applied to the standard system directories. If dir begins with =, then the = will be replaced by the sysroot prefix; see --sysroot and -isysroot. -nostdinc Do not search the standard system directories for header files. Only the directories you have specified with -I options (and the directory of the current file, if appropriate) are searched. -undef Do not predefine any system-specific or GCC-specific macros. The standard predefined macros remain defined.
-Apredicate =answer Make an assertion with the predicate predicate and answer answer. This form is preferred to the older form -A predicate(answer), which is still supported, because it does not use shell special characters. -A-predicate =answer Cancel an assertion with the predicate predicate and answer answer. -C Do not discard comments. All comments are passed through to the output file, except for comments in processed directives, which are deleted along with the directive. You should be prepared for side effects when using -C; it causes the preprocessor to treat comments as tokens in their own right. For example, comments appearing at the start of what would be a directive line have the effect of turning that line into an ordinary source line, since the first token on the line is no longer a #. Warning: this currently handles C-Style comments only. The preprocessor does not yet recognize Fortran-style comments. Do not discard comments, including during macro expansion. This is like -C, except that comments contained within macros are also passed through to the output file where the macro is expanded. In addition to the side-effects of the -C option, the -CC option causes all C++-style comments inside a macro to be converted to C-style comments. This is to prevent later use of that macro from inadvertently commenting out the remainder of the source line. The -CC option is generally used to support lint comments. Warning: this currently handles C- and C++-Style comments only. The preprocessor does not yet recognize Fortran-style comments.
-CC
13
-Dname
-Dname =definition The contents of definition are tokenized and processed as if they appeared during translation phase three in a #define directive. In particular, the definition will be truncated by embedded newline characters. If you are invoking the preprocessor from a shell or shell-like program you may need to use the shells quoting syntax to protect characters such as spaces that have a meaning in the shell syntax. If you wish to define a function-like macro on the command line, write its argument list with surrounding parentheses before the equals sign (if any). Parentheses are meaningful to most shells, so you will need to quote the option. With sh and csh, -Dname(args...)=definition works. -D and -U options are processed in the order they are given on the command line. All -imacros file and -include file options are processed after all -D and -U options. -H -P Print the name of each header file used, in addition to other normal activities. Each name is indented to show how deep in the #include stack it is. Inhibit generation of linemarkers in the output from the preprocessor. This might be useful when running the preprocessor on something that is not C code, and will be sent to a program which might be confused by the linemarkers. Cancel any previous definition of name, either built in or provided with a -D option.
-Uname
14
-fsyntax-only Check the code for syntax errors, but dont actually compile it. This will generate module files for each module present in the code, but no other output file. -pedantic Issue warnings for uses of extensions to Fortran 95. -pedantic also applies to C-language constructs where they occur in GNU Fortran source files, such as use of \e in a character constant within a directive like #include. Valid Fortran 95 programs should compile properly with or without this option. However, without this option, certain GNU extensions and traditional Fortran features are supported as well. With this option, many of them are rejected. Some users try to use -pedantic to check programs for conformance. They soon find that it does not do quite what they wantit finds some nonstandard practices, but not all. However, improvements to GNU Fortran in this area are welcome. This should be used in conjunction with -std=f95, -std=f2003 or -std=f2008. -pedantic-errors Like -pedantic, except that errors are produced rather than warnings. -Wall Enables commonly used warning options pertaining to usage that we recommend avoiding and that we believe are easy to avoid. This currently includes -Waliasing, -Wampersand, -Wconversion, -Wsurprising, -Wintrinsics-std, -Wno-tabs, -Wintrinsic-shadow, -Wline-truncation, -Wreal-q-constant and -Wunused. Warn about possible aliasing of dummy arguments. Specifically, it warns if the same actual argument is associated with a dummy argument with INTENT(IN) and a dummy argument with INTENT(OUT) in a call with an explicit interface. The following example will trigger the warning.
interface subroutine bar(a,b) integer, intent(in) :: a integer, intent(out) :: b end subroutine end interface integer :: a call bar(a,a)
-Waliasing
-Wampersand Warn about missing ampersand in continued character constants. The warning is given with -Wampersand, -pedantic, -std=f95, -std=f2003 and -std=f2008. Note: With no ampersand given in a continued character constant, GNU Fortran assumes continuation at the first non-comment, non-whitespace character after the ampersand that initiated the continuation.
15
-Warray-temporaries Warn about array temporaries generated by the compiler. The information generated by this warning is sometimes useful in optimization, in order to avoid such temporaries. -Wcharacter-truncation Warn when a character assignment will truncate the assigned string. -Wline-truncation Warn when a source code line will be truncated. -Wconversion Warn about implicit conversions that are likely to change the value of the expression after conversion. Implied by -Wall. -Wconversion-extra Warn about implicit conversions between different types and kinds. -Wimplicit-interface Warn if a procedure is called without an explicit interface. Note this only checks that an explicit interface is present. It does not check that the declared interfaces are consistent across program units. -Wimplicit-procedure Warn if a procedure is called that has neither an explicit interface nor has been declared as EXTERNAL. -Wintrinsics-std Warn if gfortran finds a procedure named like an intrinsic not available in the currently selected standard (with -std) and treats it as EXTERNAL procedure because of this. -fall-intrinsics can be used to never trigger this behavior and always link to the intrinsic regardless of the selected standard. -Wreal-q-constant Produce a warning if a real-literal-constant contains a q exponent-letter. -Wsurprising Produce a warning when suspicious code constructs are encountered. While technically legal these usually indicate that an error has been made. This currently produces a warning under the following circumstances: An INTEGER SELECT construct has a CASE that can never be matched as its lower value is greater than its upper value. A LOGICAL SELECT construct has three CASE statements. A TRANSFER specifies a source that is shorter than the destination. The type of a function result is declared more than once with the same type. If -pedantic or standard-conforming mode is enabled, this is an error. A CHARACTER variable is declared with negative length. -Wtabs By default, tabs are accepted as whitespace, but tabs are not members of the Fortran Character Set. For continuation lines, a tab followed by a digit between 1 and 9 is supported. -Wno-tabs will cause a warning to be issued if
16
a tab is encountered. Note, -Wno-tabs is active for -pedantic, -std=f95, -std=f2003, -std=f2008 and -Wall. -Wunderflow Produce a warning when numerical constant expressions are encountered, which yield an UNDERFLOW during compilation. -Wintrinsic-shadow Warn if a user-defined procedure or module procedure has the same name as an intrinsic; in this case, an explicit interface or EXTERNAL or INTRINSIC declaration might be needed to get calls later resolved to the desired intrinsic/procedure. -Wunused-dummy-argument Warn about unused dummy arguments. This option is implied by -Wall. -Wunused-parameter Contrary to gccs meaning of -Wunused-parameter, mentation of this option does not warn about unused (see -Wunused-dummy-argument), but about unused -Wunused-parameter is not included in -Wall but is -Wextra. gfortrans impledummy arguments PARAMETER values. implied by -Wall
-Walign-commons By default, gfortran warns about any occasion of variables being padded for proper alignment inside a COMMON block. This warning can be turned off via -Wno-align-commons. See also -falign-commons. -Werror Turns all warnings into errors.
See Section Options to Request or Suppress Errors and Warnings in Using the GNU Compiler Collection (GCC), for information on more options offered by the GBE shared by gfortran, gcc and other GNU compilers. Some of these have no effect when compiling programs written in Fortran.
17
-ffpe-trap=list Specify a list of IEEE exceptions when a Floating Point Exception (FPE) should be raised. On most systems, this will result in a SIGFPE signal being sent and the program being interrupted, producing a core file useful for debugging. list is a (possibly empty) comma-separated list of the following IEEE exceptions: invalid (invalid floating point operation, such as SQRT(-1.0)), zero (division by zero), overflow (overflow in a floating point operation), underflow (underflow in a floating point operation), precision (loss of precision during operation) and denormal (operation produced a denormal value). Some of the routines in the Fortran runtime library, like CPU_TIME, are likely to trigger floating point exceptions when ffpe-trap=precision is used. For this reason, the use of ffpe-trap=precision is not recommended. -fbacktrace Specify that, when a runtime error is encountered or a deadly signal is emitted (segmentation fault, illegal instruction, bus error or floating-point exception), the Fortran runtime library should output a backtrace of the error. This option only has influence for compilation of the Fortran main program. -fdump-core Request that a core-dump file is written to disk when a runtime error is encountered on systems that support core dumps. This option is only effective for the compilation of the Fortran main program. See Section Options for Debugging Your Program or GCC in Using the GNU Compiler Collection (GCC), for more information on debugging options.
-Jdir
-fintrinsic-modules-path dir This option specifies the location of pre-compiled intrinsic modules, if they are not in the default location expected by the compiler.
18
19
20
Use of -fno-underscoring is not recommended unless you are experimenting with issues such as integration of GNU Fortran into existing system environments (vis-`-vis existing libraries, tools, and so on). a For example, with -funderscoring, and assuming other defaults like -fcase-lower and that j() and max_count() are external functions while my_var and lvar are local variables, a statement like
I = J() + MAX_COUNT (MY_VAR, LVAR)
Use of -fno-underscoring allows direct specification of user-defined names while debugging and when interfacing GNU Fortran code with other languages. Note that just because the names match does not mean that the interface implemented by GNU Fortran for an external name matches the interface implemented by some other language for that same name. That is, getting code produced by GNU Fortran to link to code produced by some other compiler using this or any other method can be only a small part of the overall solution getting the code generated by both compilers to agree on issues other than naming can require significant effort, and, unlike naming disagreements, linkers normally cannot detect disagreements in these other areas. Also, note that with -fno-underscoring, the lack of appended underscores introduces the very real possibility that a user-defined external name will conflict with a name in a system library, which could make finding unresolved-reference bugs quite difficult in some casesthey might occur at program run time, and show up only as buggy behavior at run time. In future versions of GNU Fortran we hope to improve naming and linking issues so that debugging always involves using the names as they appear in the source, even if the names as seen by the linker are mangled to prevent accidental linking between procedures with incompatible interfaces. -fno-whole-file This flag causes the compiler to resolve and translate each procedure in a file separately. By default, the whole file is parsed and placed in a single front-end tree. During resolution, in addition to all the usual checks and fixups, references to external procedures that are in the same file effect resolution of that procedure, if not already done, and a check of the interfaces. The dependences are resolved by changing the order in which the file is translated into the backend tree. Thus, a procedure that is referenced is translated before the reference and the duplication of backend tree declarations eliminated. The -fno-whole-file option is deprecated and may lead to wrong code. -fsecond-underscore By default, GNU Fortran appends an underscore to external names. If this option is used GNU Fortran appends two underscores to names with underscores
21
and one underscore to external names with no underscores. GNU Fortran also appends two underscores to internal names with underscores to avoid naming collisions with external names. This option has no effect if -fno-underscoring is in effect. It is implied by the -ff2c option. Otherwise, with this option, an external name such as MAX_COUNT is implemented as a reference to the link-time external symbol max_count__, instead of max_count_. This is required for compatibility with g77 and f2c, and is implied by use of the -ff2c option. -fcoarray=<keyword> none Disable coarray support; using coarray declarations and imagecontrol statements will produce a compile-time error. (Default) single Single-image mode, i.e. num_images() is always one.
-fcheck=<keyword> Enable the generation of run-time checks; the argument shall be a commadelimited list of the following keywords. all Enable all run-time test of -fcheck. array-temps Warns at run time when for passing an actual argument a temporary array had to be generated. The information generated by this warning is sometimes useful in optimization, in order to avoid such temporaries. Note: The warning is only printed once per location. bounds Enable generation of run-time checks for array subscripts and against the declared minimum and maximum values. It also checks array indices for assumed and deferred shape arrays against the actual allocated bounds and ensures that all string lengths are equal for character array constructors without an explicit typespec. Some checks require that -fcheck=bounds is set for the compilation of the main program. Note: In the future this may also include other forms of checking, e.g., checking substring references. Enable generation of run-time checks for invalid modification of loop iteration variables. Enable generation of run-time checks for memory allocation. Note: This option does not affect explicit allocations using the ALLOCATE statement, which will be always checked. Enable generation of run-time checks for pointers and allocatables.
do mem
pointer
recursion Enable generation of run-time checks for recursively called subroutines and functions which are not marked as recursive. See
22
also -frecursive. Note: This check does not work for OpenMP programs and is disabled if used together with -frecursive and -fopenmp. -fbounds-check Deprecated alias for -fcheck=bounds. -fcheck-array-temporaries Deprecated alias for -fcheck=array-temps. -fmax-array-constructor=n This option can be used to increase the upper limit permitted in array constructors. The code below requires this option to expand the array at compile time.
program test implicit none integer j integer, parameter :: n = 100000 integer, parameter :: i(n) = (/ (2*j, j = 1, n) /) print (10(I0,1X)), i end program test
Caution: This option can lead to long compile times and excessively large object files. The default value for n is 65535. -fmax-stack-var-size=n This option specifies the size in bytes of the largest array that will be put on the stack; if the size is exceeded static memory is used (except in procedures marked as RECURSIVE). Use the option -frecursive to allow for recursive procedures which do not have a RECURSIVE attribute or for parallel programs. Use -fno-automatic to never use the stack. This option currently only affects local arrays declared with constant bounds, and may not apply to all character variables. Future versions of GNU Fortran may improve this behavior. The default value for n is 32768. -fpack-derived This option tells GNU Fortran to pack derived type members as closely as possible. Code compiled with this option is likely to be incompatible with code compiled without this option, and may execute slower. -frepack-arrays In some circumstances GNU Fortran may pass assumed shape array sections via a descriptor describing a noncontiguous area of memory. This option adds code to the function prologue to repack the data into a contiguous block at runtime. This should result in faster accesses to the array. However it can introduce significant overhead to the function call, especially when the passed data is noncontiguous.
23
-fshort-enums This option is provided for interoperability with C code that was compiled with the -fshort-enums option. It will make GNU Fortran choose the smallest INTEGER kind a given enumerator set will fit in, and give all its enumerators this kind. -fexternal-blas This option will make gfortran generate calls to BLAS functions for some matrix operations like MATMUL, instead of using our own algorithms, if the size of the matrices involved is larger than a given limit (see -fblas-matmul-limit). This may be profitable if an optimized vendor BLAS library is available. The BLAS library will have to be specified at link time. -fblas-matmul-limit=n Only significant when -fexternal-blas is in effect. Matrix multiplication of matrices with size larger than (or equal to) n will be performed by calls to BLAS functions, while others will be handled by gfortran internal algorithms. If the matrices involved are not square, the size comparison is performed using the geometric mean of the dimensions of the argument and result matrices. The default value for n is 30. -frecursive Allow indirect recursion by forcing all local arrays to be allocated on the stack. This flag cannot be used together with -fmax-stack-var-size= or -fno-automatic. -finit-local-zero -finit-integer=n -finit-real=<zero|inf|-inf|nan|snan> -finit-logical=<true|false> -finit-character=n The -finit-local-zero option instructs the compiler to initialize local INTEGER, REAL, and COMPLEX variables to zero, LOGICAL variables to false, and CHARACTER variables to a string of null bytes. Finer-grained initialization options are provided by the -finit-integer=n , -finit-real=<zero|inf|inf|nan|snan> (which also initializes the real and imaginary parts of local COMPLEX variables), -finit-logical=<true|false>, and -finit-character=n (where n is an ASCII character value) options. These options do not initialize components of derived type variables, nor do they initialize variables that appear in an EQUIVALENCE statement. (This limitation may be removed in future releases). Note that the -finit-real=nan option initializes REAL and COMPLEX variables with a quiet NaN. For a signalling NaN use -finit-real=snan; note, however, that compile-time optimizations may convert them into quiet NaN and that trapping needs to be enabled (e.g. via -ffpe-trap). -falign-commons By default, gfortran enforces proper alignment of all variables in a COMMON block by padding them as needed. On certain platforms this is mandatory,
24
on others it increases performance. If a COMMON block is not declared with consistent data types everywhere, this padding can cause trouble, and -fno-align-commons can be used to disable automatic alignment. The same form of this option should be used for all files that share a COMMON block. To avoid potential alignment issues in COMMON blocks, it is recommended to order objects from largest to smallest. -fno-protect-parens By default the parentheses in expression are honored for all optimization levels such that the compiler does not do any re-association. Using -fno-protect-parens allows the compiler to reorder REAL and COMPLEX expressions to produce faster code. Note that for the re-association optimization -fno-signed-zeros and -fno-trapping-math need to be in effect. -frealloc-lhs An allocatable left-hand side of an intrinsic assignment is automatically (re)allocated if it is either unallocated or has a different shape. The option is enabled by default except when -std=f95 is given. See Section Options for Code Generation Conventions in Using the GNU Compiler Collection (GCC), for information on more options offered by the GBE shared by gfortran, gcc, and other GNU compilers.
25
26
when a.out is the compiled Fortran program that you want to run. Default is a single space.
The variable consists of an optional default mode, followed by a list of optional exceptions, which are separated by semicolons from the preceding default and each other. Each exception consists of a format and a comma-separated list of units. Valid values for the modes are the same as for the CONVERT specifier: NATIVE Use the native format. This is the default. SWAP Swap between little- and big-endian. LITTLE_ENDIAN Use the little-endian format for unformatted files. BIG_ENDIAN Use the big-endian format for unformatted files. A missing mode for an exception is taken to mean BIG_ENDIAN. Examples of values for GFORTRAN_CONVERT_UNIT are: big_endian Do all unformatted I/O in big endian mode. little_endian;native:10-20,25 Do all unformatted I/O in little endian mode, except for units 10 to 20 and 25, which are in native format. 10-20 Units 10 to 20 are big-endian, the rest is native.
27
Setting the environment variables should be done on the command line or via the export command for sh-compatible shells and via setenv for csh-compatible shells. Example for sh:
$ gfortran foo.f90 $ GFORTRAN_CONVERT_UNIT=big_endian;native:10-20 ./a.out
Using anything but the native representation for unformatted data carries a significant speed overhead. If speed in this area matters to you, it is best if you use this only for data that needs to be portable. See Section 6.1.15 [CONVERT specifier], page 43, for an alternative way to specify the data representation for unformatted files. See Section 2.8 [Runtime Options], page 18, for setting a default data representation for the whole program. The CONVERT specifier overrides the -fconvert compile options. Note that the values specified via the GFORTRAN CONVERT UNIT environment variable will override the CONVERT specifier in the open statement. This is to give control over data formats to users who do not have the source code of their program available.
29
31
32
Support for the asynchronous input/output syntax; however, the data transfer is currently always synchronously performed. FLUSH statement. IOMSG= specifier for I/O statements. Support for the declaration of enumeration constants via the ENUM and ENUMERATOR statements. Interoperability with gcc is guaranteed also for the case where the fshort-enums command line option is given. TR 15581: ALLOCATABLE dummy arguments. ALLOCATABLE function results ALLOCATABLE components of derived types The OPEN statement supports the ACCESS=STREAM specifier, allowing I/O without any record structure. Namelist input/output for internal files. Further I/O extensions: Rounding during formatted output, using of a decimal comma instead of a decimal point, setting whether a plus sign should appear for positive numbers. The PROTECTED statement and attribute. The VALUE statement and attribute. The VOLATILE statement and attribute. The IMPORT statement, allowing to import host-associated derived types. The intrinsic modules ISO_FORTRAN_ENVIRONMENT is supported, which contains parameters of the I/O units, storage sizes. Additionally, procedures for C interoperability are available in the ISO_C_BINDING module. USE statement with INTRINSIC and NON_INTRINSIC attribute; supported intrinsic modules: ISO_FORTRAN_ENV, ISO_C_BINDING, OMP_LIB and OMP_LIB_KINDS. Renaming of operators in the USE statement.
33
The g0 format descriptor and unlimited format items. The mathematical intrinsics ASINH, ACOSH, ATANH, ERF, ERFC, GAMMA, LOG_GAMMA, BESSEL_J0, BESSEL_J1, BESSEL_JN, BESSEL_Y0, BESSEL_Y1, BESSEL_YN, HYPOT, NORM2, and ERFC_SCALED. Using complex arguments with TAN, SINH, COSH, TANH, ASIN, ACOS, and ATAN is now possible; ATAN(Y,X ) is now an alias for ATAN2(Y,X ). Support of the PARITY intrinsic functions. The following bit intrinsics: LEADZ and TRAILZ for counting the number of leading and trailing zero bits, POPCNT and POPPAR for counting the number of one bits and returning the parity; BGE, BGT, BLE, and BLT for bitwise comparisons; DSHIFTL and DSHIFTR for combined left and right shifts, MASKL and MASKR for simple left and right justified masks, MERGE_BITS for a bitwise merge using a mask, SHIFTA, SHIFTL and SHIFTR for shift operations, and the transformational bit intrinsics IALL, IANY and IPARITY. Support of the EXECUTE_COMMAND_LINE intrinsic subroutine. Support for the STORAGE_SIZE intrinsic inquiry function. The INT{8,16,32} and REAL{32,64,128} kind type parameters and the array-valued named constants INTEGER_KINDS, LOGICAL_KINDS, REAL_KINDS and CHARACTER_KINDS of the intrinsic module ISO_FORTRAN_ENV. The module procedures C_SIZEOF of the intrinsic module ISO_C_BINDINGS and COMPILER_VERSION and COMPILER_OPTIONS of ISO_FORTRAN_ENV. Experimental coarray support (for one image only), use the -fcoarray=single flag to enable it. The BLOCK construct is supported. The STOP and the new ERROR STOP statements now support all constant expressions. Support for the CONTIGUOUS attribute. Support for ALLOCATE with MOLD. Support for the IMPURE attribute for procedures, which allows for ELEMENTAL procedures without the restrictions of PURE. Null pointers (including NULL()) and not-allocated variables can be used as actual argument to optional non-pointer, non-allocatable dummy arguments, denoting an absent argument. Non-pointer variables with TARGET attribute can be used as actual argument to POINTER dummies with INTENT(IN). Pointers including procedure pointers and those in a derived type (pointer components) can now be initialized by a target instead of only by NULL. The EXIT statement (with construct-name) can be now be used to leave not only the DO but also the ASSOCIATE, BLOCK, IF, SELECT CASE and SELECT TYPE constructs. Internal procedures can now be used as actual argument. Minor features: obsolesce diagnostics for ENTRY with -std=f2008; a line may start with a semicolon; for internal and module procedures END can be used instead of END SUBROUTINE and END FUNCTION; SELECTED_REAL_KIND now also takes a RADIX argument; intrinsic types are supported for TYPE(intrinsic-type-spec); multiple type-bound
34
procedures can be declared in a single PROCEDURE statement; implied-shape arrays are supported for named constants (PARAMETER).
35
5 Compiler Characteristics
This chapter describes certain characteristics of the GNU Fortran compiler, that are not specified by the Fortran standard, but which might in some way or another become visible to the programmer.
36
Chapter 6: Extensions
37
6 Extensions
The two sections below detail the extensions to standard Fortran that are implemented in GNU Fortran, as well as some of the popular or historically important extensions that are not (or not yet) implemented. For the latter case, we explain the alternatives available to GNU Fortran users, including replacement by standard-conforming code or GNU extensions.
where TYPESPEC is a basic type (INTEGER, REAL, etc.), and where size is a byte count corresponding to the storage size of a valid kind for that type. (For COMPLEX variables, size is the total size of the real and imaginary parts.) The statement then declares x, y and z to be of type TYPESPEC with the appropriate kind. This is equivalent to the standardconforming declaration
TYPESPEC(k) x,y,z
where k is the kind parameter suitable for the intended precision. As kind parameters are implementation-dependent, use the KIND, SELECTED_INT_KIND and SELECTED_REAL_KIND intrinsics to retrieve the correct value, for instance REAL*8 x can be replaced by:
INTEGER, PARAMETER :: dbl = KIND(1.0d0) REAL(KIND=dbl) :: x
The syntax for the initializers is as for the DATA statement, but unlike in a DATA statement, an initializer only applies to the variable immediately preceding the initialization. In other words, something like INTEGER I,J/2,3/ is not valid. This style of initialization is only allowed in declarations without double colons (::); the double colons were introduced in Fortran 90, which also introduced a standard syntax for initializing variables in type declarations. Examples of standard-conforming code equivalent to the above example are:
! Fortran 90 INTEGER :: i = 1, j = 2 REAL :: x(2,2) = RESHAPE((/0.,0.,0.,1./),SHAPE(x))
38
Note that variables which are explicitly initialized in declarations or in DATA statements automatically acquire the SAVE attribute.
It should be noted that the default terminator is / rather than &END. Querying of the namelist when inputting from stdin. After at least one space, entering ? sends to stdout the namelist name and the names of the variables in the namelist:
? &mynml x x%y ch &end
Entering =? outputs the namelist to stdout, as if WRITE(*,NML = mynml) had been called:
=? &MYNML X(1)%Y= 0.000000 X(2)%Y= 0.000000 X(3)%Y= 0.000000 CH=abcd, /
, , ,
, , ,
, , ,
To aid this dialog, when input is from stdin, errors send their messages to stderr and execution continues, even if IOSTAT is set. PRINT namelist is permitted. This causes an error if -std=f95 is used.
PROGRAM test_print REAL, dimension (4) :: NAMELIST /mynml/ x PRINT mynml END PROGRAM test_print x = (/1.0, 2.0, 3.0, 4.0/)
Expanded namelist reads are permitted. This causes an error if -std=f95 is used. In the following example, the first element of the array will be given the value 0.00 and the two succeeding elements will be given the values 1.00 and 2.00.
&MYNML X(1,1) = 0.00 , 1.00 , 2.00 /
Chapter 6: Extensions
39
10
6.1.8 Q exponent-letter
GNU Fortran accepts real literal constants with an exponent-letter of Q, for example, 1.23Q45. The constant is interpreted as a REAL(16) entity on targets that suppports this type. If the target does not support REAL(16) but has a REAL(10) type, then the real-literal-constant will be interpreted as a REAL(10) entity. In the absence of REAL(16) and REAL(10), an error will occur.
40
Furthermore, GNU Fortran allows using BOZ literal constants outside DATA statements and the four intrinsic functions allowed by Fortran 2003. In DATA statements, in direct assignments, where the right-hand side only contains a BOZ literal constant, and for oldstyle initializers of the form integer i /o0173/, the constant is transferred as if TRANSFER had been used; for COMPLEX numbers, only the real part is initialized unless CMPLX is used. In all other cases, the BOZ literal constant is converted to an INTEGER value with the largest decimal representation. This value is then converted numerically to the type and kind of the variable in question. (For instance, real :: r = b0000001 + 1 initializes r with 2.0.) As different compilers implement the extension differently, one should be careful when doing bitwise initialization of non-integer variables. Note that initializing an INTEGER variable with a statement such as DATA i/ZFFFFFFFF/ will give an integer overflow error rather than the desired result of 1 when i is a 32-bit integer on a system that supports 64-bit integers. The -fno-range-check option can be used as a workaround for legacy code that initializes integers in this manner.
However, there is no implicit conversion of INTEGER values in if-statements, nor of LOGICAL or INTEGER values in I/O operations.
Chapter 6: Extensions
41
complex*16 x(2) data x /16Habcdefghijklmnop, 16Hqrstuvwxyz012345/ x(1) = 16HABCDEFGHIJKLMNOP call foo (4h abc)
In general, Hollerith constants were used to provide a rudimentary facility for handling character strings in early Fortran compilers, prior to the introduction of CHARACTER variables in Fortran 77; in those cases, the standard-compliant equivalent is to convert the program to use proper character strings. On occasion, there may be a case where the intent is specifically to initialize a numeric variable with a given byte sequence. In these cases, the same result can be obtained by using the TRANSFER statement, as in this example.
INTEGER(KIND=4) :: a a = TRANSFER ("abcd", a) ! equivalent to: a = 4Habcd
or,
pointer ( <pointer1> , <pointee1> ), ( <pointer2> , <pointee2> ), ...
The pointer is an integer that is intended to hold a memory address. The pointee may be an array or scalar. A pointee can be an assumed size arraythat is, the last dimension may be left unspecified by using a * in place of a valuebut a pointee cannot be an assumed shape array. No space is allocated for the pointee. The pointee may have its type declared before or after the pointer statement, and its array specification (if any) may be declared before, during, or after the pointer statement. The pointer may be declared as an integer prior to the pointer statement. However, some machines have default integer sizes that are different than the size of a pointer, and so the following code is not portable:
integer ipt pointer (ipt, iarr)
If a pointer is declared with a kind that is too small, the compiler will issue a warning; the resulting binary will probably not work correctly, because the memory addresses stored in the pointers may be truncated. It is safer to omit the first line of the above example; if explicit declaration of ipts type is omitted, then the compiler will ensure that ipt is an integer variable large enough to hold a pointer. Pointer arithmetic is valid with Cray pointers, but it is not the same as C pointer arithmetic. Cray pointers are just ordinary integers, so the user is responsible for determining how many bytes to add to a pointer in order to increment it. Consider the following example:
real target(10) real pointee(10) pointer (ipt, pointee)
42
The last statement does not set ipt to the address of target(1), as it would in C pointer arithmetic. Adding 1 to ipt just adds one byte to the address stored in ipt. Any expression involving the pointee will be translated to use the value stored in the pointer as the base address. To get the address of elements, this extension provides an intrinsic function LOC(). The LOC() function is equivalent to the & operator in C, except the address is cast to an integer type:
real ar(10) pointer(ipt, arpte(10)) real arpte ipt = loc(ar) ! Makes arpte is an alias for ar arpte(1) = 1.0 ! Sets ar(1) to 1.0
The pointer can also be set by a call to the MALLOC intrinsic (see Section 8.158 [MALLOC], page 152). Cray pointees often are used to alias an existing variable. For example:
integer target(10) integer iarr(10) pointer (ipt, iarr) ipt = loc(target)
As long as ipt remains unchanged, iarr is now an alias for target. The optimizer, however, will not detect this aliasing, so it is unsafe to use iarr and target simultaneously. Using a pointee in any way that violates the Fortran aliasing rules or assumptions is illegal. It is the users responsibility to avoid doing this; the compiler works under the assumption that no such aliasing occurs. Cray pointers will work correctly when there is no aliasing (i.e., when they are used to access a dynamically allocated block of memory), and also in any routine where a pointee is used, but any variable with which it shares storage is not used. Code that violates these rules may not run as the user intends. This is not a bug in the optimizer; any code that violates the aliasing rules is illegal. (Note that this is not unique to GNU Fortran; any Fortran compiler that supports Cray pointers will incorrectly optimize code with illegal aliasing.) There are a number of restrictions on the attributes that can be applied to Cray pointers and pointees. Pointees may not have the ALLOCATABLE, INTENT, OPTIONAL, DUMMY, TARGET, INTRINSIC, or POINTER attributes. Pointers may not have the DIMENSION, POINTER, TARGET, ALLOCATABLE, EXTERNAL, or INTRINSIC attributes, nor may they be function results. Pointees may not occur in more than one pointer statement. A pointee cannot be a pointer. Pointees cannot occur in equivalence, common, or data statements. A Cray pointer may also point to a function or a subroutine. For example, the following excerpt is valid:
implicit none external sub pointer (subptr,subpte) external subpte subptr = loc(sub) call subpte() [...]
Chapter 6: Extensions
43
A pointer may be modified during the course of a program, and this will change the location to which the pointee refers. However, when pointees are passed as arguments, they are treated as ordinary variables in the invoked function. Subsequent changes to the pointer will not change the base address of the array that was passed.
The value of the conversion can be queried by using INQUIRE(CONVERT=ch). The values returned are BIG_ENDIAN and LITTLE_ENDIAN. CONVERT works between big- and little-endian for INTEGER values of all supported kinds and for REAL on IEEE systems of kinds 4 and 8. Conversion between different extended double types on different architectures such as m68k and x86 64, which GNU Fortran supports as REAL(KIND=10) and REAL(KIND=16), will probably not work. Note that the values specified via the GFORTRAN CONVERT UNIT environment variable will override the CONVERT specifier in the open statement. This is to give control over data formats to users who do not have the source code of their program available. Using anything but the native representation for unformatted data carries a significant speed overhead. If speed in this area matters to you, it is best if you use this only for data that needs to be portable.
6.1.16 OpenMP
OpenMP (Open Multi-Processing) is an application programming interface (API) that supports multi-platform shared memory multiprocessing programming in C/C++ and Fortran on many architectures, including Unix and Microsoft Windows platforms. It consists of a set of compiler directives, library routines, and environment variables that influence run-time behavior. GNU Fortran strives to be compatible to the OpenMP Application Program Interface v3.0.
44
To enable the processing of the OpenMP directive !$omp in free-form source code; the c$omp, *$omp and !$omp directives in fixed form; the !$ conditional compilation sentinels in free form; and the c$, *$ and !$ sentinels in fixed form, gfortran needs to be invoked with the -fopenmp. This also arranges for automatic linking of the GNU OpenMP runtime library Section libgomp in GNU OpenMP runtime library. The OpenMP Fortran runtime library routines are provided both in a form of a Fortran 90 module named omp_lib and in a form of a Fortran include file named omp_lib.h. An example of a parallelized loop taken from Appendix A.1 of the OpenMP Application Program Interface v2.5:
SUBROUTINE A1(N, A, B) INTEGER I, N REAL B(N), A(N) !$OMP PARALLEL DO !I is private by default DO I=2,N B(I) = (A(I) + A(I-1)) / 2.0 ENDDO !$OMP END PARALLEL DO END SUBROUTINE A1
Please note: -fopenmp implies -frecursive, i.e., all local arrays will be allocated on the stack. When porting existing code to OpenMP, this may lead to surprising results, especially to segmentation faults if the stacksize is limited. On glibc-based systems, OpenMP enabled applications cannot be statically linked due to limitations of the underlying pthreads-implementation. It might be possible to get a working solution if -Wl,--whole-archive -lpthread -Wl,--no-whole-archive is added to the command line. However, this is not supported by gcc and thus not recommended.
Chapter 6: Extensions
45
end
For details refer to the g77 manual http://gcc.gnu.org/onlinedocs/gcc-3.4.6/g77/ index.html#Top. Also, c_by_val.f and its partner c_by_val.c of the GNU Fortran testsuite are worth a look.
46
TYPE item INTEGER id CHARACTER(LEN=200) description REAL price END TYPE ! RECORD /name/ variable becomes TYPE(name) variable TYPE(item) pear, store_catalog(100) ! Instead of using a dot (.) to access fields of a record, the ! standard syntax uses a percent sign (%) pear%id = 92316 pear%description = "juicy DAnjou pear" pear%price = 0.15 store_catalog(7)%id = 7831 store_catalog(7)%description = "milk bottle" store_catalog(7)%price = 1.2 ! Assignments of a whole variable dont change store_catalog(12) = pear print *, store_catalog(12)
Chapter 6: Extensions
47
or with:
c c c c Variable declaration CHARACTER(LEN=20) FMT Other code here... WRITE(FMT,*) N+1 WRITE(6,"(I" // ADJUSTL(FMT) // ")") INT1
49
7 Mixed-Language Programming
This chapter is about mixed-language interoperability, but also applies if one links Fortran code compiled by different compilers. In most cases, use of the C Binding features of the Fortran 2003 standard is sufficient, and their use is highly recommended.
Derived types with the C binding attribute shall not have the sequence attribute, type parameters, the extends attribute, nor type-bound procedures. Every component must be
50
of interoperable type and kind and may not have the pointer or allocatable attribute. The names of the variables are irrelevant for interoperability. As there exist no direct Fortran equivalents, neither unions nor structs with bit field or variable-length array members are interoperable.
Here, _MyProject_flags is the case-sensitive name of the variable as seen from C programs while global_flag is the case-insensitive name as seen from Fortran. If no binding name is specified, as for tp, the C binding name is the (lowercase) Fortran binding name. If a binding name is specified, only a single variable may be after the double colon. Note of warning: You cannot use a global variable to access errno of the C library as the C standard allows it to be a macro. Use the IERRNO intrinsic (GNU extension) instead.
Note that pointer arguments also frequently need the VALUE attribute, see Section 7.1.5 [Working with Pointers], page 51. Strings are handled quite differently in C and Fortran. In C a string is a NUL-terminated array of characters while in Fortran each string has a length associated with it and is thus not terminated (by e.g. NUL). For example, if one wants to use the following C function,
#include <stdio.h> void print_C(char *string) /* equivalent: char string[] { printf("%s\n", string); } */
51
use iso_c_binding, only: C_CHAR, C_NULL_CHAR interface subroutine print_c(string) bind(C, name="print_C") use iso_c_binding, only: c_char character(kind=c_char) :: string(*) end subroutine print_c end interface call print_c(C_CHAR_"Hello World"//C_NULL_CHAR)
As the example shows, one needs to ensure that the string is NUL terminated. Additionally, the dummy argument string of print_C is a length-one assumed-size array; using character(len=*) is not allowed. The example above uses c_char_"Hello World" to ensure the string literal has the right type; typically the default character kind and c_char are the same and thus "Hello World" is equivalent. However, the standard does not guarantee this. The use of strings is now further illustrated using the C library function strncpy, whose prototype is
char *strncpy(char *restrict s1, const char *restrict s2, size_t n);
The function strncpy copies at most n characters from string s2 to s1 and returns s1. In the following example, we ignore the return value:
use iso_c_binding implicit none character(len=30) :: str,str2 interface ! Ignore the return value of strncpy -> subroutine ! "restrict" is always assumed if we do not pass a pointer subroutine strncpy(dest, src, n) bind(C) import character(kind=c_char), intent(out) :: dest(*) character(kind=c_char), intent(in) :: src(*) integer(c_size_t), value, intent(in) :: n end subroutine strncpy end interface str = repeat(X,30) ! Initialize whole string with X call strncpy(str, c_char_"Hello World"//C_NULL_CHAR, & len(c_char_"Hello World",kind=c_size_t)) print (a), str ! prints: "Hello WorldXXXXXXXXXXXXXXXXXXX" end
The intrinsic procedures are described in Chapter 8 [Intrinsic Procedures], page 59.
52
When converting C to Fortran arrays, the one-dimensional SHAPE argument has to be passed. If a pointer is a dummy-argument of an interoperable procedure, it usually has to be declared using the VALUE attribute. void* matches TYPE(C_PTR), VALUE, while TYPE(C_ PTR) alone matches void**. Procedure pointers are handled analogously to pointers; the C type is TYPE(C_FUNPTR) and the intrinsic conversion procedures are C_F_PROCPOINTER and C_FUNLOC. Lets consider two examples of actually passing a procedure pointer from C to Fortran and vice versa. Note that these examples are also very similar to passing ordinary pointers between both languages. First, consider this code in C:
/* Procedure implemented in Fortran. void get_values (void (*)(double)); */
/* Call-back routine we want called from Fortran. void print_it (double x) { printf ("Number is %f.\n", x); } /* Call Fortran routine and pass call-back to it. void foobar () { get_values (&print_it); }
*/
*/
A matching implementation for get_values in Fortran, that correctly receives the procedure pointer from C and is able to call it, is given in the following MODULE:
MODULE m IMPLICIT NONE ! Define interface of call-back routine. ABSTRACT INTERFACE SUBROUTINE callback (x) USE, INTRINSIC :: ISO_C_BINDING REAL(KIND=C_DOUBLE), INTENT(IN), VALUE :: x END SUBROUTINE callback END INTERFACE CONTAINS ! Define C-bound procedure. SUBROUTINE get_values (cproc) BIND(C) USE, INTRINSIC :: ISO_C_BINDING TYPE(C_FUNPTR), INTENT(IN), VALUE :: cproc PROCEDURE(callback), POINTER :: proc ! Convert C to Fortran procedure pointer. CALL C_F_PROCPOINTER (cproc, proc) ! Call it. CALL proc (1.0_C_DOUBLE)
53
CALL proc (-42.0_C_DOUBLE) CALL proc (18.12_C_DOUBLE) END SUBROUTINE get_values END MODULE m
Next, we want to call a C routine that expects a procedure pointer argument and pass it a Fortran procedure (which clearly must be interoperable!). Again, the C function may be:
int call_it (int (*func)(int), int arg) { return func (arg); }
54
and will change. There will also be a Technical Report (TR 29113) which standardizes an interoperable array descriptor. Until then, you can use the Chasm Language Interoperability Tools, http://chasm-interop.sourceforge.net/, which provide an interface to GNU Fortrans array descriptor. The technical report 29113 will presumably also include support for C-interoperable OPTIONAL and for assumed-rank and assumed-type dummy arguments. However, the TR has neither been approved nor implemented in GNU Fortran; therefore, these features are not yet available.
55
When you compile a PROGRAM with GNU Fortran, a function with the name main (in the symbol table of the object file) is generated, which initializes the libgfortran library and then calls the actual program which uses the name MAIN__, for historic reasons. If you link GNU Fortran compiled procedures to, e.g., a C or C++ program or to a Fortran program compiled by a different compiler, the libgfortran library is not initialized and thus a few intrinsic procedures do not work properly, e.g. those for obtaining the command-line arguments. Therefore, if your PROGRAM is not compiled with GNU Fortran and the GNU Fortran compiled procedures require intrinsics relying on the library initialization, you need to initialize the library yourself. Using the default options, gfortran calls _gfortran_set_ args and _gfortran_set_options. The initialization of the former is needed if the called procedures access the command line (and for backtracing); the latter sets some flags based on the standard chosen or to enable backtracing. In typical programs, it is not necessary to call any initialization function. If your PROGRAM is compiled with GNU Fortran, you shall not call any of the following functions. The libgfortran initialization functions are shown in C syntax but using C bindings they are also accessible from Fortran.
void _gfortran_set_args (int argc, char *argv[]) number of command line argument strings the command-line argument strings; argv[0] is the pathname of the executable itself.
56
Arguments: num argv option flag list: option[0] number of options passed The list of flag values Allowed standard; can give run-time errors if e.g. an input-output edit descriptor is invalid in a given standard. Possible values are (bitwise or-ed) GFC_STD_F77 (1), GFC_ STD_F95_OBS (2), GFC_STD_F95_DEL (4), GFC_STD_F95 (8), GFC_STD_F2003 (16), GFC_STD_GNU (32), GFC_STD_LEGACY (64), GFC_STD_F2008 (128), and GFC_STD_F2008_OBS (256). Default: GFC_STD_F95_OBS | GFC_STD_F95_DEL | GFC_STD_F95 | GFC_STD_F2003 | GFC_STD_F2008 | GFC_STD_F2008_OBS | GFC_STD_F77 | GFC_STD_GNU | GFC_STD_LEGACY. Standard-warning flag; prints a warning to standard error. Default: GFC_STD_F95_DEL | GFC_STD_LEGACY. If non zero, enable pedantic checking. Default: off. If non zero, enable core dumps on run-time errors. Default: off. If non zero, enable backtracing on run-time errors. Default: off. Note: Installs a signal handler and requires command-line initialization using _gfortran_set_args. If non zero, supports signed zeros. Default: enabled. Enables run-time checking. Possible values are (bitwise or-ed): GFC RTCHECK BOUNDS (1), GFC RTCHECK ARRAY TEMPS (2), GFC RTCHECK RECURSION (4), GFC RTCHECK DO (16), GFC RTCHECK POINTER (32). Default: disabled. If non zero, range checking is enabled. Default: enabled. See -frange-check (see Section 2.9 [Code Gen Options], page 19).
option[5] option[6]
option[7] Example:
/* Use gfortran 4.5 default options. */ static int options[] = {68, 255, 0, 0, 0, 1, 0, 1}; _gfortran_set_options (8, &options);
Example:
57
int main (int argc, char *argv[]) { /* Initialize libgfortran. */ _gfortran_set_args (argc, argv); _gfortran_set_convert (1); return 0; }
void _gfortran_set_record_marker (int val) Length of the record marker; valid values are 4 and 8. Default is 4.
Example:
int main (int argc, char *argv[]) { /* Initialize libgfortran. */ _gfortran_set_args (argc, argv); /* FPE for invalid operations such as SQRT(-1.0). _gfortran_set_fpe (1); return 0; }
*/
58
void _gfortran_set_max_subrecord_length (int val) the maximum length for a subrecord; the maximum permitted value is 2147483639, which is also the default.
59
8 Intrinsic Procedures
8.1 Introduction to intrinsic procedures
The intrinsic procedures provided by GNU Fortran include all of the intrinsic procedures required by the Fortran 95 standard, a set of intrinsic procedures for backwards compatibility with G77, and a selection of intrinsic procedures from the Fortran 2003 and Fortran 2008 standards. Any conflict between a description here and a description in either the Fortran 95 standard, the Fortran 2003 standard or the Fortran 2008 standard is unintentional, and the standard(s) should be considered authoritative. The enumeration of the KIND type parameter is processor defined in the Fortran 95 standard. GNU Fortran defines the default integer type and default real type by INTEGER(KIND=4) and REAL(KIND=4), respectively. The standard mandates that both data types shall have another kind, which have more precision. On typical target architectures supported by gfortran, this kind type parameter is KIND=8. Hence, REAL(KIND=8) and DOUBLE PRECISION are equivalent. In the description of generic intrinsic procedures, the kind type parameter will be specified by KIND=*, and in the description of specific names for an intrinsic procedure the kind type parameter will be explicitly given (e.g., REAL(KIND=4) or REAL(KIND=8)). Finally, for brevity the optional KIND= syntax will be omitted. Many of the intrinsic procedures take one or more optional arguments. This document follows the convention used in the Fortran 95 standard, and denotes such arguments by square brackets. GNU Fortran offers the -std=f95 and -std=gnu options, which can be used to restrict the set of intrinsic procedures to a given standard. By default, gfortran sets the -std=gnu option, and so all intrinsic procedures described here are accepted. There is one caveat. For a select group of intrinsic procedures, g77 implemented both a function and a subroutine. Both classes have been implemented in gfortran for backwards compatibility with g77. It is noted here that these functions and subroutines cannot be intermixed in a given subprogram. In the descriptions that follow, the applicable standard for each intrinsic procedure is noted.
60
See also:
Section 8.76 [EXIT], page 106, Section 8.136 [KILL], page 141
Return value: The return value is of the same type and kind as the argument except the return value is REAL for a COMPLEX argument. Example:
program test_abs integer :: i = -1 real :: x = -1.e0 complex :: z = (-1.e0,0.e0) i = abs(i) x = abs(x) x = abs(z) end program test_abs
A A A A
Standard Fortran 77 and later Fortran 77 and later Fortran 77 and later Fortran 77 and later GNU extension GNU extension
61
Syntax : Arguments:
RESULT = ACCESS(NAME, MODE) NAME Scalar CHARACTER of default kind with the file name. Tailing blank are ignored unless the character achar(0) is present, then all characters up to and excluding achar(0) are used as file name. Scalar CHARACTER of default kind with the file access mode, may be any concatenation of "r" (readable), "w" (writable) and "x" (executable), or " " to check for existence.
MODE
Return value: Returns a scalar INTEGER, which is 0 if the file is accessible in the given mode; otherwise or if an invalid argument has been given for MODE the value 1 is returned. Example:
program access_test implicit none character(len=*), parameter :: file = test.dat character(len=*), parameter :: file2 = test.dat //achar(0) if(access(file, ) == 0) print *, trim(file), is exists if(access(file,r) == 0) print *, trim(file), is readable if(access(file,w) == 0) print *, trim(file), is writable if(access(file,x) == 0) print *, trim(file), is executable if(access(file2,rwx) == 0) & print *, trim(file2), is readable, writable and executable end program access_test
Return value: The return value is of type CHARACTER with a length of one. If the KIND argument is present, the return value is of the specified kind and of the default kind otherwise. Example:
62
See Section 8.117 [ICHAR], page 130 for a discussion of converting between numerical values and formatted string representations. Section 8.43 [CHAR], page 85, Section 8.109 [IACHAR], page 126, Section 8.117 [ICHAR], page 130
Return value: The return value is of the same type and kind as X. The real part of the result is in radians and lies in the range 0 acos(x) . Example:
program test_acos real(8) :: x = 0.866_8 x = acos(x) end program test_acos
63
Return value: The return value has the same type and kind as X. If X is complex, the imaginary part of the result is in radians and lies between 0 acosh(x) . Example:
PROGRAM test_acosh REAL(8), DIMENSION(3) :: x = (/ 1.0, 2.0, 3.0 /) WRITE (*,*) ACOSH(x) END PROGRAM
Argument REAL(8) X
See also:
Section 8.9 [ADJUSTR], page 63, Section 8.245 [TRIM], page 201
64
Arguments: STR The type shall be CHARACTER. Return value: The return value is of type CHARACTER and of the same kind as STRING where trailing spaces are removed and the same number of spaces are inserted at the start of STRING. Example:
program test_adjustr character(len=20) :: str = gfortran str = adjustr(str) print *, str end program test_adjustr
See also:
Section 8.8 [ADJUSTL], page 63, Section 8.245 [TRIM], page 201
Fortran 77 and later, has overloads that are GNU extensions Elemental function RESULT = AIMAG(Z)
65
Return value: The return value is of type REAL with the kind type parameter of the argument if the optional KIND is absent; otherwise, the kind type parameter will be given by KIND. If the magnitude of X is less than one, AINT(X) returns zero. If the magnitude is equal to or greater than one then it returns the largest whole number that does not exceed its magnitude. The sign is the same as the sign of X. Example:
program test_aint real(4) x4 real(8) x8 x4 = 1.234E0_4 x8 = 4.321_8 print *, aint(x4), dint(x8) x8 = aint(x4,8) end program test_aint
66
Arguments: SECONDS HANDLER The type of the argument shall be a scalar INTEGER. It is INTENT(IN). Signal handler (INTEGER FUNCTION or SUBROUTINE) or dummy/global INTEGER scalar. The scalar values may be either SIG_IGN=1 to ignore the alarm generated or SIG_DFL=0 to set the default action. It is INTENT(IN). (Optional) STATUS shall be a scalar variable of the default INTEGER kind. It is INTENT(OUT).
STATUS Example:
program test_alarm external handler_print integer i call alarm (3, handler_print, i) print *, i call sleep(10) end program test_alarm
This will cause the external routine handler print to be called after 3 seconds.
Return value: ALL(MASK) returns a scalar value of type LOGICAL where the kind type parameter is the same as the kind type parameter of MASK. If DIM is present, then ALL(MASK, DIM) returns an array with the rank of MASK minus 1. The shape is determined from the shape of MASK where the DIM dimension is elided. (A) (B) ALL(MASK) is true if all elements of MASK are true. It also is true if MASK has zero size; otherwise, it is false. If the rank of MASK is one, then ALL(MASK,DIM) is equivalent to ALL(MASK). If the rank is greater than one, then ALL(MASK,DIM) is determined by applying ALL to the array sections.
Example:
67
program test_all logical l l = all((/.true., .true., .true./)) print *, l call section contains subroutine section integer a(2,3), b(2,3) a = 1 b = 1 b(2,2) = 2 print *, all(a .eq. b, 1) print *, all(a .eq. b, 2) end subroutine section end program test_all
Return value: The return value is a scalar LOGICAL with the default logical kind type parameter. If the argument is allocated, then the result is .TRUE.; otherwise, it returns .FALSE. Example:
program test_allocated integer :: i = 4 real(4), allocatable :: x(:) if (.not. allocated(x)) allocate(x(i)) end program test_allocated
68
GNU extension Function RESULT = AND(I, J) I J The type shall be either a scalar INTEGER type or a scalar LOGICAL type. The type shall be the same as the type of I.
Return value: The return type is either a scalar INTEGER or a scalar LOGICAL. If the kind type parameters differ, then the smaller kind type is implicitly converted to larger kind, and the return has the larger kind. Example:
PROGRAM test_and LOGICAL :: T = .TRUE., F = .FALSE. INTEGER :: a, b DATA a / ZF /, b / Z3 / WRITE (*,*) AND(T, T), AND(T, F), AND(F, T), AND(F, F) WRITE (*,*) AND(a, b) END PROGRAM
See also:
Return value: The return value is of type real with the kind type parameter of the argument if the optional KIND is absent; otherwise, the kind type parameter will be given by KIND. If A is greater than zero, ANINT(A) returns AINT(X+0.5). If A is less than or equal to zero then it returns AINT(X-0.5). Example:
program test_anint real(4) x4 real(8) x8 x4 = 1.234E0_4 x8 = 4.321_8
69
Return value: ANY(MASK) returns a scalar value of type LOGICAL where the kind type parameter is the same as the kind type parameter of MASK. If DIM is present, then ANY(MASK, DIM) returns an array with the rank of MASK minus 1. The shape is determined from the shape of MASK where the DIM dimension is elided. (A) (B) ANY(MASK) is true if any element of MASK is true; otherwise, it is false. It also is false if MASK has zero size. If the rank of MASK is one, then ANY(MASK,DIM) is equivalent to ANY(MASK). If the rank is greater than one, then ANY(MASK,DIM) is determined by applying ANY to the array sections.
program test_any logical l l = any((/.true., .true., .true./)) print *, l call section contains subroutine section integer a(2,3), b(2,3) a = 1 b = 1 b(2,2) = 2 print *, any(a .eq. b, 1) print *, any(a .eq. b, 2) end subroutine section end program test_any
Example:
70
Return value: The return value is of the same type and kind as X. The real part of the result is in radians and lies in the range /2 asin(x) /2. Example:
program test_asin real(8) :: x = 0.866_8 x = asin(x) end program test_asin
71
Argument REAL(8) X
Return value: ASSOCIATED(POINTER) returns a scalar value of type LOGICAL(4). There are several cases: (A) When the optional TARGET is not present then ASSOCIATED(POINTER) is true if POINTER is associated with a target; otherwise, it returns false. (B) If TARGET is present and a scalar target, the result is true if TARGET is not a zero-sized storage sequence and the target associated with POINTER occupies the same storage units. If POINTER is disassociated, the result is false. (C) If TARGET is present and an array target, the result is true if TARGET and POINTER have the same shape, are not zero-sized arrays, are arrays whose elements are not zero-sized storage sequences, and TARGET and POINTER occupy the same storage units in array element order. As in case(B), the result is false, if POINTER is disassociated. (D) If TARGET is present and an scalar pointer, the result is true if TARGET is associated with POINTER, the target associated with TARGET are not zero-sized storage sequences and occupy the same storage units. The result is false, if either TARGET or POINTER is disassociated.
72
(E) If TARGET is present and an array pointer, the result is true if target associated with POINTER and the target associated with TARGET have the same shape, are not zero-sized arrays, are arrays whose elements are not zero-sized storage sequences, and TARGET and POINTER occupy the same storage units in array element order. The result is false, if either TARGET or POINTER is disassociated. Example:
program test_associated implicit none real, target :: tgt(2) = (/1., 2./) real, pointer :: ptr(:) ptr => tgt if (associated(ptr) .eqv. .false.) call abort if (associated(ptr,tgt) .eqv. .false.) call abort end program test_associated
See also:
Fortran 77 and later, for a complex argument and for two arguments Fortran 2008 or later Elemental function
73
Return value: The return value has the same type and kind type parameter as Y. It is the principal value of the complex number X + iY . If X is nonzero, then it lies in the range atan(x) . The sign is positive if Y is positive. If Y is zero, then the return value is zero if X is positive and if X is negative. Finally, if X is zero, then the magnitude of the result is /2. Example:
program test_atan2 real(4) :: x = 1.e0_4, y = 0.5e0_4 x = atan2(y,x) end program test_atan2
74
Arguments: X The type shall be REAL or COMPLEX. Return value: The return value has same type and kind as X. If X is complex, the imaginary part of the result is in radians and lies between /2 atanh(x) /2. Example:
PROGRAM test_atanh REAL, DIMENSION(3) :: x = (/ -1.0, 0.0, 1.0 /) WRITE (*,*) ATANH(x) END PROGRAM
Argument REAL(8) X
Argument REAL(8) X
75
Elemental function RESULT = BESSEL_J1(X) X The type shall be REAL, and it shall be scalar. the range
Return value: The return value is of type REAL and it lies in 0.5818... Bessel(0, x) 0.5818. It has the same kind as X. Example:
program test_besj1 real(8) :: x = 1.0_8 x = bessel_j1(x) end program test_besj1
Argument REAL(8) X
Return value: The return value is a scalar of type REAL. It has the same kind as X. Note: Example: The transformational function uses a recurrence algorithm which might, for some values of X, lead to different results than calls to the elemental function.
76
Argument REAL(8) X
77
Return value: The return value is a scalar of type REAL. It has the same kind as X. Example:
program test_besy1 real(8) :: x = 1.0_8 x = bessel_y1(x) end program test_besy1
Argument REAL(8) X
Return value: The return value is a scalar of type REAL. It has the same kind as X. Note: Example:
program test_besyn real(8) :: x = 1.0_8 x = bessel_yn(5,x) end program test_besyn
The transformational function uses a recurrence algorithm which might, for some values of X, lead to different results than calls to the elemental function.
78
Return value: The return value is of type LOGICAL and of the default kind. See also: Section 8.31 [BGT], page 78, Section 8.33 [BLE], page 79, Section 8.34 [BLT], page 79
Return value: The return value is of type LOGICAL and of the default kind. See also: Section 8.30 [BGE], page 78, Section 8.33 [BLE], page 79, Section 8.34 [BLT], page 79
79
Return value: The return value is of type LOGICAL and of the default kind. See also: Section 8.31 [BGT], page 78, Section 8.30 [BGE], page 78, Section 8.34 [BLT], page 79
Return value: The return value is of type LOGICAL and of the default kind. See also: Section 8.30 [BGE], page 78, Section 8.31 [BGT], page 78, Section 8.33 [BLE], page 79
80
Return value: The return value is of type LOGICAL; it is .false. if either c ptr 1 is a C NULL pointer or if c ptr1 and c ptr 2 point to different addresses. Example:
subroutine association_test(a,b) use iso_c_binding, only: c_associated, c_loc, c_ptr implicit none real, pointer :: a type(c_ptr) :: b if(c_associated(b, c_loc(a))) &
81
See also:
See also:
Section 8.36 [C ASSOCIATED], page 80, Section 8.40 [C LOC], page 83, Section 8.39 [C F POINTER], page 82, Section 8.38 [C F PROCPOINTER], page 81
82
Fortran 2003 and later Subroutine CALL C_F_PROCPOINTER(cptr, fptr) CPTR FPTR scalar of the type C_FUNPTR. It is INTENT(IN). procedure pointer interoperable with cptr. It is INTENT(OUT).
Example:
program main use iso_c_binding implicit none abstract interface function func(a) import :: c_float real(c_float), intent(in) :: a real(c_float) :: func end function end interface interface function getIterFunc() bind(c,name="getIterFunc") import :: c_funptr type(c_funptr) :: getIterFunc end function end interface type(c_funptr) :: cfunptr procedure(func), pointer :: myFunc cfunptr = getIterFunc() call c_f_procpointer(cfunptr, myFunc) end program main
See also:
Example:
program main use iso_c_binding
83
implicit none interface subroutine my_routine(p) bind(c,name=myC_func) import :: c_ptr type(c_ptr), intent(out) :: p end subroutine end interface type(c_ptr) :: cptr real,pointer :: a(:) call my_routine(cptr) call c_f_pointer(cptr, a, [12]) end program main
See also:
Return value: The return value is of type C_PTR and contains the C address of the argument. Example:
subroutine association_test(a,b) use iso_c_binding, only: c_associated, c_loc, c_ptr implicit none real, pointer :: a type(c_ptr) :: b if(c_associated(b, c_loc(a))) & stop b and a do not point to same target end subroutine association_test
See also:
Section 8.36 [C ASSOCIATED], page 80, Section 8.37 [C FUNLOC], page 81, Section 8.39 [C F POINTER], page 82, Section 8.38 [C F PROCPOINTER], page 81
84
Fortran 2008 Inquiry function of the module ISO_C_BINDING N = C_SIZEOF(X) X The argument shall be an interoperable data entity.
Return value: The return value is of type integer and of the system-dependent kind C_SIZE_T (from the ISO_C_BINDING module). Its value is the number of bytes occupied by the argument. If the argument has the POINTER attribute, the number of bytes of the storage area pointed to is returned. If the argument is of a derived type with POINTER or ALLOCATABLE components, the return value doesnt account for the sizes of the data pointed to by these components. Example:
use iso_c_binding integer(c_int) :: i real(c_float) :: r, s(5) print *, (c_sizeof(s)/c_sizeof(r) == 5) end
The example will print .TRUE. unless you are using a platform where default REAL variables are unusually padded. See also: Section 8.224 [SIZEOF], page 189, Section 8.231 [STORAGE SIZE], page 193
Return value: The return value is of type INTEGER(KIND) if KIND is present and a defaultkind INTEGER otherwise. Example:
program test_ceiling real :: x = 63.29 real :: y = -63.59 print *, ceiling(x) ! returns 64 print *, ceiling(y) ! returns -63 end program test_ceiling
See also:
Section 8.83 [FLOOR], page 110, Section 8.180 [NINT], page 164
85
Argument INTEGER I
See Section 8.117 [ICHAR], page 130 for a discussion of converting between numerical values and formatted string representations. Section 8.5 [ACHAR], page 61, Section 8.109 [IACHAR], page 126, Section 8.117 [ICHAR], page 130
86
STATUS
(Optional) INTEGER status flag of the default kind. Returns 0 on success, and a system specific and nonzero error code otherwise.
Example:
PROGRAM test_chdir CHARACTER(len=255) :: path CALL getcwd(path) WRITE(*,*) TRIM(path) CALL chdir("/tmp") CALL getcwd(path) WRITE(*,*) TRIM(path) END PROGRAM
See also:
MODE
STATUS
Return value: In either syntax, STATUS is set to 0 on success and nonzero otherwise. Example: CHMOD as subroutine
program chmod_test implicit none integer :: status
87
CHMOD as function:
program chmod_test implicit none integer :: status status = chmod(test.dat,u+x) print *, Status: , status end program chmod_test
Return value: The return value is of COMPLEX type, with a kind equal to KIND if it is specified. If KIND is not specified, the result is of the default COMPLEX kind, regardless of the kinds of X and Y. Example:
program test_cmplx integer :: i = 42 real :: x = 3.14 complex :: z z = cmplx(i, x) print *, z, cmplx(x) end program test_cmplx
See also:
88
See also:
Section 8.96 [GET COMMAND], page 119, Section 8.97 [GET COMMAND ARGUMENT], page 119
See
also:
page
88,
Section
9.1
89
Fortran 2008 Inquiry function of the module ISO_FORTRAN_ENV STR = COMPILER_VERSION() None.
Return value: The return value is a default-kind string with system-dependent length. It contains the name of the compiler and its version number. Example:
use iso_fortran_env print (4a), This file was compiled by , & compiler_version(), using the the options , & compiler_options() end
See
also:
page
88,
Section
9.1
Return value: If X and Y are both of INTEGER type, then the return value is of default COMPLEX type. If X and Y are of REAL type, or one is of REAL type and one is of INTEGER type, then the return value is of COMPLEX type with a kind equal to that of the REAL argument with the highest precision. Example:
program test_complex integer :: i = 42 real :: x = 3.14 print *, complex(i, x) end program test_complex
See also:
90
Fortran 77 and later, has overloads that are GNU extensions Elemental function Z = CONJG(Z)
Fortran 77 and later, has overloads that are GNU extensions Elemental function RESULT = COS(X)
91
Specific names: Name COS(X) DCOS(X) CCOS(X) ZCOS(X) CDCOS(X) See also:
Standard Fortran 77 and later Fortran 77 and later Fortran 77 and later GNU extension GNU extension
Fortran 77 and later, for a complex argument Fortran 2008 or later Elemental function X = COSH(X)
92
Arguments: MASK DIM KIND The type shall be LOGICAL. (Optional) The type shall be INTEGER. (Optional) An INTEGER initialization expression indicating the kind parameter of the result.
Return value: The return value is of type INTEGER and of kind KIND. If KIND is absent, the return value is of default integer kind. If DIM is present, the result is an array with a rank one less than the rank of ARRAY, and a size corresponding to the shape of ARRAY with the DIM dimension removed. Example:
program test_count integer, dimension(2,3) :: a, b logical, dimension(2,3) :: mask a = reshape( (/ 1, 2, 3, 4, 5, 6 /), (/ 2, 3 /)) b = reshape( (/ 0, 7, 3, 4, 5, 8 /), (/ 2, 3 /)) print (3i3), a(1,:) print (3i3), a(2,:) print * print (3i3), b(1,:) print (3i3), b(2,:) print * mask = a.ne.b print (3l3), mask(1,:) print (3l3), mask(2,:) print * print (3i3), count(mask) print * print (3i3), count(mask, 1) print * print (3i3), count(mask, 2) end program test_count
93
See also:
Section 8.235 [SYSTEM CLOCK], page 195, Section 8.58 [DATE AND TIME], page 94
Return value: Returns an array of same type and rank as the ARRAY argument. Example:
program test_cshift integer, dimension(3,3) :: a a = reshape( (/ 1, 2, 3, 4, 5, 6, 7, 8, 9 /), (/ 3, 3 /)) print (3i3), a(1,:) print (3i3), a(2,:) print (3i3), a(3,:) a = cshift(a, SHIFT=(/1, 2, -1/), DIM=2) print * print (3i3), a(1,:) print (3i3), a(2,:) print (3i3), a(3,:) end program test_cshift
94
See Also:
Section 8.58 [DATE AND TIME], page 94, Section 8.105 [GMTIME], page 124, Section 8.157 [LTIME], page 152, Section 8.239 [TIME], page 198, Section 8.240 [TIME8], page 199
95
VALUES is INTENT(OUT) and provides the following: VALUE(1): The year VALUE(2): The month VALUE(3): The day of the month VALUE(4): Time difference with UTC in minutes VALUE(5): The hour of the day VALUE(6): The minutes of the hour VALUE(7): The seconds of the minute VALUE(8): The milliseconds of the second Standard : Class: Syntax : Arguments: DATE TIME ZONE VALUES Return value: None Example:
program test_time_and_date character(8) :: date character(10) :: time character(5) :: zone integer,dimension(8) :: values ! using keyword arguments call date_and_time(date,time,zone,values) call date_and_time(DATE=date,ZONE=zone) call date_and_time(TIME=time) call date_and_time(VALUES=values) print (a,2x,a,2x,a), date, time, zone print (8i5)), values end program test_time_and_date
Fortran 95 and later Subroutine CALL DATE_AND_TIME([DATE, TIME, ZONE, VALUES]) (Optional) The type shall be CHARACTER(LEN=8) or larger, and of default kind. (Optional) The type shall be CHARACTER(LEN=10) or larger, and of default kind. (Optional) The type shall be CHARACTER(LEN=5) or larger, and of default kind. (Optional) The type shall be INTEGER(8).
See also:
Section 8.55 [CPU TIME], page 92, Section 8.235 [SYSTEM CLOCK], page 195
96
Syntax : Arguments:
Return value: The return value is of type double precision real. Example:
program test_dble real :: x = 2.18 integer :: i = 5 complex :: z = (2.3,1.14) print *, dble(x), dble(i), dble(z) end program test_dble
See also:
97
Fortran 95 and later Inquiry function RESULT = DIGITS(X) X The type may be INTEGER or REAL.
Standard Fortran 77 and later Fortran 77 and later Fortran 77 and later
98
Return value: If the arguments are numeric, the return value is a scalar of numeric type, INTEGER, REAL, or COMPLEX. If the arguments are LOGICAL, the return value is .TRUE. or .FALSE.. Example:
program test_dot_prod integer, dimension(3) :: a, b a = (/ 1, 2, 3 /) b = (/ 4, 5, 6 /) print (3i3), a print * print (3i3), b print * print *, dot_product(a,b) end program test_dot_prod
99
Example:
program test_dprod real :: x = 5.2 real :: y = 2.3 real(8) :: d d = dprod(x,y) print *, d end program test_dprod
Argument REAL(4) X, Y
See also:
100
Return value: The return value has same type and kind as I. See also: Section 8.67 [DSHIFTR], page 100
Return value: The return value has same type and kind as I. See also: Section 8.66 [DSHIFTL], page 99
101
VALUES(1): VALUES(2): TIME: Standard : Class: Syntax : GNU extension Subroutine, function
User time in seconds. System time in seconds. Run time since start in seconds.
CALL DTIME(VALUES, TIME). TIME = DTIME(VALUES), (not recommended). Arguments: VALUES TIME The type shall be REAL(4), DIMENSION(2). The type shall be REAL(4).
Return value: Elapsed time in seconds since the last invocation or since the start of program execution if not called before. Example:
program test_dtime integer(8) :: i, j real, dimension(2) :: tarray real :: result call dtime(tarray, result) print *, result print *, tarray(1) print *, tarray(2) do i=1,100000000 ! Just a delay j = i * i - i end do call dtime(tarray, result) print *, result print *, tarray(1) print *, tarray(2) end program test_dtime
See also:
102
Numeric 0 of the type and kind of ARRAY. Logical .FALSE.. Character(len) len blanks. Standard : Class: Syntax : Arguments: ARRAY SHIFT BOUNDARY DIM May be any type, not scalar. The type shall be INTEGER. Same type as ARRAY. The type shall be INTEGER. Fortran 95 and later Transformational function RESULT = EOSHIFT(ARRAY, SHIFT [, BOUNDARY, DIM])
Return value: Returns an array of same type and rank as the ARRAY argument. Example:
program test_eoshift integer, dimension(3,3) :: a a = reshape( (/ 1, 2, 3, 4, 5, 6, 7, 8, 9 /), (/ 3, 3 /)) print (3i3), a(1,:) print (3i3), a(2,:) print (3i3), a(3,:) a = EOSHIFT(a, SHIFT=(/1, 2, 1/), BOUNDARY=-5, DIM=2) print * print (3i3), a(1,:) print (3i3), a(2,:) print (3i3), a(3,:) end program test_eoshift
103
Argument REAL(8) X
Argument REAL(8) X
104
105
Return value: Elapsed time in seconds since the start of program execution. Example:
program test_etime integer(8) :: i, j real, dimension(2) :: tarray real :: result call ETIME(tarray, result) print *, result print *, tarray(1) print *, tarray(2) do i=1,100000000 ! Just a delay j = i * i - i end do call ETIME(tarray, result) print *, result print *, tarray(1) print *, tarray(2) end program test_etime
See also:
106
CMDMSG Example:
program test_exec integer :: i call execute_command_line ("external_prog.exe", exitstat=i) print *, "Exit status of external_prog.exe was ", i call execute_command_line ("reindex_files.exe", wait=.false.) print *, "Now reindexing files in the background" end program test_exec
Note: Because this intrinsic is implemented in terms of the system function call, its behavior with respect to signaling is processor dependent. In particular, on POSIX-compliant systems, the SIGINT and SIGQUIT signals will be ignored, and the SIGCHLD will be blocked. As such, if the parent process is terminated, the child process might not be terminated alongside. See also: Section 8.234 [SYSTEM], page 195
See also:
Section 8.2 [ABORT], page 59, Section 8.136 [KILL], page 141
107
Fortran 77 and later, has overloads that are GNU extensions Elemental function RESULT = EXP(X) X The type shall be REAL or COMPLEX.
Return value: The return value has same type and kind as X. Example:
program test_exp real :: x = 1.0 x = exp(x) end program test_exp
Standard Fortran 77 and later Fortran 77 and later Fortran 77 and later GNU extension GNU extension
108
Return value: The return value is a scalar of type default logical. It is true if and only if the dynamic type of A is an extension type of the dynamic type of MOLD. See also: Section 8.206 [SAME TYPE AS], page 178
109
j = i * i - i end do call fdate(date) print *, Program ended on , date end program test_fdate
See also:
Section 8.58 [DATE AND TIME], page 94, Section 8.57 [CTIME], page 94
Example:
PROGRAM test_fget INTEGER, PARAMETER :: strlen = 100 INTEGER :: status, i = 1 CHARACTER(len=strlen) :: str = "" WRITE (*,*) Enter text: DO CALL fget(str(i:i), status) if (status /= 0 .OR. i > strlen) exit i = i + 1 END DO WRITE (*,*) TRIM(str) END PROGRAM
See also:
Section 8.82 [FGETC], page 110, Section 8.86 [FPUT], page 112, Section 8.87 [FPUTC], page 113
110
Example:
PROGRAM test_fgetc INTEGER :: fd = 42, status CHARACTER :: c OPEN(UNIT=fd, FILE="/etc/passwd", ACTION="READ", STATUS = "OLD") DO CALL fgetc(fd, c, status) IF (status /= 0) EXIT call fput(c) END DO CLOSE(UNIT=fd) END PROGRAM
See also:
Section 8.81 [FGET], page 109, Section 8.86 [FPUT], page 112, Section 8.87 [FPUTC], page 113
111
Syntax : Arguments:
RESULT = FLOOR(A [, KIND]) A KIND The type shall be REAL. (Optional) An INTEGER initialization expression indicating the kind parameter of the result.
Return value: The return value is of type INTEGER(KIND) if KIND is present and of defaultkind INTEGER otherwise. Example:
program test_floor real :: x = 63.29 real :: y = -63.59 print *, floor(x) ! returns 63 print *, floor(y) ! returns -64 end program test_floor
See also:
Section 8.42 [CEILING], page 84, Section 8.180 [NINT], page 164
112
! Variable declaration integer :: ret ! Opening unit 10 open (10,file="foo") ! ... ! Perform I/O on unit 10 ! ... ! Flush and sync flush(10) ret = fsync(fnum(10)) ! Handle possible error if (ret /= 0) stop "Error calling FSYNC"
113
consider the use of new stream IO feature in new code for future portability. See also Section 4.1 [Fortran 2003 status], page 31. Standard : Class: Syntax : CALL FPUT(C [, STATUS]) STATUS = FPUT(C) Arguments: C STATUS The type shall be CHARACTER and of default kind. (Optional) status flag of type INTEGER. Returns 0 on success, -1 on end-of-file and a system specific positive error code otherwise. GNU extension Subroutine, function
Example:
PROGRAM test_fput CHARACTER(len=10) :: str = "gfortran" INTEGER :: i DO i = 1, len_trim(str) CALL fput(str(i:i)) END DO END PROGRAM
See also:
Section 8.87 [FPUTC], page 113, Section 8.81 [FGET], page 109, Section 8.82 [FGETC], page 110
114
STATUS
(Optional) status flag of type INTEGER. Returns 0 on success, -1 on end-of-file and a system specific positive error code otherwise.
Example:
PROGRAM test_fputc CHARACTER(len=10) :: str = "gfortran" INTEGER :: fd = 42, i OPEN(UNIT = fd, FILE = "out", ACTION = "WRITE", STATUS="NEW") DO i = 1, len_trim(str) CALL fputc(fd, str(i:i)) END DO CLOSE(fd) END PROGRAM
See also:
Section 8.86 [FPUT], page 112, Section 8.81 [FGET], page 109, Section 8.82 [FGETC], page 110
115
Syntax : Arguments:
CALL FREE(PTR) PTR The type shall be INTEGER. It represents the location of the memory that should be de-allocated.
Return value: None Example: See also: See MALLOC for an example. Section 8.158 [MALLOC], page 152
to
INTEGER :: status CALL FSEEK(UNIT, OFFSET, WHENCE, status) IF (status /= 0) GOTO label
Please note that GNU Fortran provides the Fortran 2003 Stream facility. Programmers should consider the use of new stream IO feature in new code for future portability. See also Section 4.1 [Fortran 2003 status], page 31. Standard : Class: Syntax : Arguments: UNIT OFFSET WHENCE STATUS Example:
PROGRAM test_fseek INTEGER, PARAMETER :: SEEK_SET = 0, SEEK_CUR = 1, SEEK_END = 2 INTEGER :: fd, offset, ierr ierr = 0 offset = 5
GNU extension Subroutine CALL FSEEK(UNIT, OFFSET, WHENCE[, STATUS]) Shall be a scalar of Shall be a scalar of Shall be a scalar of 1 or 2. (Optional) shall be type INTEGER. type INTEGER. type INTEGER. Its value shall be either 0, a scalar of type INTEGER(4).
116
fd
= 10
OPEN(UNIT=fd, FILE="fseek.test") CALL FSEEK(fd, offset, SEEK_SET, ierr) print *, FTELL(fd), ierr CALL FSEEK(fd, 0, SEEK_END, ierr) print *, FTELL(fd), ierr CALL FSEEK(fd, 0, SEEK_SET, ierr) print *, FTELL(fd), ierr CLOSE(UNIT=fd) END PROGRAM
! move to OFFSET
! move to end
! move to beginning
See also:
See Section 8.230 [STAT], page 192 for an example. To stat a link: Section 8.156 [LSTAT], page 151, to stat a file: Section 8.230 [STAT], page 192
117
Class: Syntax :
Return value: In either syntax, OFFSET is set to the current offset of unit number UNIT, or to 1 if the unit is not currently open. Example:
PROGRAM test_ftell INTEGER :: i OPEN(10, FILE="temp.dat") CALL ftell(10,i) WRITE(*,*) i END PROGRAM
See also:
(x) =
0
tx1 et dt
Fortran 2008 and later Elemental function X = GAMMA(X) X Shall be of type REAL and neither zero nor a negative integer.
Return value: The return value is of type REAL of the same kind as X. Example:
program test_gamma real :: x = 1.0 x = gamma(x) ! returns 1.0 end program test_gamma
Logarithm of the Gamma function: Section 8.152 [LOG GAMMA], page 149
118
GNU extension Subroutine CALL GERROR(RESULT) Shall of type CHARACTER and of default
See also:
Section 8.120 [IERRNO], page 132, Section 8.188 [PERROR], page 169
Return value: After GETARG returns, the VALUE argument holds the POSth command line argument. If VALUE can not hold the argument, it is truncated to fit the length of VALUE. If there are less than POS arguments specified at the command line, VALUE will be filled with blanks. If POS = 0, VALUE is set to the name of the program (on systems that support this feature). Example:
119
PROGRAM test_getarg INTEGER :: i CHARACTER(len=32) :: arg DO i = 1, iargc() CALL getarg(i, arg) WRITE (*,*) arg END DO END PROGRAM
See also:
GNU Fortran 77 compatibility function: Section 8.113 [IARGC], page 129 Fortran 2003 functions and subroutines: Section 8.96 [GET COMMAND], page 119, Section 8.97 [GET COMMAND ARGUMENT], page 119, Section 8.47 [COMMAND ARGUMENT COUNT], page 87
Return value: If COMMAND is present, stores the entire command line that was used to invoke the program in COMMAND. If LENGTH is present, it is assigned the length of the command line. If STATUS is present, it is assigned 0 upon success of the command, -1 if COMMAND is too short to store the command line, or a positive value in case of an error. Example:
PROGRAM test_get_command CHARACTER(len=255) :: cmd CALL get_command(cmd) WRITE (*,*) TRIM(cmd) END PROGRAM
See also:
Section 8.97 [GET COMMAND ARGUMENT], page 119, Section 8.47 [COMMAND ARGUMENT COUNT], page 87
120
Subroutine CALL GET_COMMAND_ARGUMENT(NUMBER [, VALUE, LENGTH, STATUS]) NUMBER VALUE LENGTH STATUS Shall be a scalar of type INTEGER and of default kind, NUMBER 0 (Optional) Shall be a scalar of type CHARACTER and of default kind. (Optional) Shall be a scalar of type INTEGER and of default kind. (Optional) Shall be a scalar of type INTEGER and of default kind.
Return value: After GET_COMMAND_ARGUMENT returns, the VALUE argument holds the NUMBER-th command line argument. If VALUE can not hold the argument, it is truncated to fit the length of VALUE. If there are less than NUMBER arguments specified at the command line, VALUE will be filled with blanks. If NUMBER = 0, VALUE is set to the name of the program (on systems that support this feature). The LENGTH argument contains the length of the NUMBER-th command line argument. If the argument retrieval fails, STATUS is a positive number; if VALUE contains a truncated command line argument, STATUS is -1; and otherwise the STATUS is zero. Example:
PROGRAM test_get_command_argument INTEGER :: i CHARACTER(len=32) :: arg i = 0 DO CALL get_command_argument(i, arg) IF (LEN_TRIM(arg) == 0) EXIT WRITE (*,*) TRIM(arg) i = i+1 END DO END PROGRAM
See
also:
119,
Section
8.47
[COM-
121
The type shall be CHARACTER and of default kind. (Optional) status flag. Returns 0 on success, a system specific and nonzero error code otherwise.
See also:
Return value: Stores the value of NAME in VALUE. If VALUE is not large enough to hold the data, it is truncated. If NAME is not set, VALUE will be filled with blanks. Example:
PROGRAM test_getenv CHARACTER(len=255) :: homedir CALL getenv("HOME", homedir) WRITE (*,*) TRIM(homedir) END PROGRAM
See also:
122
Fortran 2003 and later Subroutine CALL GET_ENVIRONMENT_VARIABLE(NAME[, VALUE, LENGTH, STATUS, TRIM_NAME) NAME VALUE
123
Syntax :
RESULT = GETGID()
Return value: The return value of GETGID is an INTEGER of the default kind. Example: See also: See GETPID for an example. Section 8.103 [GETPID], page 123, Section 8.104 [GETUID], page 124
See also:
Return value: The return value of GETPID is an INTEGER of the default kind. Example:
program info print *, "The current process ID is ", getpid() print *, "Your numerical user ID is ", getuid() print *, "Your numerical group ID is ", getgid() end program info
See also:
Section 8.101 [GETGID], page 122, Section 8.104 [GETUID], page 124
124
Return value: The return value of GETUID is an INTEGER of the default kind. Example: See also: See GETPID for an example. Section 8.103 [GETPID], page 123, Section 8.102 [GETLOG], page 123
Return value: The elements of VALUES are assigned as follows: 1. Seconds after the minute, range 059 or 061 to allow for leap seconds 2. Minutes after the hour, range 059 3. Hours past midnight, range 023 4. Day of month, range 031 5. Number of months since January, range 012 6. Years since 1900 7. Number of days since Sunday, range 06 8. Days since January 1 9. Daylight savings indicator: positive if daylight savings is in effect, zero if not, and negative if the information is not available. See also: Section 8.57 [CTIME], page 94, Section 8.157 [LTIME], page 152, Section 8.239 [TIME], page 198, Section 8.240 [TIME8], page 199
125
Return value: In either syntax, NAME is set to the current hostname if it can be obtained, or to a blank string otherwise.
126
Elemental function RESULT = HYPOT(X, Y) X Y The type shall be REAL. The type and kind type parameter shall be the same as X.
Return value: The return value has the same type and kind type parameter as X. Example:
program test_hypot real(4) :: x = 1.e0_4, y = 0.5e0_4 x = hypot(x,y) end program test_hypot
Return value: The return value is of type INTEGER and of kind KIND. If KIND is absent, the return value is of default integer kind. Example:
program test_iachar integer i i = iachar( ) end program test_iachar
See Section 8.117 [ICHAR], page 130 for a discussion of converting between numerical values and formatted string representations. Section 8.5 [ACHAR], page 61, Section 8.43 [CHAR], page 85, Section 8.117 [ICHAR], page 130
127
Fortran 2008 and later Transformational function RESULT = IALL(ARRAY[, MASK]) RESULT = IALL(ARRAY, DIM[, MASK])
Arguments: ARRAY DIM MASK Shall be an array of type INTEGER (Optional) shall be a scalar of type INTEGER with a value in the range from 1 to n, where n equals the rank of ARRAY. (Optional) shall be of type LOGICAL and either be a scalar or an array of the same shape as ARRAY.
Return value: The result is of the same type as ARRAY. If DIM is absent, a scalar with the bitwise ALL of all elements in ARRAY is returned. Otherwise, an array of rank n-1, where n equals the rank of ARRAY, and a shape similar to that of ARRAY with dimension DIM dropped is returned. Example:
PROGRAM test_iall INTEGER(1) :: a(2) a(1) = b00100100 a(2) = b01101010 ! prints 00100000 PRINT (b8.8), IALL(a) END PROGRAM
See also:
Section 8.112 [IANY], page 128, Section 8.127 [IPARITY], page 136, Section 8.111 [IAND], page 127
Return value: The return type is INTEGER, of the same kind as the arguments. (If the argument kinds differ, it is of the same kind as the larger argument.)
128
Example:
PROGRAM test_iand INTEGER :: a, b DATA a / ZF /, b / Z3 / WRITE (*,*) IAND(a, b) END PROGRAM
See also:
Section 8.126 [IOR], page 135, Section 8.119 [IEOR], page 132, Section 8.115 [IBITS], page 130, Section 8.116 [IBSET], page 130, Section 8.114 [IBCLR], page 129, Section 8.182 [NOT], page 166
Return value: The result is of the same type as ARRAY. If DIM is absent, a scalar with the bitwise OR of all elements in ARRAY is returned. Otherwise, an array of rank n-1, where n equals the rank of ARRAY, and a shape similar to that of ARRAY with dimension DIM dropped is returned. Example:
PROGRAM test_iany INTEGER(1) :: a(2) a(1) = b00100100 a(2) = b01101010 ! prints 01101110 PRINT (b8.8), IANY(a) END PROGRAM
See also:
Section 8.127 [IPARITY], page 136, Section 8.110 [IALL], page 126, Section 8.126 [IOR], page 135
129
Return value: The return value is of type INTEGER and of the same kind as I. See also: Section 8.115 [IBITS], page 130, Section 8.116 [IBSET], page 130, Section 8.111 [IAND], page 127, Section 8.126 [IOR], page 135, Section 8.119 [IEOR], page 132, Section 8.177 [MVBITS], page 163
130
Return value: The return value is of type INTEGER and of the same kind as I. See also: Section 8.32 [BIT SIZE], page 78, Section 8.114 [IBCLR], page 129, Section 8.116 [IBSET], page 130, Section 8.111 [IAND], page 127, Section 8.126 [IOR], page 135, Section 8.119 [IEOR], page 132
Return value: The return value is of type INTEGER and of the same kind as I. See also: Section 8.114 [IBCLR], page 129, Section 8.115 [IBITS], page 130, Section 8.111 [IAND], page 127, Section 8.126 [IOR], page 135, Section 8.119 [IEOR], page 132, Section 8.177 [MVBITS], page 163
131
Fortran 95 and later, with KIND argument Fortran 2003 and later Elemental function RESULT = ICHAR(C [, KIND]) C KIND Shall be a scalar CHARACTER, with INTENT(IN) (Optional) An INTEGER initialization expression indicating the kind parameter of the result.
Return value: The return value is of type INTEGER and of kind KIND. If KIND is absent, the return value is of default integer kind. Example:
program test_ichar integer i i = ichar( ) end program test_ichar
Argument CHARACTER C
No intrinsic exists to convert between a numeric value and a formatted character string representation for instance, given the CHARACTER value 154, obtaining an INTEGER or REAL value with the value 154, or vice versa. Instead, this functionality is provided by internal-file I/O, as in the following example:
program read_val integer value character(len=10) string, string2 string = 154 ! Convert a string to a numeric value read (string,(I10)) value print *, value ! Convert a value to a formatted string write (string2,(I10)) value print *, string2 end program read_val
See also:
Section 8.5 [ACHAR], page 61, Section 8.43 [CHAR], page 85, Section 8.109 [IACHAR], page 126
132
GNU extension Subroutine CALL IDATE(VALUES) VALUES The type shall be INTEGER, DIMENSION(3) and the kind shall be the default integer kind.
Return value: The return type is INTEGER, of the same kind as the arguments. (If the argument kinds differ, it is of the same kind as the larger argument.) See also: Section 8.126 [IOR], page 135, Section 8.111 [IAND], page 127, Section 8.115 [IBITS], page 130, Section 8.116 [IBSET], page 130, Section 8.114 [IBCLR], page 129, Section 8.182 [NOT], page 166
133
Arguments: None. Return value: The return value is of type INTEGER and of the default integer kind. See also: Section 8.188 [PERROR], page 169
Return value: Scalar default integer with the value of the image index which corresponds to the cosubscripts. For invalid cosubscripts the result is zero. Example:
INTEGER :: array[2,-1:4,8,*] ! Writes 28 (or 0 if there are fewer than 28 images) WRITE (*,*) IMAGE_INDEX (array, [2,0,3,1])
See also:
Section 8.238 [THIS IMAGE], page 197, Section 8.184 [NUM IMAGES], page 166
134
KIND
(Optional) An INTEGER initialization expression indicating the kind parameter of the result.
Return value: The return value is of type INTEGER and of kind KIND. If KIND is absent, the return value is of default integer kind. Specific names: Name INDEX(STRING, SUBSTRING) See also: Argument CHARACTER Return type INTEGER(4) Standard Fortran 77 and later
Section 8.208 [SCAN], page 179, Section 8.252 [VERIFY], page 204
Return value: These functions return a INTEGER variable or array under the following rules: (A) (B) If A is of type INTEGER, INT(A) = A If A is of type REAL and |A| < 1, INT(A) equals 0. If |A| 1, then INT(A) equals the largest integer that does not exceed the range of A and whose sign is the same as the sign of A. If A is of type COMPLEX, rule B is applied to the real part of A.
program test_int integer :: i = 42 complex :: z = (-3.7, 1.0) print *, int(i) print *, int(z), int(z,8) end program
(C) Example:
Standard Fortran 77 and later Fortran 77 and later Fortran 77 and later
135
136
Arguments: I J The type shall be INTEGER. The type shall be INTEGER, of the same kind as I. (As a GNU extension, different kinds are also permitted.)
Return value: The return type is INTEGER, of the same kind as the arguments. (If the argument kinds differ, it is of the same kind as the larger argument.) See also: Section 8.119 [IEOR], page 132, Section 8.111 [IAND], page 127, Section 8.115 [IBITS], page 130, Section 8.116 [IBSET], page 130, Section 8.114 [IBCLR], page 129, Section 8.182 [NOT], page 166
Return value: The result is of the same type as ARRAY. If DIM is absent, a scalar with the bitwise XOR of all elements in ARRAY is returned. Otherwise, an array of rank n-1, where n equals the rank of ARRAY, and a shape similar to that of ARRAY with dimension DIM dropped is returned. Example:
PROGRAM test_iparity INTEGER(1) :: a(2) a(1) = b00100100 a(2) = b01101010 ! prints 01001110 PRINT (b8.8), IPARITY(a) END PROGRAM
See also:
Section 8.112 [IANY], page 128, Section 8.110 [IALL], page 126, Section 8.119 [IEOR], page 132, Section 8.187 [PARITY], page 168
137
138
Example:
PROGRAM iostat IMPLICIT NONE INTEGER :: stat, i OPEN(88, FILE=test.dat) READ(88, *, IOSTAT=stat) i IF(IS_IOSTAT_END(stat)) STOP END OF FILE END PROGRAM
139
Example:
PROGRAM test_isatty INTEGER(kind=1) :: unit DO unit = 1, 10 write(*,*) isatty(unit=unit) END DO END PROGRAM
See also:
Return value: The return value is of type INTEGER and of the same kind as I. See also: Section 8.133 [ISHFTC], page 139
140
Return value: The return value is of type INTEGER and of the same kind as I. See also: Section 8.132 [ISHFT], page 139
Return value: Returns a default-kind LOGICAL. The returned value is TRUE if X is a NaN and FALSE otherwise. Example:
program test_nan implicit none real :: x x = -1.0 x = sqrt(x) if (isnan(x)) stop "x" is a NaN end program test_nan
141
program test_itime integer, dimension(3) :: tarray call itime(tarray) print *, tarray(1) print *, tarray(2) print *, tarray(3) end program test_itime
See also:
Section 8.2 [ABORT], page 59, Section 8.76 [EXIT], page 106
Return value: The return value is a scalar of type INTEGER and of the default integer kind. Example:
program test_kind integer,parameter :: kc = kind( ) integer,parameter :: kl = kind(.true.) print *, "The default character kind is ", kc print *, "The default logical kind is ", kl end program test_kind
142
Return value: The return value is of type INTEGER and of kind KIND. If KIND is absent, the return value is of default integer kind. If DIM is absent, the result is an array of the lower bounds of ARRAY. If DIM is present, the result is a scalar corresponding to the lower bound of the array along that dimension. If ARRAY is an expression rather than a whole array or array structure component, or if it has a zero extent along the relevant dimension, the lower bound is taken to be 1. See also: Section 8.247 [UBOUND], page 202, Section 8.139 [LCOBOUND], page 142
Return value: The return value is of type INTEGER and of kind KIND. If KIND is absent, the return value is of default integer kind. If DIM is absent, the result is an array of the lower cobounds of COARRAY. If DIM is present, the result is a scalar corresponding to the lower cobound of the array along that codimension. See also: Section 8.248 [UCOBOUND], page 203, Section 8.138 [LBOUND], page 142
143
See also:
Section 8.32 [BIT SIZE], page 78, Section 8.242 [TRAILZ], page 199, Section 8.190 [POPCNT], page 170, Section 8.191 [POPPAR], page 170
Return value: The return value is of type INTEGER and of kind KIND. If KIND is absent, the return value is of default integer kind. Specific names: Name LEN(STRING) See also: Argument CHARACTER Return type INTEGER Standard Fortran 77 and later
Section 8.142 [LEN TRIM], page 144, Section 8.8 [ADJUSTL], page 63, Section 8.9 [ADJUSTR], page 63
144
Return value: The return value is of type INTEGER and of kind KIND. If KIND is absent, the return value is of default integer kind. See also: Section 8.141 [LEN], page 143, Section 8.8 [ADJUSTL], page 63, Section 8.9 [ADJUSTR], page 63
Return value: Returns .TRUE. if STRING_A >= STRING_B, and .FALSE. otherwise, based on the ASCII ordering. Specific names: Name LGE(STRING_A, STRING_B) Argument CHARACTER Return type LOGICAL Standard Fortran 77 and later
145
See also:
Section 8.144 [LGT], page 145, Section 8.146 [LLE], page 146, Section 8.147 [LLT], page 146
Return value: Returns .TRUE. if STRING_A > STRING_B, and .FALSE. otherwise, based on the ASCII ordering. Specific names: Name LGT(STRING_A, STRING_B) See also: Argument CHARACTER Return type LOGICAL Standard Fortran 77 and later
Section 8.143 [LGE], page 144, Section 8.146 [LLE], page 146, Section 8.147 [LLT], page 146
146
Syntax : CALL LINK(PATH1, PATH2 [, STATUS]) STATUS = LINK(PATH1, PATH2) Arguments: PATH1 PATH2 STATUS See also: Shall be of default CHARACTER type. Shall be of default CHARACTER type. (Optional) Shall be of default INTEGER type.
Section 8.233 [SYMLNK], page 194, Section 8.250 [UNLINK], page 203
Return value: Returns .TRUE. if STRING_A <= STRING_B, and .FALSE. otherwise, based on the ASCII ordering. Specific names: Name LLE(STRING_A, STRING_B) See also: Argument CHARACTER Return type LOGICAL Standard Fortran 77 and later
Section 8.143 [LGE], page 144, Section 8.144 [LGT], page 145, Section 8.147 [LLT], page 146
147
A and String B are not the same length, the shorter is compared as if spaces were appended to it to form a value that has the same length as the longer. In general, the lexical comparison intrinsics LGE, LGT, LLE, and LLT differ from the corresponding intrinsic operators .GE., .GT., .LE., and .LT., in that the latter use the processors character ordering (which is not ASCII on some targets), whereas the former always use the ASCII ordering. Standard : Class: Syntax : Arguments: STRING A STRING B Shall be of default CHARACTER type. Shall be of default CHARACTER type. Fortran 77 and later Elemental function RESULT = LLT(STRING_A, STRING_B)
Return value: Returns .TRUE. if STRING_A < STRING_B, and .FALSE. otherwise, based on the ASCII ordering. Specific names: Name LLT(STRING_A, STRING_B) See also: Argument CHARACTER Return type LOGICAL Standard Fortran 77 and later
Section 8.143 [LGE], page 144, Section 8.144 [LGT], page 145, Section 8.146 [LLE], page 146
148
149
ZLOG(X) CDLOG(X)
COMPLEX(8) X COMPLEX(8) X
COMPLEX(8) COMPLEX(8)
150
Return value: The return value is a LOGICAL value equal to L, with a kind corresponding to KIND, or of the default logical kind if KIND is not given. See also: Section 8.123 [INT], page 134, Section 8.200 [REAL], page 175, Section 8.46 [CMPLX], page 87
151
Return value: The return value is of type INTEGER and of the same kind as I. See also: Section 8.132 [ISHFT], page 139, Section 8.133 [ISHFTC], page 139, Section 8.205 [RSHIFT], page 178, Section 8.216 [SHIFTA], page 184, Section 8.217 [SHIFTL], page 185, Section 8.218 [SHIFTR], page 185
152
See Section 8.230 [STAT], page 192 for an example. To stat an open file: Section 8.91 [FSTAT], page 116, to stat a file: Section 8.230 [STAT], page 192
Return value: The elements of VALUES are assigned as follows: 1. Seconds after the minute, range 059 or 061 to allow for leap seconds 2. Minutes after the hour, range 059 3. Hours past midnight, range 023 4. Day of month, range 031 5. Number of months since January, range 012 6. Years since 1900 7. Number of days since Sunday, range 06 8. Days since January 1 9. Daylight savings indicator: positive if daylight savings is in effect, zero if not, and negative if the information is not available. See also: Section 8.57 [CTIME], page 94, Section 8.105 [GMTIME], page 124, Section 8.239 [TIME], page 198, Section 8.240 [TIME8], page 199
153
Return value: The return value is of type INTEGER(K), with K such that variables of type INTEGER(K) have the same size as C pointers (sizeof(void *)). Example: The following example demonstrates the use of MALLOC and FREE with Cray pointers.
program test_malloc implicit none integer i real*8 x(*), z pointer(ptr_x,x) ptr_x = malloc(20*8) do i = 1, 20 x(i) = sqrt(1.0d0 / i) end do z = 0 do i = 1, 20 z = z + x(i) print *, z end do call free(ptr_x) end program test_malloc
See also:
Return value: The return value is of type INTEGER. If KIND is present, it specifies the kind value of the return type; otherwise, it is of the default integer kind. See also: Section 8.160 [MASKR], page 154
154
Return value: The return value is of type INTEGER. If KIND is present, it specifies the kind value of the return type; otherwise, it is of the default integer kind. See also: Section 8.159 [MASKL], page 153
Return value: The matrix product of MATRIX A and MATRIX B. The type and kind of the result follow the usual type and kind promotion rules, as for the * or .AND. operators. See also:
155
Elemental function RESULT = MAX(A1, A2 [, A3 [, ...]]) A1 A2, A3, ... The type shall be INTEGER or REAL. An expression of the same type and kind as A1. (As a GNU extension, arguments of different kinds are permitted.)
Return value: The return value corresponds to the maximum value among the arguments, and has the same type and kind as the first argument. Specific names: Name MAX0(A1) AMAX0(A1) MAX1(A1) AMAX1(A1) DMAX1(A1) See also: Argument INTEGER(4) A1 INTEGER(4) A1 REAL A1 REAL(4) A1 REAL(8) A1 Return type INTEGER(4) REAL(MAX(X)) INT(MAX(X)) REAL(4) REAL(8) Standard Fortran 77 and later Fortran 77 and later Fortran 77 and later Fortran 77 and later Fortran 77 and later
Section 8.164 [MAXLOC], page 155 Section 8.165 [MAXVAL], page 156, Section 8.170 [MIN], page 159
156
element along each row of the array in the DIM direction. If MASK is present, only the elements for which MASK is .TRUE. are considered. If more than one element in the array has the maximum value, the location returned is that of the first such element in array element order. If the array has zero size, or all of the elements of MASK are .FALSE., then the result is an array of zeroes. Similarly, if DIM is supplied and all of the elements of MASK along a given row are zero, the result value for that row is zero. Standard : Class: Syntax : RESULT = MAXLOC(ARRAY, DIM [, MASK]) RESULT = MAXLOC(ARRAY [, MASK]) Arguments: ARRAY DIM Shall be an array of type INTEGER or REAL. (Optional) Shall be a scalar of type INTEGER, with a value between one and the rank of ARRAY, inclusive. It may not be an optional dummy argument. Shall be an array of type LOGICAL, and conformable with ARRAY. Fortran 95 and later Transformational function
MASK
Return value: If DIM is absent, the result is a rank-one array with a length equal to the rank of ARRAY. If DIM is present, the result is an array with a rank one less than the rank of ARRAY, and a size corresponding to the size of ARRAY with the DIM dimension removed. If DIM is present and ARRAY has a rank of one, the result is a scalar. In all cases, the result is of default INTEGER type. See also: Section 8.162 [MAX], page 154, Section 8.165 [MAXVAL], page 156
157
DIM
MASK
(Optional) Shall be a scalar of type INTEGER, with a value between one and the rank of ARRAY, inclusive. It may not be an optional dummy argument. Shall be an array of type LOGICAL, and conformable with ARRAY.
Return value: If DIM is absent, or if ARRAY has a rank of one, the result is a scalar. If DIM is present, the result is an array with a rank one less than the rank of ARRAY, and a size corresponding to the size of ARRAY with the DIM dimension removed. In all cases, the result is of the same type and kind as ARRAY. See also: Section 8.162 [MAX], page 154, Section 8.164 [MAXLOC], page 155
Return value: The return value is a scalar of type INTEGER(4), equal to the number of clock ticks since the start of the process, or -1 if the system does not support clock(3). See also: Section 8.57 [CTIME], page 94, Section 8.105 [GMTIME], page 124, Section 8.157 [LTIME], page 152, Section 8.166 [MCLOCK], page 157, Section 8.239 [TIME], page 198
158
Class: Syntax :
Return value: The return value is a scalar of type INTEGER(8), equal to the number of clock ticks since the start of the process, or -1 if the system does not support clock(3). See also: Section 8.57 [CTIME], page 94, Section 8.105 [GMTIME], page 124, Section 8.157 [LTIME], page 152, Section 8.166 [MCLOCK], page 157, Section 8.240 [TIME8], page 199
Return value: The result is of the same type and type parameters as TSOURCE.
159
Return value: The return value corresponds to the maximum value among the arguments, and has the same type and kind as the first argument. Specific names: Name MIN0(A1) AMIN0(A1) MIN1(A1) AMIN1(A1) DMIN1(A1) See also: Argument INTEGER(4) A1 INTEGER(4) A1 REAL A1 REAL(4) A1 REAL(8) A1 Return type INTEGER(4) REAL(4) INTEGER(4) REAL(4) REAL(8) Standard Fortran 77 and later Fortran 77 and later Fortran 77 and later Fortran 77 and later Fortran 77 and later
Section 8.162 [MAX], page 154, Section 8.172 [MINLOC], page 159, Section 8.173 [MINVAL], page 160
160
element along each row of the array in the DIM direction. If MASK is present, only the elements for which MASK is .TRUE. are considered. If more than one element in the array has the minimum value, the location returned is that of the first such element in array element order. If the array has zero size, or all of the elements of MASK are .FALSE., then the result is an array of zeroes. Similarly, if DIM is supplied and all of the elements of MASK along a given row are zero, the result value for that row is zero. Standard : Class: Syntax : RESULT = MINLOC(ARRAY, DIM [, MASK]) RESULT = MINLOC(ARRAY [, MASK]) Arguments: ARRAY DIM Shall be an array of type INTEGER or REAL. (Optional) Shall be a scalar of type INTEGER, with a value between one and the rank of ARRAY, inclusive. It may not be an optional dummy argument. Shall be an array of type LOGICAL, and conformable with ARRAY. Fortran 95 and later Transformational function
MASK
Return value: If DIM is absent, the result is a rank-one array with a length equal to the rank of ARRAY. If DIM is present, the result is an array with a rank one less than the rank of ARRAY, and a size corresponding to the size of ARRAY with the DIM dimension removed. If DIM is present and ARRAY has a rank of one, the result is a scalar. In all cases, the result is of default INTEGER type. See also: Section 8.170 [MIN], page 159, Section 8.173 [MINVAL], page 160
161
DIM
MASK
(Optional) Shall be a scalar of type INTEGER, with a value between one and the rank of ARRAY, inclusive. It may not be an optional dummy argument. Shall be an array of type LOGICAL, and conformable with ARRAY.
Return value: If DIM is absent, or if ARRAY has a rank of one, the result is a scalar. If DIM is present, the result is an array with a rank one less than the rank of ARRAY, and a size corresponding to the size of ARRAY with the DIM dimension removed. In all cases, the result is of the same type and kind as ARRAY. See also: Section 8.170 [MIN], page 159, Section 8.172 [MINLOC], page 159
Return value: The kind of the return value is the result of cross-promoting the kinds of the arguments. Example:
program print print print print print print print print test_mod *, mod(17,3) *, mod(17.5,5.5) *, mod(17.5d0,5.5) *, mod(17.5,5.5d0) *, *, *, *, mod(-17,3) mod(-17.5,5.5) mod(-17.5d0,5.5) mod(-17.5,5.5d0)
print *, mod(17,-3) print *, mod(17.5,-5.5) print *, mod(17.5d0,-5.5) print *, mod(17.5,-5.5d0) end program test_mod
162
AMOD(A,P) DMOD(A,P)
REAL(4) REAL(8)
Return value: The type and kind of the result are those of the arguments. If A and P are of type INTEGER: MODULO(A,P) has the value R such that A=Q*P+R, where Q is an integer and R is between 0 (inclusive) and P (exclusive). If A and P are of type REAL: MODULO(A,P) has the value of A - FLOOR (A / P) * P. In all cases, if P is zero the result is processor-dependent. Example:
program test_modulo print *, modulo(17,3) print *, modulo(17.5,5.5) print *, modulo(-17,3) print *, modulo(-17.5,5.5) print *, modulo(17,-3) print *, modulo(17.5,-5.5) end program
163
ALLOCATABLE, INTENT(INOUT), may be of any type and kind. ALLOCATABLE, INTENT(OUT), shall be of the same type, kind and rank as FROM.
Section 8.114 [IBCLR], page 129, Section 8.116 [IBSET], page 130, Section 8.115 [IBITS], page 130, Section 8.111 [IAND], page 127, Section 8.126 [IOR], page 135, Section 8.119 [IEOR], page 132
164
Arguments: X S Shall be of type REAL. (Optional) shall be of type REAL and not equal to zero.
Return value: The return value is of the same type as X. If S is positive, NEAREST returns the processor-representable number greater than X and nearest to it. If S is negative, NEAREST returns the processor-representable number smaller than X and nearest to it. Example:
program test_nearest real :: x, y x = nearest(42.0, 1.0) y = nearest(42.0, -1.0) write (*,"(3(G20.15))") x, y, x - y end program test_nearest
Return value: Returns a CHARACTER scalar of length one with the new-line character of the same kind as parameter C. Example:
program newline implicit none write(*,(A)) This is record 1.//NEW_LINE(A)//This is record 2. end program newline
165
KIND
(Optional) An INTEGER initialization expression indicating the kind parameter of the result.
Return value: Returns A with the fractional portion of its magnitude eliminated by rounding to the nearest whole number and with its sign preserved, converted to an INTEGER of the default kind. Example:
program test_nint real(4) x4 real(8) x8 x4 = 1.234E0_4 x8 = 4.321_8 print *, nint(x4), idnint(x8) end program test_nint
Section 8.42 [CEILING], page 84, Section 8.83 [FLOOR], page 110
Return value: The result is of the same type as ARRAY. If DIM is absent, a scalar with the square root of the sum of all elements in ARRAY squared is returned. Otherwise, an array of rank n 1, where n equals the rank of ARRAY, and a shape similar to that of ARRAY with dimension DIM dropped is returned. Example:
PROGRAM test_sum REAL :: x(5) = [ real :: 1, 2, 3, 4, 5 ] print *, NORM2(x) ! = sqrt(55.) ~ 7.416 END PROGRAM
166
See also:
167
Class: Syntax :
See also:
Section 8.238 [THIS IMAGE], page 197, Section 8.121 [IMAGE INDEX], page 133
Return value: The return type is either a scalar INTEGER or a scalar LOGICAL. If the kind type parameters differ, then the smaller kind type is implicitly converted to larger kind, and the return has the larger kind. Example:
PROGRAM test_or LOGICAL :: T = .TRUE., F = .FALSE. INTEGER :: a, b DATA a / ZF /, b / Z3 / WRITE (*,*) OR(T, T), OR(T, F), OR(F, T), OR(F, F) WRITE (*,*) OR(a, b) END PROGRAM
See also:
168
Return value: The result is an array of rank one and the same type as that of ARRAY. If VECTOR is present, the result size is that of VECTOR, the number of TRUE values in MASK otherwise. Example: Gathering nonzero elements from an array:
PROGRAM test_pack_1 INTEGER :: m(6) m = (/ 1, 0, 0, 0, 5, 0 /) WRITE(*, FMT="(6(I0, ))") pack(m, m /= 0) END PROGRAM
! "1 5"
Gathering nonzero elements from an array and appending elements from VECTOR:
PROGRAM test_pack_2 INTEGER :: m(4) m = (/ 1, 0, 0, 2 /) WRITE(*, FMT="(4(I0, ))") pack(m, m /= 0, (/ 0, 0, 3, 4 /)) END PROGRAM
! "1 2 3 4"
See also:
169
Syntax : RESULT = PARITY(MASK[, DIM]) Arguments: LOGICAL DIM Shall be an array of type LOGICAL (Optional) shall be a scalar of type INTEGER with a value in the range from 1 to n, where n equals the rank of MASK.
Return value: The result is of the same type as MASK. If DIM is absent, a scalar with the parity of all elements in MASK is returned, i.e. true if an odd number of elements is .true. and false otherwise. If DIM is present, an array of rank n 1, where n equals the rank of ARRAY, and a shape similar to that of MASK with dimension DIM dropped is returned. Example:
PROGRAM test_sum LOGICAL :: x(2) = [ .true., .false. ] print *, PARITY(x) ! prints "T" (true). END PROGRAM
170
Section 8.213 [SELECTED REAL KIND], page 182, Section 8.199 [RANGE], page 175
program prec_and_range real(kind=4) :: x(2) complex(kind=8) :: y print *, precision(x), range(x) print *, precision(y), range(y) end program prec_and_range
Section 8.191 [POPPAR], page 170, Section 8.140 [LEADZ], page 143, Section 8.242 [TRAILZ], page 199
171
Return value: The return value is of type INTEGER and of the default integer kind. See also: Example:
program test_population print *, popcnt(127), poppar(127) print *, popcnt(huge(0_4)), poppar(huge(0_4)) print *, popcnt(huge(0_8)), poppar(huge(0_8)) end program test_population
Section 8.190 [POPCNT], page 170, Section 8.140 [LEADZ], page 143, Section 8.242 [TRAILZ], page 199
Return value: Returns either TRUE if the optional argument A is present, or FALSE otherwise. Example:
PROGRAM test_present WRITE(*,*) f(), f(42) ! "F T" CONTAINS LOGICAL FUNCTION f(x) INTEGER, INTENT(IN), OPTIONAL :: x f = PRESENT(x) END FUNCTION END PROGRAM
172
Arguments: ARRAY DIM MASK Shall be an array of type INTEGER, REAL or COMPLEX. (Optional) shall be a scalar of type INTEGER with a value in the range from 1 to n, where n equals the rank of ARRAY. (Optional) shall be of type LOGICAL and either be a scalar or an array of the same shape as ARRAY.
Return value: The result is of the same type as ARRAY. If DIM is absent, a scalar with the product of all elements in ARRAY is returned. Otherwise, an array of rank n-1, where n equals the rank of ARRAY, and a shape similar to that of ARRAY with dimension DIM dropped is returned. Example:
PROGRAM test_product INTEGER :: x(5) = (/ 1, 2, 3, 4 ,5 /) print *, PRODUCT(x) ! all elements, product = 120 print *, PRODUCT(x, MASK=MOD(x, 2)==1) ! odd elements, product = 15 END PROGRAM
See also:
173
Function Section 8.196 [RAND], page 173, Section 8.197 [RANDOM NUMBER], page 173
See also:
Section 8.229 [SRAND], page 191, Section 8.197 [RANDOM NUMBER], page 173
174
3. Two 16-bit multiply-with-carry 597273182964842497 > 259 . The overall period exceeds 2123 .
generators
with
period
of
Please note, this RNG is thread safe if used within OpenMP directives, i.e., its state will be consistent while called from multiple threads. However, the KISS generator does not create random numbers in parallel from multiple sources, but in sequence from a single source. If an OpenMP-enabled application heavily relies on random numbers, one should consider employing a dedicated parallel random number generator instead. Standard : Class: Syntax : Arguments: HARVEST Example:
program test_random_number REAL :: r(5,5) CALL init_random_seed() CALL RANDOM_NUMBER(r) end program
Fortran 95 and later Subroutine RANDOM_NUMBER(HARVEST) Shall be a scalar or an array of type REAL.
See also:
PUT
175
GET
(Optional) Shall be an array of type default INTEGER and rank one. It is INTENT(OUT) and the size of the array must be larger than or equal to the number returned by the SIZE argument.
SUBROUTINE init_random_seed() INTEGER :: i, n, clock INTEGER, DIMENSION(:), ALLOCATABLE :: seed CALL RANDOM_SEED(size = n) ALLOCATE(seed(n)) CALL SYSTEM_CLOCK(COUNT=clock) seed = clock + 37 * (/ (i - 1, i = 1, n) /) CALL RANDOM_SEED(PUT = seed) DEALLOCATE(seed) END SUBROUTINE
Example:
See also:
176
Arguments: A KIND Shall be INTEGER, REAL, or COMPLEX. (Optional) An INTEGER initialization expression indicating the kind parameter of the result.
Return value: These functions return a REAL variable or array under the following rules: (A) (B) (C) Example:
program test_real complex :: x = (1.0, 2.0) print *, real(x), real(x,8), realpart(x) end program test_real
REAL(A) is converted to a default real type if A is an integer or real variable. REAL(A) is converted to a real type with the kind type parameter of A if A is a complex variable. REAL(A, KIND) is converted to a real type with kind type parameter KIND if A is a complex, integer, or real variable.
177
Return value: A new scalar of type CHARACTER built up from NCOPIES copies of STRING. Example:
program test_repeat write(*,*) repeat("x", 5) end program ! "xxxxx"
Return value: The result is an array of shape SHAPE with the same type as SOURCE. Example:
PROGRAM test_reshape INTEGER, DIMENSION(4) :: x WRITE(*,*) SHAPE(x) WRITE(*,*) SHAPE(RESHAPE(x, (/2, 2/))) END PROGRAM ! prints "4" ! prints "2 2"
See also:
178
Return value: The return value is of type INTEGER and of the same kind as I. See also: Section 8.132 [ISHFT], page 139, Section 8.133 [ISHFTC], page 139, Section 8.155 [LSHIFT], page 151, Section 8.216 [SHIFTA], page 184, Section 8.218 [SHIFTR], page 185, Section 8.217 [SHIFTL], page 185
179
Inquiry function RESULT = SAME_TYPE_AS(A, B) A B Shall be an object of extensible declared type or unlimited polymorphic. Shall be an object of extensible declared type or unlimited polymorphic.
Return value: The return value is a scalar of type default logical. It is true if and only if the dynamic type of A is the same as the dynamic type of B. See also: Section 8.79 [EXTENDS TYPE OF], page 108
Return value: The return value is of the same type and kind as X. Its value is X * RADIX(X)**I. Example:
program test_scale real :: x = 178.1387e-4 integer :: i = 5 print *, scale(x,i), x*radix(x)**i end program test_scale
180
Syntax : Arguments:
RESULT = SCAN(STRING, SET[, BACK [, KIND]]) STRING SET BACK KIND Shall be of type CHARACTER. Shall be of type CHARACTER. (Optional) shall be of type LOGICAL. (Optional) An INTEGER initialization expression indicating the kind parameter of the result.
Return value: The return value is of type INTEGER and of kind KIND. If KIND is absent, the return value is of default integer kind. Example:
PROGRAM test_scan WRITE(*,*) SCAN("FORTRAN", "AO") WRITE(*,*) SCAN("FORTRAN", "AO", .TRUE.) WRITE(*,*) SCAN("FORTRAN", "C++") END PROGRAM ! 2, found O ! 6, found A ! 0, found none
See also:
Section 8.122 [INDEX intrinsic], page 133, Section 8.252 [VERIFY], page 204
GNU extension Function RESULT = SECNDS (X) Shall be of type REAL(4). Shall be of type REAL(4).
181
Fortran 2003 and later Transformational function RESULT = SELECTED_CHAR_KIND(NAME) Shall be a scalar and of the default character type.
182
// char (int (z4F60), ucs4) // char (int (z597D), ucs4) write (*,*) alphabet open (output_unit, encoding=UTF-8) write (*,*) trim (hello_world) end program character_kind
&
Fortran 95 and later Transformational function RESULT = SELECTED_INT_KIND(R) Shall be a scalar and of type INTEGER.
183
RADIX (Optional) shall be a scalar and of type INTEGER. Before Fortran 2008, at least one of the arguments R or P shall be present; since Fortran 2008, they are assumed to be zero if absent. Return value: SELECTED_REAL_KIND returns the value of the kind type parameter of a real data type with decimal precision of at least P digits, a decimal exponent range of at least R, and with the requested RADIX. If the RADIX parameter is absent, real kinds with any radix can be returned. If more than one real data type meet the criteria, the kind of the data type with the smallest decimal precision is returned. If no real data type matches the criteria, the result is -1 if the processor does not support a real data type with a precision greater than or equal to P, but the R and RADIX requirements can be fulfilled -2 if the processor does not support a real type with an exponent range greater than or equal to R, but P and RADIX are fulfillable -3 if RADIX but not P and R requirements are fulfillable -4 if RADIX and either P or R requirements are fulfillable See also: Example:
program real_kinds integer,parameter :: p6 = selected_real_kind(6) integer,parameter :: p10r100 = selected_real_kind(10,100) integer,parameter :: r400 = selected_real_kind(r=400) real(kind=p6) :: x real(kind=p10r100) :: y real(kind=r400) :: z print *, precision(x), range(x) print *, precision(y), range(y) print *, precision(z), range(z) end program real_kinds
-5 if there is no real type with the given RADIX Section 8.189 [PRECISION], page 169, Section 8.199 [RANGE], page 175, Section 8.194 [RADIX], page 172
184
Return value: The return value is of the same type and kind as X. The real number whose fractional part is that that of X and whose exponent part if I is returned; it is FRACTION(X) * RADIX(X)**I. Example:
PROGRAM test_setexp REAL :: x = 178.1387e-4 INTEGER :: i = 17 PRINT *, SET_EXPONENT(x, i), FRACTION(x) * RADIX(x)**i END PROGRAM
KIND
Return value: An INTEGER array of rank one with as many elements as SOURCE has dimensions. The elements of the resulting array correspond to the extend of SOURCE along the respective dimensions. If SOURCE is a scalar, the result is the rank one array of size zero. If KIND is absent, the return value has the default integer kind otherwise the specified kind. Example:
PROGRAM test_shape INTEGER, DIMENSION(-1:1, -1:2) :: A WRITE(*,*) SHAPE(A) ! (/ 3, 4 /) WRITE(*,*) SIZE(SHAPE(42)) ! (/ /) END PROGRAM
See also:
Section 8.203 [RESHAPE], page 177, Section 8.223 [SIZE], page 188
185
the value is undefined. Bits shifted out from the right end are lost. The fill is arithmetic: the bits shifted in from the left end are equal to the leftmost bit, which in twos complement representation is the sign bit. Standard : Class: Syntax : Arguments: I SHIFT The type shall be INTEGER. The type shall be INTEGER. Fortran 2008 and later Elemental function RESULT = SHIFTA(I, SHIFT)
Return value: The return value is of type INTEGER and of the same kind as I. See also: Section 8.217 [SHIFTL], page 185, Section 8.218 [SHIFTR], page 185
Return value: The return value is of type INTEGER and of the same kind as I. See also: Section 8.216 [SHIFTA], page 184, Section 8.218 [SHIFTR], page 185
186
Arguments: I SHIFT The type shall be INTEGER. The type shall be INTEGER.
Return value: The return value is of type INTEGER and of the same kind as I. See also: Section 8.216 [SHIFTA], page 184, Section 8.217 [SHIFTL], page 185
Return value: The kind of the return value is that of A and B. If B 0 then the result is ABS(A), else it is -ABS(A). Example:
program print print print test_sign *, sign(-12,1) *, sign(-12,0) *, sign(-12,-1)
187
GNU extension Subroutine, function CALL SIGNAL(NUMBER, HANDLER [, STATUS]) STATUS = SIGNAL(NUMBER, HANDLER)
Arguments: NUMBER HANDLER STATUS Shall be a scalar integer, with INTENT(IN) Signal handler (INTEGER FUNCTION or SUBROUTINE) or dummy/global INTEGER scalar. INTEGER. It is INTENT(IN). (Optional) STATUS shall be a scalar integer. It has INTENT(OUT).
Return value: The SIGNAL function returns the value returned by signal(2). Example:
program test_signal intrinsic signal external handler_print call signal (12, handler_print) call signal (10, 1) call sleep (30) end program test_signal
188
Fortran 95 and later, for a complex argument Fortran 2008 or later Elemental function RESULT = SINH(X)
KIND
189
Return value: The return value is of type INTEGER and of kind KIND. If KIND is absent, the return value is of default integer kind. Example:
PROGRAM test_size WRITE(*,*) SIZE((/ 1, 2 /)) END PROGRAM ! 2
See also:
Section 8.215 [SHAPE], page 184, Section 8.203 [RESHAPE], page 177
The example will print .TRUE. unless you are using a platform where default REAL variables are unusually padded. See also: Section 8.41 [C SIZEOF], page 83, Section 8.231 [STORAGE SIZE], page 193
190
See also:
191
Return value: The result is an array of the same type as SOURCE and has rank n+1 where n equals the rank of SOURCE. Example:
PROGRAM test_spread INTEGER :: a = 1, b(2) = (/ 1, 2 /) WRITE(*,*) SPREAD(A, 1, 2) WRITE(*,*) SPREAD(B, 1, 2) END PROGRAM ! "1 1" ! "1 1 2 2"
See also:
Standard Fortran 95 and later Fortran 95 and later Fortran 95 and later GNU extension GNU extension
192
Return value: Does not return anything. Example: Notes: See RAND and IRAND for examples. The Fortran 2003 standard specifies the intrinsic RANDOM_SEED to initialize the pseudo-random numbers generator and RANDOM_NUMBER to generate pseudorandom numbers. Please note that in GNU Fortran, these two sets of intrinsics (RAND, IRAND and SRAND on the one hand, RANDOM_NUMBER and RANDOM_SEED on the other hand) access two independent pseudo-random number generators. Section 8.196 [RAND], page 173, Section 8.198 [RANDOM SEED], page 174, Section 8.197 [RANDOM NUMBER], page 173
See also:
Not all these elements are relevant on all systems. If an element is not relevant, it is returned as 0. This intrinsic is provided in both subroutine and function forms; however, only one form can be used in any given program unit. Standard : Class: GNU extension Subroutine, function
193
Syntax : CALL STAT(NAME, VALUES [, STATUS]) STATUS = STAT(NAME, VALUES) Arguments: NAME VALUES STATUS Example:
PROGRAM test_stat INTEGER, DIMENSION(13) :: buff INTEGER :: status CALL STAT("/etc/passwd", buff, status) IF (status == 0) THEN WRITE (*, FMT="(Device ID:, WRITE (*, FMT="(Inode number:, WRITE (*, FMT="(File mode (octal):, WRITE (*, FMT="(Number of links:, WRITE (*, FMT="(Owners uid:, WRITE (*, FMT="(Owners gid:, WRITE (*, FMT="(Device where located:, WRITE (*, FMT="(File size:, WRITE (*, FMT="(Last access time:, WRITE (*, FMT="(Last modification time, WRITE (*, FMT="(Last status change time:, WRITE (*, FMT="(Preferred block size:, WRITE (*, FMT="(No. of blocks allocated:, END IF END PROGRAM
The type shall be CHARACTER, of the default kind and a valid path within the file system. The type shall be INTEGER(4), DIMENSION(13). (Optional) status flag of type INTEGER(4). Returns 0 on success and a system specific error code otherwise.
T30, T30, T30, T30, T30, T30, T30, T30, T30, T30, T30, T30, T30,
I19)") I19)") O19)") I19)") I19)") I19)") I19)") I19)") A19)") A19)") A19)") I19)") I19)")
buff(1) buff(2) buff(3) buff(4) buff(5) buff(6) buff(7) buff(8) CTIME(buff(9)) CTIME(buff(10)) CTIME(buff(11)) buff(12) buff(13)
See also:
To stat an open file: Section 8.91 [FSTAT], page 116, to stat a link: Section 8.156 [LSTAT], page 151
Return Value: The result is a scalar integer with the kind type parameter specied by KIND (or default integer type if KIND is missing). The result value is the size expressed in
194
bits for an element of an array that has the dynamic type and type parameters of A. See also: Section 8.41 [C SIZEOF], page 83, Section 8.224 [SIZEOF], page 189
Return value: The result is of the same type as ARRAY. If DIM is absent, a scalar with the sum of all elements in ARRAY is returned. Otherwise, an array of rank n-1, where n equals the rank of ARRAY, and a shape similar to that of ARRAY with dimension DIM dropped is returned. Example:
PROGRAM test_sum INTEGER :: x(5) = (/ 1, 2, 3, 4 ,5 /) print *, SUM(x) print *, SUM(x, MASK=MOD(x, 2)==1) END PROGRAM ! all elements, sum = 15 ! odd elements, sum = 9
See also:
195
Class: Syntax :
Arguments: PATH1 PATH2 STATUS See also: Shall be of default CHARACTER type. Shall be of default CHARACTER type. (Optional) Shall be of default INTEGER type.
Section 8.145 [LINK], page 145, Section 8.250 [UNLINK], page 203
Section 8.75 [EXECUTE COMMAND LINE], page 105, which is part of the Fortran 2008 standard and should considered in new code for future portability.
196
kind=4 arguments, COUNT represents milliseconds. Other than the kind dependency, COUNT RATE and COUNT MAX are constant, however the particular values are specific to gfortran. If there is no clock, COUNT is set to -HUGE(COUNT), and COUNT RATE and COUNT MAX are set to zero. When running on a platform using the GNU C library (glibc), or a derivative thereof, the high resolution monotonic clock is available only when linking with the rt library. This can be done explicitly by adding the -lrt flag when linking the application, but is also done implicitly when using OpenMP. Standard : Class: Syntax : Arguments: COUNT (Optional) shall be a scalar of type INTEGER with INTENT(OUT). COUNT RATE(Optional) shall be a scalar of type INTEGER with INTENT(OUT). COUNT MAX (Optional) shall be a scalar of type INTEGER with INTENT(OUT).
PROGRAM test_system_clock INTEGER :: count, count_rate, count_max CALL SYSTEM_CLOCK(count, count_rate, count_max) WRITE(*,*) count, count_rate, count_max END PROGRAM
Example:
See also:
Section 8.58 [DATE AND TIME], page 94, Section 8.55 [CPU TIME], page 92
Fortran 77 and later, for a complex argument Fortran 2008 or later Elemental function RESULT = TAN(X)
197
Fortran 77 and later, for a complex argument Fortran 2008 or later Elemental function X = TANH(X)
8.238 THIS_IMAGE Function that returns the cosubscript index of this image
Description: Returns the cosubscript for this image. Standard : Class: Syntax : RESULT = THIS_IMAGE() RESULT = THIS_IMAGE(COARRAY [, DIM]) Arguments: COARRAY Coarray of any type (optional; if DIM present, required). Fortran 2008 and later Transformational function
198
DIM
default integer scalar (optional). If present, DIM shall be between one and the corank of COARRAY.
Return value: Default integer. If COARRAY is not present, it is scalar and its value is the index of the invoking image. Otherwise, if DIM is not present, a rank-1 array with corank elements is returned, containing the cosubscripts for COARRAY specifying the invoking image. If DIM is present, a scalar is returned, with the value of the DIM element of THIS_IMAGE(COARRAY). Example:
INTEGER :: value[*] INTEGER :: i value = THIS_IMAGE() SYNC ALL IF (THIS_IMAGE() == 1) THEN DO i = 1, NUM_IMAGES() WRITE(*,(2(a,i0))) value[, i, ] is , value[i] END DO END IF
See also:
Section 8.184 [NUM IMAGES], page 166, Section 8.121 [IMAGE INDEX], page 133
Return value: The return value is a scalar of type INTEGER(4). See also: Section 8.57 [CTIME], page 94, Section 8.105 [GMTIME], page 124, Section 8.157 [LTIME], page 152, Section 8.166 [MCLOCK], page 157, Section 8.240 [TIME8], page 199
199
Return value: The return value is a scalar of type INTEGER(8). See also: Section 8.57 [CTIME], page 94, Section 8.105 [GMTIME], page 124, Section 8.157 [LTIME], page 152, Section 8.167 [MCLOCK8], page 157, Section 8.239 [TIME], page 198
200
Syntax : Arguments:
Return value: The type of the return value is the default INTEGER. If all the bits of I are zero, the result value is BIT_SIZE(I). Example:
PROGRAM test_trailz WRITE (*,*) TRAILZ(8) END PROGRAM ! prints 3
See also:
Section 8.32 [BIT SIZE], page 78, Section 8.140 [LEADZ], page 143, Section 8.191 [POPPAR], page 170, Section 8.190 [POPCNT], page 170
Return value: The result has the same type as MOLD, with the bit level representation of SOURCE. If SIZE is present, the result is a one-dimensional array of length SIZE. If SIZE is absent but MOLD is an array (of any size or shape), the result is a one- dimensional array of the minimum length needed to contain the entirety of the bitwise representation of SOURCE. If SIZE is absent and MOLD is a scalar, the result is a scalar. If the bitwise representation of the result is longer than that of SOURCE, then the leading bits of the result correspond to those of SOURCE and any trailing bits are filled arbitrarily. When the resulting bit representation does not correspond to a valid representation of a variable of the same type as MOLD, the results are undefined, and subsequent operations on the result cannot be guaranteed to produce sensible behavior. For example, it is possible to create LOGICAL variables for which VAR and .NOT.VAR both appear to be true. Example:
201
See also:
202
See also:
Return value: The return value is of type INTEGER and of kind KIND. If KIND is absent, the return value is of default integer kind. If DIM is absent, the result is an array of the upper bounds of ARRAY. If DIM is present, the result is a scalar corresponding to the upper bound of the array along that dimension. If ARRAY is an expression rather than a whole array or array structure component, or if it has a zero extent along the relevant dimension, the upper bound is taken to be the number of elements along the relevant dimension. See also: Section 8.138 [LBOUND], page 142, Section 8.139 [LCOBOUND], page 142
203
Return value: The return value is of type INTEGER and of kind KIND. If KIND is absent, the return value is of default integer kind. If DIM is absent, the result is an array of the lower cobounds of COARRAY. If DIM is present, the result is a scalar corresponding to the lower cobound of the array along that codimension. See also: Section 8.139 [LCOBOUND], page 142, Section 8.138 [LBOUND], page 142
204
Arguments: PATH STATUS See also: Shall be of default CHARACTER type. (Optional) Shall be of default INTEGER type.
Section 8.145 [LINK], page 145, Section 8.233 [SYMLNK], page 194
Return value: The resulting array corresponds to FIELD with TRUE elements of MASK replaced by values from VECTOR in array element order. Example:
PROGRAM test_unpack integer :: vector(2) = (/1,1/) logical :: mask(4) = (/ .TRUE., .FALSE., .FALSE., .TRUE. /) integer :: field(2,2) = 0, unity(2,2) ! result: unity matrix unity = unpack(vector, reshape(mask, (/2,2/)), field) END PROGRAM
See also:
Section 8.186 [PACK], page 168, Section 8.227 [SPREAD], page 190
205
the rightmost position is returned. If all characters of STRING are found in SET, the result is zero. Standard : Class: Syntax : Arguments: STRING SET BACK KIND Shall be of type CHARACTER. Shall be of type CHARACTER. (Optional) shall be of type LOGICAL. (Optional) An INTEGER initialization expression indicating the kind parameter of the result. Fortran 95 and later, with KIND argument Fortran 2003 and later Elemental function RESULT = VERIFY(STRING, SET[, BACK [, KIND]])
Return value: The return value is of type INTEGER and of kind KIND. If KIND is absent, the return value is of default integer kind. Example:
PROGRAM test_verify WRITE(*,*) VERIFY("FORTRAN", WRITE(*,*) VERIFY("FORTRAN", WRITE(*,*) VERIFY("FORTRAN", WRITE(*,*) VERIFY("FORTRAN", WRITE(*,*) VERIFY("FORTRAN", END PROGRAM "AO") "FOO") "C++") "C++", .TRUE.) "FORTRAN") ! ! ! ! ! 1, 3, 1, 7, 0 found found found found found F R F N none
See also:
Section 8.208 [SCAN], page 179, Section 8.122 [INDEX intrinsic], page 133
Return value: The return type is either a scalar INTEGER or a scalar LOGICAL. If the kind type parameters differ, then the smaller kind type is implicitly converted to larger kind, and the return has the larger kind.
206
Example:
PROGRAM test_xor LOGICAL :: T = .TRUE., F = .FALSE. INTEGER :: a, b DATA a / ZF /, b / Z3 / WRITE (*,*) XOR(T, T), XOR(T, F), XOR(F, T), XOR(F, F) WRITE (*,*) XOR(a, b) END PROGRAM
See also:
207
9 Intrinsic Modules
9.1 ISO_FORTRAN_ENV
Standard : Fortran 2003 and later, except when otherwise noted The ISO_FORTRAN_ENV module provides the following scalar default-integer named constants: ATOMIC_INT_KIND: Default-kind integer constant to be used as kind parameter when defining integer variables used in atomic operations. (Fortran 2008 or later.) ATOMIC_LOGICAL_KIND: Default-kind integer constant to be used as kind parameter when defining logical variables used in atomic operations. (Fortran 2008 or later.) CHARACTER_KINDS: Default-kind integer constant array of rank one containing the supported kind parameters of the CHARACTER type. (Fortran 2008 or later.) CHARACTER_STORAGE_SIZE: Size in bits of the character storage unit. ERROR_UNIT: Identifies the preconnected unit used for error reporting. FILE_STORAGE_SIZE: Size in bits of the file-storage unit. INPUT_UNIT: Identifies the preconnected unit identified by the asterisk (*) in READ statement. INT8, INT16, INT32, INT64: Kind type parameters to specify an INTEGER type with a storage size of 16, 32, and 64 bits. It is negative if a target platform does not support the particular kind. (Fortran 2008 or later.) INTEGER_KINDS: Default-kind integer constant array of rank one containing the supported kind parameters of the INTEGER type. (Fortran 2008 or later.) IOSTAT_END: The value assigned to the variable passed to the IOSTAT= specifier of an input/output statement if an end-of-file condition occurred. IOSTAT_EOR: The value assigned to the variable passed to the IOSTAT= specifier of an input/output statement if an end-of-record condition occurred. IOSTAT_INQUIRE_INTERNAL_UNIT: Scalar default-integer constant, used by INQUIRE for the IOSTAT= specifier to denote an that a unit number identifies an internal unit. (Fortran 2008 or later.)
208
NUMERIC_STORAGE_SIZE: The size in bits of the numeric storage unit. LOGICAL_KINDS: Default-kind integer constant array of rank one containing the supported kind parameters of the LOGICAL type. (Fortran 2008 or later.) OUTPUT_UNIT: Identifies the preconnected unit identified by the asterisk (*) in WRITE statement. REAL32, REAL64, REAL128: Kind type parameters to specify a REAL type with a storage size of 32, 64, and 128 bits. It is negative if a target platform does not support the particular kind. (Fortran 2008 or later.) REAL_KINDS: Default-kind integer constant array of rank one containing the supported kind parameters of the REAL type. (Fortran 2008 or later.) STAT_LOCKED: Scalar default-integer constant used as STAT= return value by LOCK to denote that the lock variable is locked by the executing image. (Fortran 2008 or later.) STAT_LOCKED_OTHER_IMAGE: Scalar default-integer constant used as STAT= return value by UNLOCK to denote that the lock variable is locked by another image. (Fortran 2008 or later.) STAT_STOPPED_IMAGE: Positive, scalar default-integer constant used as STAT= return value if the argument in the statement requires synchronisation with an image, which has initiated the termination of the execution. (Fortran 2008 or later.) STAT_UNLOCKED: Scalar default-integer constant used as STAT= return value by UNLOCK to denote that the lock variable is unlocked. (Fortran 2008 or later.) The module also provides the following intrinsic procedures: Section 8.48 [COMPILER OPTIONS], page 88 and Section 8.49 [COMPILER VERSION], page 88.
9.2 ISO_C_BINDING
Standard : Fortran 2003 and later, GNU extensions The following intrinsic procedures are provided by the module; their definition can be found in the section Intrinsic Procedures of this manual. C_ASSOCIATED C_F_POINTER C_F_PROCPOINTER C_FUNLOC C_LOC C_SIZEOF
209
The ISO_C_BINDING module provides the following named constants of type default integer, which can be used as KIND type parameters. In addition to the integer named constants required by the Fortran 2003 standard, GNU Fortran provides as an extension named constants for the 128-bit integer types supported by the C compiler: C_INT128_T, C_INT_LEAST128_T, C_INT_FAST128_T. Fortran Type INTEGER INTEGER INTEGER INTEGER INTEGER INTEGER INTEGER INTEGER INTEGER INTEGER INTEGER INTEGER INTEGER INTEGER INTEGER INTEGER INTEGER INTEGER INTEGER INTEGER INTEGER INTEGER INTEGER REAL REAL REAL COMPLEX COMPLEX COMPLEX LOGICAL CHARACTER Name C_NULL_CHAR C_ALERT C_BACKSPACE C_FORM_FEED C_NEW_LINE C_CARRIAGE_ RETURN Named constant C_INT C_SHORT C_LONG C_LONG_LONG C_SIGNED_CHAR C_SIZE_T C_INT8_T C_INT16_T C_INT32_T C_INT64_T C_INT128_T C_INT_LEAST8_T C_INT_LEAST16_T C_INT_LEAST32_T C_INT_LEAST64_T C_INT_LEAST128_T C_INT_FAST8_T C_INT_FAST16_T C_INT_FAST32_T C_INT_FAST64_T C_INT_FAST128_T C_INTMAX_T C_INTPTR_T C_FLOAT C_DOUBLE C_LONG_DOUBLE C_FLOAT_COMPLEX C_DOUBLE_COMPLEX C_LONG_DOUBLE_COMPLEX C_BOOL C_CHAR C definition null character alert backspace form feed new line carriage return C type int short int long int long long int signed char/unsigned char size_t int8_t int16_t int32_t int64_t int128_t int_least8_t int_least16_t int_least32_t int_least64_t int_least128_t int_fast8_t int_fast16_t int_fast32_t int_fast64_t int_fast128_t intmax_t intptr_t float double long double float _Complex double _Complex long double _Complex _Bool char Value \0 \a \b \f \n \r Extension
Ext.
Ext.
Ext.
210
C_HORIZONTAL_ horizontal tab \t TAB C_VERTICAL_TAB vertical tab \v Moreover, the following two named constants are defined: Name Type C_NULL_PTR C_PTR C_NULL_FUNPTR C_FUNPTR Both are equivalent to the value NULL in C.
Contributing
211
Contributing
Free software is only possible if people contribute to efforts to create it. Were always in need of more people helping out with ideas and comments, writing documentation and contributing code. If you want to contribute to GNU Fortran, have a look at the long lists of projects you can take on. Some of these projects are small, some of them are large; some are completely orthogonal to the rest of what is happening on GNU Fortran, but others are mainstream projects in need of enthusiastic hackers. All of these projects are important! Well eventually get around to the things here, but they are also things doable by someone who is willing and able.
212
Christopher D. Rickett Richard Sandiford Tobias Schlter u Roger Sayle Paul Thomas Andy Vaught Feng Wang Janus Weil Daniel Kraft
The following people have contributed bug reports, smaller or larger patches, and much needed feedback and encouragement for the GNU Fortran project: Bill Clodius Dominique dHumi`res e Kate Hedstrom Erik Schnetter Joost VandeVondele Many other individuals have helped debug, test and improve the GNU Fortran compiler over the past few years, and we welcome you to do the same! If you already have done so, and you would like to see your name listed in the list above, please contact us.
Projects
Help build the test suite Solicit more code for donation to the test suite: the more extensive the testsuite, the smaller the risk of breaking things in the future! We can keep code private on request. Bug hunting/squishing Find bugs and write more test cases! Test cases are especially very welcome, because it allows us to concentrate on fixing bugs instead of isolating them. Going through the bugzilla database at http://gcc.gnu.org/bugzilla/ to reduce testcases posted there and add more information (for example, for which version does the testcase work, for which versions does it fail?) is also very helpful.
Proposed Extensions
Heres a list of proposed extensions for the GNU Fortran compiler, in no particular order. Most of these are necessary to be fully compatible with existing Fortran compilers, but they are not part of the official J3 Fortran 95 standard.
Compiler extensions:
User-specified alignment rules for structures. Automatically extend single precision constants to double.
Contributing
213
Compile code that conserves memory by dynamically allocating common and module storage either on stack or heap. Compile flag to generate code for array conformance checking (suggest -CC). User control of symbol names (underscores, etc). Compile setting for maximum size of stack frame size before spilling parts to static or heap. Flag to force local variables into static space. Flag to force local variables onto stack.
Environment Options
Pluggable library modules for random numbers, linear algebra. LA should use BLAS calling conventions. Environment variables controlling actions on arithmetic exceptions like overflow, underflow, precision lossGenerate NaN, abort, default. action. Set precision for fp units that support it (i387). Variable for setting fp rounding mode. Variable to fill uninitialized variables with a user-defined bit pattern. Environment variable controlling filename that is opened for that unit number. Environment variable to clear/trash memory being freed. Environment variable to control tracing of allocations and frees. Environment variable to display allocated memory at normal program end. Environment variable for filename for * IO-unit. Environment variable for temporary file directory. Environment variable forcing standard output to be line buffered (unix).
215
Preamble
The GNU General Public License is a free, copyleft license for software and other kinds of works. The licenses for most software and other practical works are designed to take away your freedom to share and change the works. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change all versions of a programto make sure it remains free software for all its users. We, the Free Software Foundation, use the GNU General Public License for most of our software; it applies also to any other work released this way by its authors. You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for them if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs, and that you know you can do these things. To protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights. Therefore, you have certain responsibilities if you distribute copies of the software, or if you modify it: responsibilities to respect the freedom of others. For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the same freedoms that you received. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. Developers that use the GNU GPL protect your rights with two steps: (1) assert copyright on the software, and (2) offer you this License giving you legal permission to copy, distribute and/or modify it. For the developers and authors protection, the GPL clearly explains that there is no warranty for this free software. For both users and authors sake, the GPL requires that modified versions be marked as changed, so that their problems will not be attributed erroneously to authors of previous versions. Some devices are designed to deny users access to install or run modified versions of the software inside them, although the manufacturer can do so. This is fundamentally incompatible with the aim of protecting users freedom to change the software. The systematic pattern of such abuse occurs in the area of products for individuals to use, which is precisely where it is most unacceptable. Therefore, we have designed this version of the GPL to prohibit the practice for those products. If such problems arise substantially in other domains, we stand ready to extend this provision to those domains in future versions of the GPL, as needed to protect the freedom of users.
216
Finally, every program is threatened constantly by software patents. States should not allow patents to restrict development and use of software on general-purpose computers, but in those that do, we wish to avoid the special danger that patents applied to a free program could make it effectively proprietary. To prevent this, the GPL assures that patents cannot be used to render the program non-free. The precise terms and conditions for copying, distribution and modification follow.
217
The System Libraries of an executable work include anything, other than the work as a whole, that (a) is included in the normal form of packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable use of the work with that Major Component, or to implement a Standard Interface for which an implementation is available to the public in source code form. A Major Component, in this context, means a major essential component (kernel, window system, and so on) of the specific operating system (if any) on which the executable work runs, or a compiler used to produce the work, or an object code interpreter used to run it. The Corresponding Source for a work in object code form means all the source code needed to generate, install, and (for an executable work) run the object code and to modify the work, including scripts to control those activities. However, it does not include the works System Libraries, or general-purpose tools or generally available free programs which are used unmodified in performing those activities but which are not part of the work. For example, Corresponding Source includes interface definition files associated with source files for the work, and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require, such as by intimate data communication or control flow between those subprograms and other parts of the work. The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source. The Corresponding Source for a work in source code form is that same work. 2. Basic Permissions. All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, given its content, constitutes a covered work. This License acknowledges your rights of fair use or other equivalent, as provided by copyright law. You may make, run and propagate covered works that you do not convey, without conditions so long as your license otherwise remains in force. You may convey covered works to others for the sole purpose of having them make modifications exclusively for you, or provide you with facilities for running those works, provided that you comply with the terms of this License in conveying all material for which you do not control copyright. Those thus making or running the covered works for you must do so exclusively on your behalf, under your direction and control, on terms that prohibit them from making any copies of your copyrighted material outside their relationship with you. Conveying under any other circumstances is permitted solely under the conditions stated below. Sublicensing is not allowed; section 10 makes it unnecessary. 3. Protecting Users Legal Rights From Anti-Circumvention Law. No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations under article 11 of the WIPO copyright treaty adopted on 20 December 1996, or similar laws prohibiting or restricting circumvention of such measures.
218
When you convey a covered work, you waive any legal power to forbid circumvention of technological measures to the extent such circumvention is effected by exercising rights under this License with respect to the covered work, and you disclaim any intention to limit operation or modification of the work as a means of enforcing, against the works users, your or third parties legal rights to forbid circumvention of technological measures. 4. Conveying Verbatim Copies. You may convey verbatim copies of the Programs source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this License and any non-permissive terms added in accord with section 7 apply to the code; keep intact all notices of the absence of any warranty; and give all recipients a copy of this License along with the Program. You may charge any price or no price for each copy that you convey, and you may offer support or warranty protection for a fee. 5. Conveying Modified Source Versions. You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source code under the terms of section 4, provided that you also meet all of these conditions: a. The work must carry prominent notices stating that you modified it, and giving a relevant date. b. The work must carry prominent notices stating that it is released under this License and any conditions added under section 7. This requirement modifies the requirement in section 4 to keep intact all notices. c. You must license the entire work, as a whole, under this License to anyone who comes into possession of a copy. This License will therefore apply, along with any applicable section 7 additional terms, to the whole of the work, and all its parts, regardless of how they are packaged. This License gives no permission to license the work in any other way, but it does not invalidate such permission if you have separately received it. d. If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the Program has interactive interfaces that do not display Appropriate Legal Notices, your work need not make them do so. A compilation of a covered work with other separate and independent works, which are not by their nature extensions of the covered work, and which are not combined with it such as to form a larger program, in or on a volume of a storage or distribution medium, is called an aggregate if the compilation and its resulting copyright are not used to limit the access or legal rights of the compilations users beyond what the individual works permit. Inclusion of a covered work in an aggregate does not cause this License to apply to the other parts of the aggregate. 6. Conveying Non-Source Forms. You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways:
219
a. Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange. b. Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by a written offer, valid for at least three years and valid for as long as you offer spare parts or customer support for that product model, to give anyone who possesses the object code either (1) a copy of the Corresponding Source for all the software in the product that is covered by this License, on a durable physical medium customarily used for software interchange, for a price no more than your reasonable cost of physically performing this conveying of source, or (2) access to copy the Corresponding Source from a network server at no charge. c. Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source. This alternative is allowed only occasionally and noncommercially, and only if you received the object code with such an offer, in accord with subsection 6b. d. Convey the object code by offering access from a designated place (gratis or for a charge), and offer equivalent access to the Corresponding Source in the same way through the same place at no further charge. You need not require recipients to copy the Corresponding Source along with the object code. If the place to copy the object code is a network server, the Corresponding Source may be on a different server (operated by you or a third party) that supports equivalent copying facilities, provided you maintain clear directions next to the object code saying where to find the Corresponding Source. Regardless of what server hosts the Corresponding Source, you remain obligated to ensure that it is available for as long as needed to satisfy these requirements. e. Convey the object code using peer-to-peer transmission, provided you inform other peers where the object code and Corresponding Source of the work are being offered to the general public at no charge under subsection 6d. A separable portion of the object code, whose source code is excluded from the Corresponding Source as a System Library, need not be included in conveying the object code work. A User Product is either (1) a consumer product, which means any tangible personal property which is normally used for personal, family, or household purposes, or (2) anything designed or sold for incorporation into a dwelling. In determining whether a product is a consumer product, doubtful cases shall be resolved in favor of coverage. For a particular product received by a particular user, normally used refers to a typical or common use of that class of product, regardless of the status of the particular user or of the way in which the particular user actually uses, or expects or is expected to use, the product. A product is a consumer product regardless of whether the product has substantial commercial, industrial or non-consumer uses, unless such uses represent the only significant mode of use of the product. Installation Information for a User Product means any methods, procedures, authorization keys, or other information required to install and execute modified versions of a covered work in that User Product from a modified version of its Corresponding Source.
220
The information must suffice to ensure that the continued functioning of the modified object code is in no case prevented or interfered with solely because modification has been made. If you convey an object code work under this section in, or with, or specifically for use in, a User Product, and the conveying occurs as part of a transaction in which the right of possession and use of the User Product is transferred to the recipient in perpetuity or for a fixed term (regardless of how the transaction is characterized), the Corresponding Source conveyed under this section must be accompanied by the Installation Information. But this requirement does not apply if neither you nor any third party retains the ability to install modified object code on the User Product (for example, the work has been installed in ROM). The requirement to provide Installation Information does not include a requirement to continue to provide support service, warranty, or updates for a work that has been modified or installed by the recipient, or for the User Product in which it has been modified or installed. Access to a network may be denied when the modification itself materially and adversely affects the operation of the network or violates the rules and protocols for communication across the network. Corresponding Source conveyed, and Installation Information provided, in accord with this section must be in a format that is publicly documented (and with an implementation available to the public in source code form), and must require no special password or key for unpacking, reading or copying. 7. Additional Terms. Additional permissions are terms that supplement the terms of this License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law. If additional permissions apply only to part of the Program, that part may be used separately under those permissions, but the entire Program remains governed by this License without regard to the additional permissions. When you convey a copy of a covered work, you may at your option remove any additional permissions from that copy, or from any part of it. (Additional permissions may be written to require their own removal in certain cases when you modify the work.) You may place additional permissions on material, added by you to a covered work, for which you have or can give appropriate copyright permission. Notwithstanding any other provision of this License, for material you add to a covered work, you may (if authorized by the copyright holders of that material) supplement the terms of this License with terms: a. Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License; or b. Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate Legal Notices displayed by works containing it; or c. Prohibiting misrepresentation of the origin of that material, or requiring that modified versions of such material be marked in reasonable ways as different from the original version; or
221
d. Limiting the use for publicity purposes of names of licensors or authors of the material; or e. Declining to grant rights under trademark law for use of some trade names, trademarks, or service marks; or f. Requiring indemnification of licensors and authors of that material by anyone who conveys the material (or modified versions of it) with contractual assumptions of liability to the recipient, for any liability that these contractual assumptions directly impose on those licensors and authors. All other non-permissive additional terms are considered further restrictions within the meaning of section 10. If the Program as you received it, or any part of it, contains a notice stating that it is governed by this License along with a term that is a further restriction, you may remove that term. If a license document contains a further restriction but permits relicensing or conveying under this License, you may add to a covered work material governed by the terms of that license document, provided that the further restriction does not survive such relicensing or conveying. If you add terms to a covered work in accord with this section, you must place, in the relevant source files, a statement of the additional terms that apply to those files, or a notice indicating where to find the applicable terms. Additional terms, permissive or non-permissive, may be stated in the form of a separately written license, or stated as exceptions; the above requirements apply either way. 8. Termination. You may not propagate or modify a covered work except as expressly provided under this License. Any attempt otherwise to propagate or modify it is void, and will automatically terminate your rights under this License (including any patent licenses granted under the third paragraph of section 11). However, if you cease all violation of this License, then your license from a particular copyright holder is reinstated (a) provisionally, unless and until the copyright holder explicitly and finally terminates your license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation. Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you of the violation by some reasonable means, this is the first time you have received notice of violation of this License (for any work) from that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice. Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from you under this License. If your rights have been terminated and not permanently reinstated, you do not qualify to receive new licenses for the same material under section 10. 9. Acceptance Not Required for Having Copies. You are not required to accept this License in order to receive or run a copy of the Program. Ancillary propagation of a covered work occurring solely as a consequence of using peer-to-peer transmission to receive a copy likewise does not require acceptance.
222
However, nothing other than this License grants you permission to propagate or modify any covered work. These actions infringe copyright if you do not accept this License. Therefore, by modifying or propagating a covered work, you indicate your acceptance of this License to do so. 10. Automatic Licensing of Downstream Recipients. Each time you convey a covered work, the recipient automatically receives a license from the original licensors, to run, modify and propagate that work, subject to this License. You are not responsible for enforcing compliance by third parties with this License. An entity transaction is a transaction transferring control of an organization, or substantially all assets of one, or subdividing an organization, or merging organizations. If propagation of a covered work results from an entity transaction, each party to that transaction who receives a copy of the work also receives whatever licenses to the work the partys predecessor in interest had or could give under the previous paragraph, plus a right to possession of the Corresponding Source of the work from the predecessor in interest, if the predecessor has it or can get it with reasonable efforts. You may not impose any further restrictions on the exercise of the rights granted or affirmed under this License. For example, you may not impose a license fee, royalty, or other charge for exercise of rights granted under this License, and you may not initiate litigation (including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it. 11. Patents. A contributor is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based. The work thus licensed is called the contributors contributor version. A contributors essential patent claims are all patent claims owned or controlled by the contributor, whether already acquired or hereafter acquired, that would be infringed by some manner, permitted by this License, of making, using, or selling its contributor version, but do not include claims that would be infringed only as a consequence of further modification of the contributor version. For purposes of this definition, control includes the right to grant patent sublicenses in a manner consistent with the requirements of this License. Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributors essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor version. In the following three paragraphs, a patent license is any express agreement or commitment, however denominated, not to enforce a patent (such as an express permission to practice a patent or covenant not to sue for patent infringement). To grant such a patent license to a party means to make such an agreement or commitment not to enforce a patent against the party. If you convey a covered work, knowingly relying on a patent license, and the Corresponding Source of the work is not available for anyone to copy, free of charge and under the terms of this License, through a publicly available network server or other readily accessible means, then you must either (1) cause the Corresponding Source to be so
223
available, or (2) arrange to deprive yourself of the benefit of the patent license for this particular work, or (3) arrange, in a manner consistent with the requirements of this License, to extend the patent license to downstream recipients. Knowingly relying means you have actual knowledge that, but for the patent license, your conveying the covered work in a country, or your recipients use of the covered work in a country, would infringe one or more identifiable patents in that country that you have reason to believe are valid. If, pursuant to or in connection with a single transaction or arrangement, you convey, or propagate by procuring conveyance of, a covered work, and grant a patent license to some of the parties receiving the covered work authorizing them to use, propagate, modify or convey a specific copy of the covered work, then the patent license you grant is automatically extended to all recipients of the covered work and works based on it. A patent license is discriminatory if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted under this License. You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software, under which you make payment to the third party based on the extent of your activity of conveying the work, and under which the third party grants, to any of the parties who would receive the covered work from you, a discriminatory patent license (a) in connection with copies of the covered work conveyed by you (or copies made from those copies), or (b) primarily for and in connection with specific products or compilations that contain the covered work, unless you entered into that arrangement, or that patent license was granted, prior to 28 March 2007. Nothing in this License shall be construed as excluding or limiting any implied license or other defenses to infringement that may otherwise be available to you under applicable patent law. 12. No Surrender of Others Freedom. If conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot convey a covered work so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not convey it at all. For example, if you agree to terms that obligate you to collect a royalty for further conveying from those to whom you convey the Program, the only way you could satisfy both those terms and this License would be to refrain entirely from conveying the Program. 13. Use with the GNU Affero General Public License. Notwithstanding any other provision of this License, you have permission to link or combine any covered work with a work licensed under version 3 of the GNU Affero General Public License into a single combined work, and to convey the resulting work. The terms of this License will continue to apply to the part which is the covered work, but the special requirements of the GNU Affero General Public License, section 13, concerning interaction through a network will apply to the combination as such. 14. Revised Versions of this License.
224
The Free Software Foundation may publish revised and/or new versions of the GNU General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies that a certain numbered version of the GNU General Public License or any later version applies to it, you have the option of following the terms and conditions either of that numbered version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of the GNU General Public License, you may choose any version ever published by the Free Software Foundation. If the Program specifies that a proxy can decide which future versions of the GNU General Public License can be used, that proxys public statement of acceptance of a version permanently authorizes you to choose that version for the Program. Later license versions may give you additional or different permissions. However, no additional obligations are imposed on any author or copyright holder as a result of your choosing to follow a later version. 15. Disclaimer of Warranty. THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 16. Limitation of Liability. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 17. Interpretation of Sections 15 and 16. If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms, reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program, unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee.
225
END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively state the exclusion of warranty; and each file should have at least the copyright line and a pointer to where the full notice is found.
one line to give the programs name and a brief idea of what it does. Copyright (C) year name of author This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see http://www.gnu.org/licenses/.
Also add information on how to contact you by electronic and paper mail. If the program does terminal interaction, make it output a short notice like this when it starts in an interactive mode:
program Copyright (C) year name of author This program comes with ABSOLUTELY NO WARRANTY; for details type show w. This is free software, and you are welcome to redistribute it under certain conditions; type show c for details.
The hypothetical commands show w and show c should show the appropriate parts of the General Public License. Of course, your programs commands might be different; for a GUI interface, you would use an about box. You should also get your employer (if you work as a programmer) or school, if any, to sign a copyright disclaimer for the program, if necessary. For more information on this, and how to apply and follow the GNU GPL, see http://www.gnu.org/licenses/. The GNU General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Lesser General Public License instead of this License. But first, please read http://www.gnu.org/philosophy/why-not-lgpl.html.
227
228
under this License. If a section does not fit the above definition of Secondary then it is not allowed to be designated as Invariant. The Document may contain zero Invariant Sections. If the Document does not identify any Invariant Sections then there are none. The Cover Texts are certain short passages of text that are listed, as Front-Cover Texts or Back-Cover Texts, in the notice that says that the Document is released under this License. A Front-Cover Text may be at most 5 words, and a Back-Cover Text may be at most 25 words. A Transparent copy of the Document means a machine-readable copy, represented in a format whose specification is available to the general public, that is suitable for revising the document straightforwardly with generic text editors or (for images composed of pixels) generic paint programs or (for drawings) some widely available drawing editor, and that is suitable for input to text formatters or for automatic translation to a variety of formats suitable for input to text formatters. A copy made in an otherwise Transparent file format whose markup, or absence of markup, has been arranged to thwart or discourage subsequent modification by readers is not Transparent. An image format is not Transparent if used for any substantial amount of text. A copy that is not Transparent is called Opaque. Examples of suitable formats for Transparent copies include plain ascii without markup, Texinfo input format, LaTEX input format, SGML or XML using a publicly available DTD, and standard-conforming simple HTML, PostScript or PDF designed for human modification. Examples of transparent image formats include PNG, XCF and JPG. Opaque formats include proprietary formats that can be read and edited only by proprietary word processors, SGML or XML for which the DTD and/or processing tools are not generally available, and the machine-generated HTML, PostScript or PDF produced by some word processors for output purposes only. The Title Page means, for a printed book, the title page itself, plus such following pages as are needed to hold, legibly, the material this License requires to appear in the title page. For works in formats which do not have any title page as such, Title Page means the text near the most prominent appearance of the works title, preceding the beginning of the body of the text. The publisher means any person or entity that distributes copies of the Document to the public. A section Entitled XYZ means a named subunit of the Document whose title either is precisely XYZ or contains XYZ in parentheses following text that translates XYZ in another language. (Here XYZ stands for a specific section name mentioned below, such as Acknowledgements, Dedications, Endorsements, or History.) To Preserve the Title of such a section when you modify the Document means that it remains a section Entitled XYZ according to this definition. The Document may include Warranty Disclaimers next to the notice which states that this License applies to the Document. These Warranty Disclaimers are considered to be included by reference in this License, but only as regards disclaiming warranties: any other implication that these Warranty Disclaimers may have is void and has no effect on the meaning of this License. 2. VERBATIM COPYING
229
You may copy and distribute the Document in any medium, either commercially or noncommercially, provided that this License, the copyright notices, and the license notice saying this License applies to the Document are reproduced in all copies, and that you add no other conditions whatsoever to those of this License. You may not use technical measures to obstruct or control the reading or further copying of the copies you make or distribute. However, you may accept compensation in exchange for copies. If you distribute a large enough number of copies you must also follow the conditions in section 3. You may also lend copies, under the same conditions stated above, and you may publicly display copies. 3. COPYING IN QUANTITY If you publish printed copies (or copies in media that commonly have printed covers) of the Document, numbering more than 100, and the Documents license notice requires Cover Texts, you must enclose the copies in covers that carry, clearly and legibly, all these Cover Texts: Front-Cover Texts on the front cover, and Back-Cover Texts on the back cover. Both covers must also clearly and legibly identify you as the publisher of these copies. The front cover must present the full title with all words of the title equally prominent and visible. You may add other material on the covers in addition. Copying with changes limited to the covers, as long as they preserve the title of the Document and satisfy these conditions, can be treated as verbatim copying in other respects. If the required texts for either cover are too voluminous to fit legibly, you should put the first ones listed (as many as fit reasonably) on the actual cover, and continue the rest onto adjacent pages. If you publish or distribute Opaque copies of the Document numbering more than 100, you must either include a machine-readable Transparent copy along with each Opaque copy, or state in or with each Opaque copy a computer-network location from which the general network-using public has access to download using public-standard network protocols a complete Transparent copy of the Document, free of added material. If you use the latter option, you must take reasonably prudent steps, when you begin distribution of Opaque copies in quantity, to ensure that this Transparent copy will remain thus accessible at the stated location until at least one year after the last time you distribute an Opaque copy (directly or through your agents or retailers) of that edition to the public. It is requested, but not required, that you contact the authors of the Document well before redistributing any large number of copies, to give them a chance to provide you with an updated version of the Document. 4. MODIFICATIONS You may copy and distribute a Modified Version of the Document under the conditions of sections 2 and 3 above, provided that you release the Modified Version under precisely this License, with the Modified Version filling the role of the Document, thus licensing distribution and modification of the Modified Version to whoever possesses a copy of it. In addition, you must do these things in the Modified Version: A. Use in the Title Page (and on the covers, if any) a title distinct from that of the Document, and from those of previous versions (which should, if there were any,
230
be listed in the History section of the Document). You may use the same title as a previous version if the original publisher of that version gives permission. B. List on the Title Page, as authors, one or more persons or entities responsible for authorship of the modifications in the Modified Version, together with at least five of the principal authors of the Document (all of its principal authors, if it has fewer than five), unless they release you from this requirement. C. State on the Title page the name of the publisher of the Modified Version, as the publisher. D. Preserve all the copyright notices of the Document. E. Add an appropriate copyright notice for your modifications adjacent to the other copyright notices. F. Include, immediately after the copyright notices, a license notice giving the public permission to use the Modified Version under the terms of this License, in the form shown in the Addendum below. G. Preserve in that license notice the full lists of Invariant Sections and required Cover Texts given in the Documents license notice. H. Include an unaltered copy of this License. I. Preserve the section Entitled History, Preserve its Title, and add to it an item stating at least the title, year, new authors, and publisher of the Modified Version as given on the Title Page. If there is no section Entitled History in the Document, create one stating the title, year, authors, and publisher of the Document as given on its Title Page, then add an item describing the Modified Version as stated in the previous sentence. J. Preserve the network location, if any, given in the Document for public access to a Transparent copy of the Document, and likewise the network locations given in the Document for previous versions it was based on. These may be placed in the History section. You may omit a network location for a work that was published at least four years before the Document itself, or if the original publisher of the version it refers to gives permission. K. For any section Entitled Acknowledgements or Dedications, Preserve the Title of the section, and preserve in the section all the substance and tone of each of the contributor acknowledgements and/or dedications given therein. L. Preserve all the Invariant Sections of the Document, unaltered in their text and in their titles. Section numbers or the equivalent are not considered part of the section titles. M. Delete any section Entitled Endorsements. Such a section may not be included in the Modified Version. N. Do not retitle any existing section to be Entitled Endorsements or to conflict in title with any Invariant Section. O. Preserve any Warranty Disclaimers. If the Modified Version includes new front-matter sections or appendices that qualify as Secondary Sections and contain no material copied from the Document, you may at your option designate some or all of these sections as invariant. To do this, add their
231
titles to the list of Invariant Sections in the Modified Versions license notice. These titles must be distinct from any other section titles. You may add a section Entitled Endorsements, provided it contains nothing but endorsements of your Modified Version by various partiesfor example, statements of peer review or that the text has been approved by an organization as the authoritative definition of a standard. You may add a passage of up to five words as a Front-Cover Text, and a passage of up to 25 words as a Back-Cover Text, to the end of the list of Cover Texts in the Modified Version. Only one passage of Front-Cover Text and one of Back-Cover Text may be added by (or through arrangements made by) any one entity. If the Document already includes a cover text for the same cover, previously added by you or by arrangement made by the same entity you are acting on behalf of, you may not add another; but you may replace the old one, on explicit permission from the previous publisher that added the old one. The author(s) and publisher(s) of the Document do not by this License give permission to use their names for publicity for or to assert or imply endorsement of any Modified Version. 5. COMBINING DOCUMENTS You may combine the Document with other documents released under this License, under the terms defined in section 4 above for modified versions, provided that you include in the combination all of the Invariant Sections of all of the original documents, unmodified, and list them all as Invariant Sections of your combined work in its license notice, and that you preserve all their Warranty Disclaimers. The combined work need only contain one copy of this License, and multiple identical Invariant Sections may be replaced with a single copy. If there are multiple Invariant Sections with the same name but different contents, make the title of each such section unique by adding at the end of it, in parentheses, the name of the original author or publisher of that section if known, or else a unique number. Make the same adjustment to the section titles in the list of Invariant Sections in the license notice of the combined work. In the combination, you must combine any sections Entitled History in the various original documents, forming one section Entitled History; likewise combine any sections Entitled Acknowledgements, and any sections Entitled Dedications. You must delete all sections Entitled Endorsements. 6. COLLECTIONS OF DOCUMENTS You may make a collection consisting of the Document and other documents released under this License, and replace the individual copies of this License in the various documents with a single copy that is included in the collection, provided that you follow the rules of this License for verbatim copying of each of the documents in all other respects. You may extract a single document from such a collection, and distribute it individually under this License, provided you insert a copy of this License into the extracted document, and follow this License in all other respects regarding verbatim copying of that document.
232
7. AGGREGATION WITH INDEPENDENT WORKS A compilation of the Document or its derivatives with other separate and independent documents or works, in or on a volume of a storage or distribution medium, is called an aggregate if the copyright resulting from the compilation is not used to limit the legal rights of the compilations users beyond what the individual works permit. When the Document is included in an aggregate, this License does not apply to the other works in the aggregate which are not themselves derivative works of the Document. If the Cover Text requirement of section 3 is applicable to these copies of the Document, then if the Document is less than one half of the entire aggregate, the Documents Cover Texts may be placed on covers that bracket the Document within the aggregate, or the electronic equivalent of covers if the Document is in electronic form. Otherwise they must appear on printed covers that bracket the whole aggregate. 8. TRANSLATION Translation is considered a kind of modification, so you may distribute translations of the Document under the terms of section 4. Replacing Invariant Sections with translations requires special permission from their copyright holders, but you may include translations of some or all Invariant Sections in addition to the original versions of these Invariant Sections. You may include a translation of this License, and all the license notices in the Document, and any Warranty Disclaimers, provided that you also include the original English version of this License and the original versions of those notices and disclaimers. In case of a disagreement between the translation and the original version of this License or a notice or disclaimer, the original version will prevail. If a section in the Document is Entitled Acknowledgements, Dedications, or History, the requirement (section 4) to Preserve its Title (section 1) will typically require changing the actual title. 9. TERMINATION You may not copy, modify, sublicense, or distribute the Document except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, or distribute it is void, and will automatically terminate your rights under this License. However, if you cease all violation of this License, then your license from a particular copyright holder is reinstated (a) provisionally, unless and until the copyright holder explicitly and finally terminates your license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation. Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you of the violation by some reasonable means, this is the first time you have received notice of violation of this License (for any work) from that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice. Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from you under this License. If your rights have been terminated and not permanently reinstated, receipt of a copy of some or all of the same material does not give you any rights to use it.
233
10. FUTURE REVISIONS OF THIS LICENSE The Free Software Foundation may publish new, revised versions of the GNU Free Documentation License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. See http://www.gnu.org/copyleft/. Each version of the License is given a distinguishing version number. If the Document specifies that a particular numbered version of this License or any later version applies to it, you have the option of following the terms and conditions either of that specified version or of any later version that has been published (not as a draft) by the Free Software Foundation. If the Document does not specify a version number of this License, you may choose any version ever published (not as a draft) by the Free Software Foundation. If the Document specifies that a proxy can decide which future versions of this License can be used, that proxys public statement of acceptance of a version permanently authorizes you to choose that version for the Document. 11. RELICENSING Massive Multiauthor Collaboration Site (or MMC Site) means any World Wide Web server that publishes copyrightable works and also provides prominent facilities for anybody to edit those works. A public wiki that anybody can edit is an example of such a server. A Massive Multiauthor Collaboration (or MMC) contained in the site means any set of copyrightable works thus published on the MMC site. CC-BY-SA means the Creative Commons Attribution-Share Alike 3.0 license published by Creative Commons Corporation, a not-for-profit corporation with a principal place of business in San Francisco, California, as well as future copyleft versions of that license published by that same organization. Incorporate means to publish or republish a Document, in whole or in part, as part of another Document. An MMC is eligible for relicensing if it is licensed under this License, and if all works that were first published under this License somewhere other than this MMC, and subsequently incorporated in whole or in part into the MMC, (1) had no cover texts or invariant sections, and (2) were thus incorporated prior to November 1, 2008. The operator of an MMC Site may republish an MMC contained in the site under CC-BY-SA on the same site at any time before August 1, 2009, provided the MMC is eligible for relicensing.
234
If you have Invariant Sections, Front-Cover Texts and Back-Cover Texts, replace the with...Texts. line with this:
with the Invariant Sections being list their titles, with the Front-Cover Texts being list, and with the Back-Cover Texts being list.
If you have Invariant Sections without Cover Texts, or some other combination of the three, merge those two alternatives to suit the situation. If your document contains nontrivial examples of program code, we recommend releasing these examples in parallel under your choice of free software license, such as the GNU General Public License, to permit their use in free software.
235
Option Index
237
Option Index
gfortrans command line options are indexed here without any initial - or --. Where an option has both positive and negative forms (such as -foption and -fno-option), relevant entries in the manual are indexed under the most appropriate form; it may sometimes be useful to look up both forms.
A
A-predicate =answer . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Apredicate =answer . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
B
backslash . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
C
C . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 CC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 cpp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
D
dD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . dI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . dM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . dN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Dname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Dname =definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . dU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 11 11 11 13 13 11
F
falign-commons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 fall-intrinsics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 fbacktrace. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 fblas-matmul-limit . . . . . . . . . . . . . . . . . . . . . . . . . . 23 fbounds-check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 fcheck . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 fcheck-array-temporaries . . . . . . . . . . . . . . . . . . . 22 fcoarray . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 fconvert=conversion . . . . . . . . . . . . . . . . . . . . . . . . . 18 fcray-pointer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 fd-lines-as-code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 fd-lines-as-comments . . . . . . . . . . . . . . . . . . . . . . . . . 8 fdefault-double-8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 fdefault-integer-8 . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 fdefault-real-8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 fdollar-ok . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 fdump-core. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 fdump-fortran-optimized . . . . . . . . . . . . . . . . . . . . . 16 fdump-fortran-original . . . . . . . . . . . . . . . . . . . . . . 16 fdump-parse-tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 fexternal-blas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 ff2c . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
ffixed-line-length-n . . . . . . . . . . . . . . . . . . . . . . . . . 9 ffpe-trap=list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 ffree-form . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 ffree-line-length-n . . . . . . . . . . . . . . . . . . . . . . . . . . 9 fimplicit-none . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 finit-character . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 finit-integer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 finit-local-zero . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 finit-logical . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 finit-real. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 fintrinsic-modules-path dir . . . . . . . . . . . . . . . . 17 fmax-array-constructor . . . . . . . . . . . . . . . . . . . . . . 22 fmax-errors=n . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 fmax-identifier-length=n . . . . . . . . . . . . . . . . . . . 10 fmax-stack-var-size . . . . . . . . . . . . . . . . . . . . . . . . . 22 fmax-subrecord-length=length . . . . . . . . . . . . . . . 18 fmodule-private . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 fno-automatic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 fno-fixed-form . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 fno-protect-parens . . . . . . . . . . . . . . . . . . . . . . . . . . 24 fno-range-check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 fno-underscoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 fno-whole-file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 fopenmp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 fpack-derived . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 fpp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 frange-check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 frealloc-lhs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 frecord-marker=length . . . . . . . . . . . . . . . . . . . . . . . 18 frecursive. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 frepack-arrays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 fsecond-underscore . . . . . . . . . . . . . . . . . . . . . . . . . . 20 fshort-enums . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23, 32 fsign-zero. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 fsyntax-only . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 fworking-directory . . . . . . . . . . . . . . . . . . . . . . . . . . 11
H
H . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
I
Idir . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . idirafter dir . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . imultilib dir . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iprefix prefix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iquote dir . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . isysroot dir . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 11 11 11 12 11
238
isystem dir . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
U
Uname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 undef . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
J
Jdir . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
W
Waliasing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Walign-commons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wampersand. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Warray-temporaries . . . . . . . . . . . . . . . . . . . . . . . . . . Wcharacter-truncation . . . . . . . . . . . . . . . . . . . . . . . Wconversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wconversion-extra. . . . . . . . . . . . . . . . . . . . . . . . . . . . Werror . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wimplicit-interface . . . . . . . . . . . . . . . . . . . . . . . . . Wimplicit-procedure . . . . . . . . . . . . . . . . . . . . . . . . . Wintrinsic-shadow. . . . . . . . . . . . . . . . . . . . . . . . . . . . Wintrinsics-std . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wline-truncation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wreal-q-constant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wsurprising . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wtabs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wunderflow. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wunused-dummy-argument . . . . . . . . . . . . . . . . . . . . . . Wunused-parameter. . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 16 14 14 15 15 15 15 16 15 15 16 15 15 15 15 15 16 16 16
M
Mdir . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
N
nostdinc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
P
P . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 pedantic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 pedantic-errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
S
static-libgfortran . . . . . . . . . . . . . . . . . . . . . . . . . . 18 std=std option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Keyword Index
239
Keyword Index
$
$............................................... 9 ALOG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 ALOG10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 AMAX0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 AMAX1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 AMIN0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 AMIN1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 AMOD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 AND . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 ANINT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 ANY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 area hyperbolic cosine . . . . . . . . . . . . . . . . . . . . . . . . . 62 area hyperbolic sine . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 area hyperbolic tangent . . . . . . . . . . . . . . . . . . . . . . . . 73 argument list functions . . . . . . . . . . . . . . . . . . . . . . . . 44 arguments, to program . . . . . . . . . . 87, 118, 119, 129 array, add elements . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 array, AND. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 array, apply condition . . . . . . . . . . . . . . . . . . . . . . 66, 69 array, bounds checking . . . . . . . . . . . . . . . . . . . . . . . . . 21 array, change dimensions . . . . . . . . . . . . . . . . . . . . . 177 array, combine arrays . . . . . . . . . . . . . . . . . . . . . . . . . 158 array, condition testing . . . . . . . . . . . . . . . . . . . . . 66, 69 array, conditionally add elements . . . . . . . . . . . . . 194 array, conditionally count elements . . . . . . . . . . . . . 91 array, conditionally multiply elements . . . . . . . . . 171 array, constructors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 array, count elements . . . . . . . . . . . . . . . . . . . . . . . . . 188 array, duplicate dimensions . . . . . . . . . . . . . . . . . . . 190 array, duplicate elements . . . . . . . . . . . . . . . . . . . . . 190 array, element counting . . . . . . . . . . . . . . . . . . . . . . . . 91 array, gather elements . . . . . . . . . . . . . . . . . . . . . . . . 168 array, increase dimension . . . . . . . . . . . . . . . . 190, 204 array, indices of type real . . . . . . . . . . . . . . . . . . . . . . 40 array, location of maximum element . . . . . . . . . . 155 array, location of minimum element . . . . . . . . . . . 159 array, lower bound. . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 array, maximum value . . . . . . . . . . . . . . . . . . . . . . . . 156 array, merge arrays . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 array, minimum value . . . . . . . . . . . . . . . . . . . . . . . . 160 array, multiply elements . . . . . . . . . . . . . . . . . . . . . . 171 array, number of elements . . . . . . . . . . . . . . . . . 91, 188 array, OR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 array, packing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 array, parity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 array, permutation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 array, product . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 array, reduce dimension . . . . . . . . . . . . . . . . . . . . . . . 168 array, rotate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 array, scatter elements . . . . . . . . . . . . . . . . . . . . . . . . 204 array, shape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 array, shift . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 array, shift circularly . . . . . . . . . . . . . . . . . . . . . . . . . . 93 array, size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 array, sum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
%
%LOC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 %REF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 %VAL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
&
& . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
[
[...] . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
55 56 57 58 55 57
A
ABORT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 ABS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 absolute value . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 ACCESS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 ACCESS=STREAM I/O . . . . . . . . . . . . . . . . . . . . . . . . . 32 ACHAR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 ACOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 ACOSH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 adjust string . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 ADJUSTL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 ADJUSTR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 AIMAG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 AINT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 ALARM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 ALGAMA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 aliasing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 alignment of COMMON blocks . . . . . . . . . . . . . . . . . 16, 23 ALL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 all warnings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 ALLOCATABLE components of derived types . . . . . . 32 ALLOCATABLE dummy arguments . . . . . . . . . . . . . . . 32 ALLOCATABLE function results . . . . . . . . . . . . . . . . . . 32 ALLOCATED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 allocation, moving . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 allocation, status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
240
transmogrify . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 transpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 unpacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 upper bound . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 XOR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 ASCII collating sequence . . . . . . . . . . . . . . . . . . 61, 126 ASIN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 ASINH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 ASSOCIATED. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 association status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 association status, C pointer . . . . . . . . . . . . . . . . . . . 80 ATAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 ATAN2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 ATANH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Authors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
bitwise logical and . . . . . . . . . . . . . . . . . . . . . . . . 67, 127 bitwise logical exclusive or . . . . . . . . . . . . . . . 132, 205 bitwise logical not . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 bitwise logical or . . . . . . . . . . . . . . . . . . . . . . . . . 135, 167 BLE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 BLT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 bounds checking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 BOZ literal constants . . . . . . . . . . . . . . . . . . . . . . . . . . 39 BTEST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
C
C_ASSOCIATED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 C_F_POINTER . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 C_F_PROCPOINTER . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 C_FUNLOC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 C_LOC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 C_SIZEOF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 CABS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 calling convention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 CCOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 CDABS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 CDCOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 CDEXP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 CDLOG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 CDSIN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 CDSQRT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 ceiling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68, 84 CEILING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 CEXP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 CHAR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 character kind . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 character set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 CHDIR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 checking array temporaries. . . . . . . . . . . . . . . . . . . . . 21 checking subscripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 CHMOD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 clock ticks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157, 195 CLOG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 CMPLX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 coarray, IMAGE_INDEX . . . . . . . . . . . . . . . . . . . . . . . . . 133 coarray, lower bound . . . . . . . . . . . . . . . . . . . . . . . . . 142 coarray, NUM_IMAGES . . . . . . . . . . . . . . . . . . . . . . . . . . 166 coarray, THIS_IMAGE . . . . . . . . . . . . . . . . . . . . . . . . . . 197 coarray, upper bound . . . . . . . . . . . . . . . . . . . . . . . . . 203 coarrays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 code generation, conventions . . . . . . . . . . . . . . . . . . . 19 collating sequence, ASCII . . . . . . . . . . . . . . . . . 61, 126 command line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 command options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 command-line arguments . . . . . . . . 87, 118, 119, 129 command-line arguments, number of . . . . . . 87, 129 COMMAND_ARGUMENT_COUNT . . . . . . . . . . . . . . . . . . . . . . 87 compiler flags inquiry function . . . . . . . . . . . . . . . . . 88 compiler, name and version . . . . . . . . . . . . . . . . . . . . 88 COMPILER_OPTIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 COMPILER_VERSION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 COMPLEX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
B
backslash . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 backtrace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 base 10 logarithm function . . . . . . . . . . . . . . . . . . . . 149 BESJ0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 BESJ1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 BESJN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Bessel function, first kind . . . . . . . . . . . . . . . . . . 74, 75 Bessel function, second kind . . . . . . . . . . . . . . . . 76, 77 BESSEL_J0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 BESSEL_J1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 BESSEL_JN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 BESSEL_Y0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 BESSEL_Y1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 BESSEL_YN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 BESY0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 BESY1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 BESYN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 BGE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 BGT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 binary representation . . . . . . . . . . . . . . . . . . . . . . . . . 170 BIT_SIZE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 bits set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 bits, AND of array elements . . . . . . . . . . . . . . . . . . 126 bits, clear . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 bits, extract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 bits, get . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 bits, merge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 bits, move . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163, 200 bits, negate. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 bits, number of . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 bits, OR of array elements . . . . . . . . . . . . . . . . . . . . 128 bits, set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 bits, shift . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 bits, shift circular . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 bits, shift left . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151, 185 bits, shift right . . . . . . . . . . . . . . . . . . . . . . 178, 184, 185 bits, testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 bits, unset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 bits, XOR of array elements . . . . . . . . . . . . . . . . . . 136 bitwise comparison . . . . . . . . . . . . . . . . . . . . . . . . . 78, 79
Keyword Index
241
complex conjugate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Complex function. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 complex numbers, conversion to . . . . . . . . 87, 89, 96 complex numbers, imaginary part . . . . . . . . . . . . . . 64 complex numbers, real part . . . . . . . . . . . . . . . 99, 175 Conditional compilation . . . . . . . . . . . . . . . . . . . . . . . . 2 CONJG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Contributing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 Contributors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 conversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 conversion, to character . . . . . . . . . . . . . . . . . . . . . . . . 85 conversion, to complex . . . . . . . . . . . . . . . . . 87, 89, 96 conversion, to integer . . 40, 126, 130, 134, 135, 150 conversion, to logical . . . . . . . . . . . . . . . . . . . . . . 40, 150 conversion, to real . . . . . . . . . . . . . . . . . . . . . . . . 95, 175 conversion, to string . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 CONVERT specifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 core, dump . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17, 59 COS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 COSH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 cosine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 cosine, hyperbolic. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 cosine, hyperbolic, inverse . . . . . . . . . . . . . . . . . . . . . 62 cosine, inverse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 COUNT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 CPP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2, 10 CPU_TIME . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Credits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 CSHIFT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 CSIN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 CSQRT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 CTIME . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 current date . . . . . . . . . . . . . . . . . . . . . . . . . 94, 108, 131 current time . . . . . . . . . . . . . . . . 94, 108, 140, 198, 199
D
DABS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 DACOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 DACOSH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 DASIN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 DASINH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 DATAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 DATAN2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 DATANH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 date, current . . . . . . . . . . . . . . . . . . . . . . . . . 94, 108, 131 DATE_AND_TIME . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 DBESJ0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 DBESJ1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 DBESJN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 DBESY0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 DBESY1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 DBESYN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 DBLE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 DCMPLX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 DCONJG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 DCOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 DCOSH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
DDIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 debugging information options . . . . . . . . . . . . . . . . . 16 debugging, preprocessor . . . . . . . . . . . . . . . . . . . . . . . 11 DECODE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 delayed execution . . . . . . . . . . . . . . . . . . . . . . . . . 65, 189 DEXP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 DFLOAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 DGAMMA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 dialect options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 DIGITS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 DIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 DIMAG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 DINT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 directive, INCLUDE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 directory, options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 directory, search paths for inclusion . . . . . . . . . . . . 17 division, modulo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 division, remainder . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 DLGAMA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 DLOG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 DLOG10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 DMAX1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 DMIN1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 DMOD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 DNINT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 dot product . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 DOT_PRODUCT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 DPROD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 DREAL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 DSHIFTL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 DSHIFTR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 DSIGN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 DSIN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 DSINH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 DSQRT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 DTAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 DTANH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 DTIME . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 dummy argument, unused . . . . . . . . . . . . . . . . . . . . . 16
E
elapsed time . . . . . . . . . . . . . . . . . . . . . . . . 100, 180, 181 ENCODE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 ENUM statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 ENUMERATOR statement . . . . . . . . . . . . . . . . . . . . . . . . . 32 environment variable . . . . . . . . . . . . . 24, 25, 121, 122 EOSHIFT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 EPSILON . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 ERF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 ERFC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 ERFC_SCALED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 error function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 error function, complementary . . . . . . . . . . . . . . . . 103 error function, complementary, exponentially-scaled . . . . . . . . . . . . . . . . . . . . . . 104 errors, limiting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 escape characters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
242
ETIME . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Euclidean distance. . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Euclidean vector norm . . . . . . . . . . . . . . . . . . . . . . . . 165 EXECUTE_COMMAND_LINE . . . . . . . . . . . . . . . . . . . . . . . 105 EXIT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 EXP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 EXPONENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 exponential function . . . . . . . . . . . . . . . . . . . . . . . . . . 106 exponential function, inverse . . . . . . . . . . . . . 148, 149 expression size . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83, 189 EXTENDS_TYPE_OF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 extensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 extensions, implemented . . . . . . . . . . . . . . . . . . . . . . . 37 extensions, not implemented . . . . . . . . . . . . . . . . . . . 45
G
g77 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 g77 calling convention . . . . . . . . . . . . . . . . . . . . . . 19, 20 GAMMA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Gamma function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Gamma function, logarithm of . . . . . . . . . . . . . . . . 149 GCC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 GERROR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 GET_COMMAND . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 GET_COMMAND_ARGUMENT . . . . . . . . . . . . . . . . . . . . . . . 119 GET_ENVIRONMENT_VARIABLE . . . . . . . . . . . . . . . . . . 122 GETARG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 GETCWD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 GETENV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 GETGID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 GETLOG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 GETPID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 GETUID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 GMTIME . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 GNU Compiler Collection . . . . . . . . . . . . . . . . . . . . . . . 2 GNU Fortran command options . . . . . . . . . . . . . . . . . 7
F
f2c calling convention . . . . . . . . . . . . . . . . . . . . . . 19, 20 Factorial function . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 FDATE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 FDL, GNU Free Documentation License . . . . . . 227 FGET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 FGETC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 file format, fixed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8, 9 file format, free. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8, 9 file operation, file number. . . . . . . . . . . . . . . . . . . . . 112 file operation, flush . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 file operation, position . . . . . . . . . . . . . . . . . . . 115, 116 file operation, read character . . . . . . . . . . . . . 109, 110 file operation, seek. . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 file operation, write character . . . . . . . . . . . . 112, 113 file system, access mode . . . . . . . . . . . . . . . . . . . . . . . 60 file system, change access mode . . . . . . . . . . . . . . . . 86 file system, create link . . . . . . . . . . . . . . . . . . . 145, 194 file system, file creation mask . . . . . . . . . . . . . . . . . 203 file system, file status . . . . . . . . . . . . . . . 116, 151, 192 file system, hard link . . . . . . . . . . . . . . . . . . . . . . . . . 145 file system, remove file . . . . . . . . . . . . . . . . . . . . . . . . 203 file system, rename file . . . . . . . . . . . . . . . . . . . . . . . 176 file system, soft link . . . . . . . . . . . . . . . . . . . . . . . . . . 194 flags inquiry function . . . . . . . . . . . . . . . . . . . . . . . . . . 88 FLOAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 floating point, exponent . . . . . . . . . . . . . . . . . . . . . . 107 floating point, fraction . . . . . . . . . . . . . . . . . . . . . . . . 114 floating point, nearest different . . . . . . . . . . . . . . . 163 floating point, relative spacing . . . . . . . . . . . 178, 190 floating point, scale . . . . . . . . . . . . . . . . . . . . . . . . . . . 179 floating point, set exponent . . . . . . . . . . . . . . . . . . . 183 floor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65, 110 FLOOR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 FLUSH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 FLUSH statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 FNUM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 FORMAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Fortran 77 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 FPP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 FPUT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 FPUTC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
H
Hollerith constants . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 HOSTNM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 HUGE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 hyperbolic cosine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 hyperbolic function, cosine . . . . . . . . . . . . . . . . . . . . . 91 hyperbolic function, cosine, inverse . . . . . . . . . . . . . 62 hyperbolic function, sine . . . . . . . . . . . . . . . . . . . . . . 188 hyperbolic function, sine, inverse . . . . . . . . . . . . . . . 70 hyperbolic function, tangent . . . . . . . . . . . . . . . . . . 197 hyperbolic function, tangent, inverse . . . . . . . . . . . 73 hyperbolic sine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 hyperbolic tangent . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 HYPOT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
I
I/O item lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 IABS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 IACHAR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 IALL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 IAND . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 IANY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 IARGC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 IBCLR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 IBITS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 IBSET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 ICHAR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Keyword Index
243
IDATE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 IDIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 IDINT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 IDNINT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 IEEE, ISNAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 IEOR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 IERRNO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 IFIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 IMAG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 IMAGE_INDEX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 images, cosubscript to image index conversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 images, index of this image . . . . . . . . . . . . . . . . . . . 197 images, number of . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 IMAGPART . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 IMPORT statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 INCLUDE directive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 inclusion, directory search paths for . . . . . . . . . . . . 17 INDEX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 INT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 INT2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 INT8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 integer kind . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 Interoperability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 intrinsic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 intrinsic Modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 intrinsic procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 inverse hyperbolic cosine . . . . . . . . . . . . . . . . . . . . . . . 62 inverse hyperbolic sine . . . . . . . . . . . . . . . . . . . . . . . . . 70 inverse hyperbolic tangent . . . . . . . . . . . . . . . . . . . . . 73 IOMSG= specifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 IOR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 IOSTAT, end of file . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 IOSTAT, end of record . . . . . . . . . . . . . . . . . . . . . . . . . 138 IPARITY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 IRAND . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 IS_IOSTAT_END . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 IS_IOSTAT_EOR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 ISATTY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 ISHFT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 ISHFTC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 ISIGN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 ISNAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 ISO_FORTRAN_ENV statement . . . . . . . . . . . . . . . . . . . 32 ITIME . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
L
L2 vector norm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 language, dialect options . . . . . . . . . . . . . . . . . . . . . . . . 8 LBOUND . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 LCOBOUND . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 LEADZ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 left shift, combined . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 LEN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 LEN_TRIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 lexical comparison of strings . . . . . . . . 144, 145, 146 LGAMMA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 LGE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 LGT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 libf2c calling convention . . . . . . . . . . . . . . . . . . . . 19, 20 libgfortran initialization, set args . . . . . . . . . . . . . . 55 libgfortran initialization, set convert . . . . . . . . . . . 56 libgfortran initialization, set fpe . . . . . . . . . . . . . . . 57 libgfortran initialization, set max subrecord length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 libgfortran initialization, set options . . . . . . . . . . . 55 libgfortran initialization, set record marker . . . . 57 limits, largest number . . . . . . . . . . . . . . . . . . . . . . . . 125 limits, smallest number . . . . . . . . . . . . . . . . . . . . . . . 199 LINK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 linking, static . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 LLE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 LLT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 LNBLNK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 LOC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 location of a variable in memory . . . . . . . . . . . . . . 148 LOG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 LOG_GAMMA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 LOG10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 logarithm function . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 logarithm function with base 10 . . . . . . . . . . . . . . 149 logarithm function, inverse. . . . . . . . . . . . . . . . . . . . 106 LOGICAL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 logical and, bitwise . . . . . . . . . . . . . . . . . . . . . . . 67, 127 logical exclusive or, bitwise. . . . . . . . . . . . . . . 132, 205 logical not, bitwise . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 logical or, bitwise . . . . . . . . . . . . . . . . . . . . . . . . 135, 167 logical, variable representation . . . . . . . . . . . . . . . . . 35 login name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 LONG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 LSHIFT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 LSTAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 LTIME . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
K
KILL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 kind . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35, 141 KIND . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 kind, character . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 kind, integer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 kind, old-style . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 kind, real . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
M
MALLOC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . mask, left justified . . . . . . . . . . . . . . . . . . . . . . . . . . . . mask, right justified . . . . . . . . . . . . . . . . . . . . . . . . . . MASKL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . MASKR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . MATMUL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . matrix multiplication . . . . . . . . . . . . . . . . . . . . . . . . . matrix, transpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 153 154 153 154 154 154 201
244
MAX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 MAX0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 MAX1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 MAXEXPONENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 maximum value . . . . . . . . . . . . . . . . . . . . . . . . . . 154, 156 MAXLOC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 MAXVAL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 MCLOCK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 MCLOCK8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 memory checking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 MERGE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 MERGE_BITS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 messages, error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 messages, warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 MIN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 MIN0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 MIN1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 MINEXPONENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 minimum value . . . . . . . . . . . . . . . . . . . . . . . . . . 159, 160 MINLOC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 MINVAL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 Mixed-language programming . . . . . . . . . . . . . . . . . . 49 MOD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 model representation, base . . . . . . . . . . . . . . . . . . . . 172 model representation, epsilon . . . . . . . . . . . . . . . . . 102 model representation, largest number . . . . . . . . . 125 model representation, maximum exponent . . . . 155 model representation, minimum exponent . . . . . 159 model representation, precision . . . . . . . . . . . . . . . 169 model representation, radix . . . . . . . . . . . . . . . . . . . 172 model representation, range. . . . . . . . . . . . . . . . . . . 175 model representation, significant digits . . . . . . . . . 96 model representation, smallest number . . . . . . . . 199 module entities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 module search path . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 modulo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 MODULO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 MOVE_ALLOC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 moving allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 multiply array elements . . . . . . . . . . . . . . . . . . . . . . . 171 MVBITS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
O
OpenMP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10, 43 operators, unary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 options inquiry function . . . . . . . . . . . . . . . . . . . . . . . 88 options, code generation . . . . . . . . . . . . . . . . . . . . . . . 19 options, debugging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 options, dialect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 options, directory search . . . . . . . . . . . . . . . . . . . . . . . 17 options, errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 options, fortran dialect . . . . . . . . . . . . . . . . . . . . . . . . . . 8 options, gfortran command . . . . . . . . . . . . . . . . . . . . 7 options, linking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 options, negative forms . . . . . . . . . . . . . . . . . . . . . . . . . 7 options, preprocessor . . . . . . . . . . . . . . . . . . . . . . . . . . 10 options, run-time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 options, runtime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 options, warnings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 OR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 output, newline. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
P
PACK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 parity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 Parity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 PARITY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 paths, search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 PERROR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 pointer checking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 pointer, C address of pointers . . . . . . . . . . . . . . . . . . 81 pointer, C address of procedures . . . . . . . . . . . . . . . 81 pointer, C association status . . . . . . . . . . . . . . . . . . . 80 pointer, convert C to Fortran . . . . . . . . . . . . . . . . . . 82 pointer, cray . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114, 152 pointer, Cray . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 pointer, disassociated . . . . . . . . . . . . . . . . . . . . . . . . . 166 pointer, status . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71, 166 POPCNT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 POPPAR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 positive difference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 PRECISION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 Preprocessing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 preprocessing, assertion . . . . . . . . . . . . . . . . . . . . . . . . 12 preprocessing, define macros . . . . . . . . . . . . . . . . . . . 13 preprocessing, include path . . . . . . . . . . . . . . . . . 11, 12 preprocessing, keep comments . . . . . . . . . . . . . . . . . 12 preprocessing, no linemarkers . . . . . . . . . . . . . . . . . . 13 preprocessing, undefine macros. . . . . . . . . . . . . . . . . 13 preprocessor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 preprocessor, debugging . . . . . . . . . . . . . . . . . . . . . . . 11 preprocessor, disable . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 preprocessor, enable . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 preprocessor, include file handling . . . . . . . . . . . . . . . 2 preprocessor, working directory . . . . . . . . . . . . . . . . 11 PRESENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 private . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 procedure pointer, convert C to Fortran . . . . . . . . 83 process ID. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
N
Namelist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 natural logarithm function . . . . . . . . . . . . . . . . . . . . 148 NEAREST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 NEW_LINE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 newline. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 NINT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 norm, Euclidean . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 NORM2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 NOT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 NULL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 NUM_IMAGES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Keyword Index
245
PRODUCT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 product, double-precision . . . . . . . . . . . . . . . . . . . . . . 98 product, matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 product, vector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 program termination . . . . . . . . . . . . . . . . . . . . . . . . . 106 program termination, with core dump . . . . . . . . . . 59 PROTECTED statement . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Q
Q exponent-letter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
R
RADIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172 radix, real . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 RAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172 RAND . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 random number generation . . . . . . . . . . 137, 172, 173 random number generation, seeding . . . . . . 174, 191 RANDOM_NUMBER . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 RANDOM_SEED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 RANGE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 range checking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 re-association of parenthesized expressions . . . . . 24 read character, stream mode . . . . . . . . . . . . . 109, 110 REAL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 real kind . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 real number, exponent . . . . . . . . . . . . . . . . . . . . . . . . 107 real number, fraction . . . . . . . . . . . . . . . . . . . . . . . . . 114 real number, nearest different . . . . . . . . . . . . . . . . . 163 real number, relative spacing . . . . . . . . . . . . . 178, 190 real number, scale . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179 real number, set exponent . . . . . . . . . . . . . . . . . . . . 183 Reallocate the LHS in assignments . . . . . . . . . . . . . 24 REALPART . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 RECORD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Reduction, XOR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 remainder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 RENAME . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 repacking arrays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 REPEAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 RESHAPE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 right shift, combined . . . . . . . . . . . . . . . . . . . . . . . . . 100 root . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 rounding, ceiling . . . . . . . . . . . . . . . . . . . . . . . . . . . 68, 84 rounding, floor . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65, 110 rounding, nearest whole number . . . . . . . . . . . . . . 164 RRSPACING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 RSHIFT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 run-time checking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
S
SAME_TYPE_AS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 SAVE statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 SCALE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179 SCAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
search path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 search paths, for included files . . . . . . . . . . . . . . . . . 17 SECNDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 SECOND . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 seeding a random number generator . . . . . . 174, 191 SELECTED_CHAR_KIND . . . . . . . . . . . . . . . . . . . . . . . . . 181 SELECTED_INT_KIND . . . . . . . . . . . . . . . . . . . . . . . . . . 182 SELECTED_REAL_KIND . . . . . . . . . . . . . . . . . . . . . . . . . 182 SET_EXPONENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 SHAPE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 shift, left . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99, 185 shift, right . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100, 185 shift, right with fill . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 SHIFTA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 SHIFTL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 SHIFTR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 SHORT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 SIGN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 sign copying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 SIGNAL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 SIN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 sine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 sine, hyperbolic. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 sine, hyperbolic, inverse . . . . . . . . . . . . . . . . . . . . . . . . 70 sine, inverse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 SINH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 SIZE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 size of a variable, in bits . . . . . . . . . . . . . . . . . . . . . . . 78 size of an expression . . . . . . . . . . . . . . . . . . . . . . 83, 189 SIZEOF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 SLEEP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 SNGL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 SPACING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 SPREAD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 SQRT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 square-root . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 SRAND . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 STAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 statement, ENUM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 statement, ENUMERATOR . . . . . . . . . . . . . . . . . . . . . . . . 32 statement, FLUSH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 statement, IMPORT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 statement, ISO_FORTRAN_ENV . . . . . . . . . . . . . . . . . . . 32 statement, PROTECTED . . . . . . . . . . . . . . . . . . . . . . . . . . 32 statement, SAVE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 statement, USE, INTRINSIC . . . . . . . . . . . . . . . . . . . . 32 statement, VALUE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 statement, VOLATILE . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 storage size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 STORAGE_SIZE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 STREAM I/O . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 stream mode, read character . . . . . . . . . . . . . 109, 110 stream mode, write character . . . . . . . . . . . . 112, 113 string, adjust left . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 string, adjust right. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 string, comparison . . . . . . . . . . . . . . . . . . 144, 145, 146 string, concatenate . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
246
string, find missing set . . . . . . . . . . . . . . . . . . . . . . . . 204 string, find non-blank character . . . . . . . . . . . . . . . 147 string, find subset . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179 string, find substring . . . . . . . . . . . . . . . . . . . . . . . . . 133 string, length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 string, length, without trailing whitespace. . . . . 144 string, remove trailing whitespace . . . . . . . . . . . . . 201 string, repeat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 strings, varying length . . . . . . . . . . . . . . . . . . . . . . . . . . 4 STRUCTURE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 structure packing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 subscript checking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 substring position . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 SUM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 sum array elements . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 suppressing warnings . . . . . . . . . . . . . . . . . . . . . . . . . . 13 symbol names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 symbol names, transforming . . . . . . . . . . . . . . . . 19, 20 symbol names, underscores . . . . . . . . . . . . . . . . . 19, 20 SYMLNK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 syntax checking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 SYSTEM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 system, error handling . . . . . . . . . . . . . . 118, 132, 169 system, group ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 system, host name . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 system, login name . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 system, process ID . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 system, signal handling . . . . . . . . . . . . . . . . . . . . . . . 186 system, system call . . . . . . . . . . . . . . . . . . . . . . 105, 195 system, terminal . . . . . . . . . . . . . . . . . . . . . . . . . 138, 201 system, user ID. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 system, working directory . . . . . . . . . . . . . . . . . 85, 120 SYSTEM_CLOCK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
TRAILZ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 TRANSFER . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 transforming symbol names . . . . . . . . . . . . . . . . 19, 20 transpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 TRANSPOSE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 trigonometric function, cosine . . . . . . . . . . . . . . . . . . 90 trigonometric function, cosine, inverse . . . . . . . . . . 62 trigonometric function, sine . . . . . . . . . . . . . . . . . . . 187 trigonometric function, sine, inverse . . . . . . . . . . . . 70 trigonometric function, tangent . . . . . . . . . . . . . . . 196 trigonometric function, tangent, inverse . . . . 72, 73 TRIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 TTYNAM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 type cast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
U
UBOUND . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 UCOBOUND . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 UMASK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 underflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 underscore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19, 20 UNLINK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 UNPACK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 unused dummy argument . . . . . . . . . . . . . . . . . . . . . . 16 unused parameter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 USE, INTRINSIC statement . . . . . . . . . . . . . . . . . . . . . 32 user id . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
V
VALUE statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Varying length character strings. . . . . . . . . . . . . . . . . 4 Varying length strings . . . . . . . . . . . . . . . . . . . . . . . . . . 4 vector product . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 VERIFY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 version of the compiler . . . . . . . . . . . . . . . . . . . . . . . . . 88 VOLATILE statement . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
T
tabulators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 TAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 tangent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 tangent, hyperbolic . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 tangent, hyperbolic, inverse . . . . . . . . . . . . . . . . . . . . 73 tangent, inverse . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72, 73 TANH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 terminate program . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 terminate program, with core dump . . . . . . . . . . . . 59 THIS_IMAGE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 thread-safety, threads . . . . . . . . . . . . . . . . . . . . . . . . . . 36 TIME . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198 time, clock ticks . . . . . . . . . . . . . . . . . . . . . . . . . 157, 195 time, conversion to GMT info . . . . . . . . . . . . . . . . . 124 time, conversion to local time info . . . . . . . . . . . . 152 time, conversion to string . . . . . . . . . . . . . . . . . . . . . . 94 time, current . . . . . . . . . . . . . . . 94, 108, 140, 198, 199 time, elapsed . . . . . . . . . . . . . . . 92, 100, 104, 180, 181 TIME8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 TINY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 TR 15581 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 trace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
W
warnings, warnings, warnings, warnings, warnings, warnings, warnings, warnings, warnings, warnings, warnings, warnings, warnings, warnings, warnings, warnings, warnings, aliasing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . alignment of COMMON blocks . . . . . . . . . . all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ampersand . . . . . . . . . . . . . . . . . . . . . . . . . . array temporaries . . . . . . . . . . . . . . . . . . . character truncation . . . . . . . . . . . . . . . . . conversion . . . . . . . . . . . . . . . . . . . . . . . . . . . implicit interface . . . . . . . . . . . . . . . . . . . . implicit procedure . . . . . . . . . . . . . . . . . . . intrinsic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . intrinsics of other standards . . . . . . . . . line truncation . . . . . . . . . . . . . . . . . . . . . . non-standard intrinsics . . . . . . . . . . . . . . q exponent-letter . . . . . . . . . . . . . . . . . . . . suppressing . . . . . . . . . . . . . . . . . . . . . . . . . . suspicious code . . . . . . . . . . . . . . . . . . . . . . tabs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 16 14 14 15 15 15 15 15 16 15 15 15 15 13 15 15
Keyword Index
247
warnings, to errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 warnings, underflow . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 warnings, unused dummy argument . . . . . . . . . . . . 16 warnings, unused parameter . . . . . . . . . . . . . . . . . . . 16 write character, stream mode . . . . . . . . . . . . 112, 113
Z
ZABS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 ZCOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 zero bits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143, 199 ZEXP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 ZLOG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 ZSIN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 ZSQRT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
X
XOR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 XOR reduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168