By convention, most Built-In Functions (BIFs) are seen as being
in this module. Some of the BIFs are viewed more
or less as part of the Erlang programming language and are
auto-imported. Thus, it is not necessary to specify the
module name. For example, the calls
Auto-imported BIFs are listed without module prefix. BIFs listed with module prefix are not auto-imported.
BIFs can fail for various reasons. All BIFs fail with
reason
Some BIFs can be used in guard tests and are marked with "Allowed in guard tests".
A binary data object, structured according to the Erlang external term format.
See
Time unit expressed in parts per second. That is,
the time unit equals
Symbolic representation of the time unit
represented by the integer
Symbolic representation of the time unit
represented by the integer
Symbolic representation of the time unit
represented by the integer
Symbolic representation of the time unit
represented by the integer
Symbolic representation of the native time unit used by the Erlang runtime system.
The
One can get an approximation of the
The value of the
The
Returns an integer or float that is the arithmetical
absolute value of
> abs(-3.33). 3.33 > abs(-3). 3
Allowed in guard tests.
Computes and returns the adler32 checksum for
Continues computing the adler32 checksum by combining
the previous checksum,
The following code:
X = erlang:adler32(Data1),
Y = erlang:adler32(X,Data2).
assigns the same value to
Y = erlang:adler32([Data1,Data2]).
Combines two previously computed adler32 checksums. This computation requires the size of the data object for the second checksum to be known.
The following code:
Y = erlang:adler32(Data1),
Z = erlang:adler32(Y,Data2).
assigns the same value to
X = erlang:adler32(Data1),
Y = erlang:adler32(Data2),
Z = erlang:adler32_combine(X,Y,iolist_size(Data2)).
Returns a new tuple that has one element more than
Example:
> erlang:append_element({one, two}, three). {one,two,three}
Calls a fun, passing the elements in
If the number of elements in the arguments are known at
compile time, the call is better written as
Earlier,
Returns the result of applying
Example:
> apply(lists, reverse, [[a, b, c]]). [c,b,a] > apply(erlang, atom_to_list, ['Erlang']). "Erlang"
If the number of arguments are known at compile time,
the call is better written as
Failure:
Returns a binary corresponding to the text
representation of
Example:
> atom_to_binary('Erlang', latin1). <<"Erlang">>
Returns a string corresponding to the text
representation of
> atom_to_list('Erlang'). "Erlang"
Extracts the part of the binary described by
Negative length can be used to extract bytes at the end of a binary, for example:
1> Bin = <<1,2,3,4,5,6,7,8,9,10>>.
2> binary_part(Bin,{byte_size(Bin), -5}).
<<6,7,8,9,10>>
Failure:
1> Bin = <<1,2,3>>
2> binary_part(Bin,{0,2}).
<<1,2>>
For details about the
Allowed in guard tests.
The same as
Allowed in guard tests.
Returns the atom whose text representation is
Examples:
> binary_to_atom(<<"Erlang">>, latin1). 'Erlang' > binary_to_atom(<<1024/utf8>>, utf8). ** exception error: bad argument in function binary_to_atom/2 called as binary_to_atom(<<208,128>>,utf8)
As
Failure:
Returns the float whose text representation is
> binary_to_float(<<"2.2017764e+0">>). 2.2017764
Failure:
Returns an integer whose text representation is
> binary_to_integer(<<"123">>). 123
Failure:
Returns an integer whose text representation in base
> binary_to_integer(<<"3FF">>, 16). 1023
Failure:
Returns a list of integers corresponding to the bytes of
As
The one-based indexing for binaries used by
this function is deprecated. New code is to use
Returns a list of integers corresponding to the bytes of
Returns an Erlang term that is the result of decoding
binary object
When decoding binaries from untrusted sources,
consider using
See also
As
Use this option when receiving binaries from an untrusted source.
When enabled, it prevents decoding data that can be used to
attack the Erlang system. In the event of receiving unsafe
data, decoding fails with a
This prevents creation of new atoms directly, creation of new atoms indirectly (as they are embedded in certain structures, such as process identifiers, refs, and funs), and creation of new external function references. None of those resources are garbage collected, so unchecked creation of them can exhaust available memory.
Failure:
See also
Returns an integer that is the size in bits of
> bit_size(<<433:16,3:3>>). 19 > bit_size(<<1,2,3>>). 24
Allowed in guard tests.
This implementation-dependent function increments the reduction counter for the calling process. In the Beam emulator, the reduction counter is normally incremented by one for each function and BIF call. A context switch is forced when the counter reaches the maximum number of reductions for a process (2000 reductions in OTP R12B).
This BIF can be removed in a future version of the Beam machine without prior warning. It is unlikely to be implemented in other Erlang implementations.
Returns an integer that is the number of bytes needed to
contain
Examples:
> byte_size(<<433:16,3:3>>). 3 > byte_size(<<1,2,3>>). 3
Allowed in guard tests.
Cancels a timer that has been created by
Available
Asynchronous request for cancellation.
Request information about the
If
If
More
If
If
The timer service that manages the timer may be co-located
with another scheduler than the scheduler that the calling
process is executing on. If this is the case, communication
with the timer service takes much longer time than if it
is located locally. If the calling process is in critical
path, and can do other things while waiting for the result
of this operation, or is not interested in the result of
the operation, you want to use option
See also
Cancels a timer. The same as calling
Returns
See also
The same as
Checks if the node local process identified by
The available
Determines if garbage collection is allowed when performing
the operation. If
The function
If
The process identified by
The process identified by
The operation was aborted, as the process needed to
be garbage collected to determine the operation result,
and the operation was requested
by passing option
See also
Failures:
Converts the
You may lose accuracy and precision when converting
between time units. In order to minimize such loss, collect all
data at
Computes and returns the crc32 (IEEE 802.3 style) checksum
for
Continues computing the crc32 checksum by combining
the previous checksum,
The following code:
X = erlang:crc32(Data1),
Y = erlang:crc32(X,Data2).
assigns the same value to
Y = erlang:crc32([Data1,Data2]).
Combines two previously computed crc32 checksums. This computation requires the size of the data object for the second checksum to be known.
The following code:
Y = erlang:crc32(Data1),
Z = erlang:crc32(Y,Data2).
assigns the same value to
X = erlang:crc32(Data1),
Y = erlang:crc32(Data2),
Z = erlang:crc32_combine(X,Y,iolist_size(Data2)).
Returns the current date as
The time zone and Daylight Saving Time correction depend on the underlying OS.
Example:
> date(). {1995,2,19}
Decodes the binary
If an entire packet is contained in
If
If the packet does not conform to the protocol format,
The following
No packet handling is done. The entire binary is returned unless it is empty.
Packets consist of a header specifying the number of bytes in the packet, followed by that number of bytes. The length of the header can be one, two, or four bytes; the order of the bytes is big-endian. The header is stripped off when the packet is returned.
A packet is a line terminated by a delimiter byte,
default is the latin1 newline character. The delimiter
byte is included in the returned packet unless the line
was truncated according to option
The header is not stripped off.
The meanings of the packet types are as follows:
The Hypertext Transfer Protocol. The packets
are returned with the format according to
Recognized request methods and header fields are returned
as atoms. Others are returned as strings. Strings of
unrecognized header fields are formatted with only
capital letters first and after hyphen characters, for
example,
The protocol type
The variants
The following options are available:
Sets the maximum allowed size of the packet body. If the packet header indicates that the length of the packet is longer than the maximum allowed length, the packet is considered invalid. Default is 0, which means no size limit.
For packet type
Option
For packet type
Examples:
> erlang:decode_packet(1,<<3,"abcd">>,[]). {ok,<<"abc">>,<<"d">>} > erlang:decode_packet(1,<<5,"abcd">>,[]). {more,6}
Returns a new tuple with element at
> erlang:delete_element(2, {one, two, three}). {one,three}
Makes the current code for
This BIF is intended for the code server (see
Failure:
If
Once
Prior to OTP release R11B (ERTS version 5.5)
Current behavior can be viewed as two combined operations: asynchronously send a "demonitor signal" to the monitored entity and ignore any future results of the monitor.
Failure: It is an error if
The returned value is
The available
Removes (one)
Calling
demonitor(MonitorRef),
receive
{_, MonitorRef, _, _, _} ->
true
after 0 ->
true
end
The returned value is one of the following:
If option
More options can be added in a future release.
Failures:
Forces the disconnection of a node. This appears to
the node
Returns
Prints a text representation of
This BIF is intended for debugging only.
Returns the
> element(2, {a, b, c}). b
Allowed in guard tests.
Returns the process dictionary and deletes it, for example:
> put(key1, {1, 2, 3}), put(key2, [a, b, c]), erase(). [{key1,{1,2,3}},{key2,[a,b,c]}]
Returns the value
Example:
> put(key1, {merry, lambs, are, playing}), X = erase(key1), {X, erase(key1)}. {{merry,lambs,are,playing},undefined}
Stops the execution of the calling process with the reason
Example:
> catch error(foobar). {'EXIT',{foobar,[{erl_eval,do_apply,5}, {erl_eval,expr,5}, {shell,exprs,6}, {shell,eval_exprs,6}, {shell,eval_loop,3}]}}
Stops the execution of the calling process with the reason
Stops the execution of the calling process with exit reason
Example:
> exit(foobar). ** exception exit: foobar > catch exit(foobar). {'EXIT',foobar}
Sends an exit signal with exit reason
The following behavior applies if
If
If
Calculates, without doing the encoding, the maximum byte size for a term encoded in the Erlang external term format. The following condition applies always:
> Size1 = byte_size(term_to_binary(Term )), > Size2 = erlang:external_size(Term ), > true = Size1 =< Size2. true
This is equivalent to a call to:
erlang:external_size(Term , [])
Calculates, without doing the encoding, the maximum byte size for a term encoded in the Erlang external term format. The following condition applies always:
> Size1 = byte_size(term_to_binary(Term ,Options )), > Size2 = erlang:external_size(Term ,Options ), > true = Size1 =< Size2. true
Option
Returns a float by converting
> float(55). 55.0
Allowed in guard tests.
If used on the top level in a guard, it tests whether the
argument is a floating point number; for clarity, use
When
The same as
Returns a binary corresponding to the text
representation of
Examples:
> float_to_binary(7.12, [{decimals, 4}]). <<"7.1200">> > float_to_binary(7.12, [{decimals, 4}, compact]). <<"7.12">>
The same as
Returns a string corresponding to the text representation
of
Examples:
> float_to_list(7.12, [{decimals, 4}]). "7.1200" > float_to_list(7.12, [{decimals, 4}, compact]). "7.12"
Returns a list with information about the fun
This BIF is mainly intended for debugging, but it can sometimes be useful in library functions that need to verify, for example, the arity of a fun.
Two types of funs have slightly different semantics:
The following elements are always present in the list for both local and external funs:
If
If
If
If
The following elements are only present in the list if
Returns information about
For any fun,
For a local fun,
See
Returns a string corresponding to the text
representation of
Returns
This function used to return false for built-in functions before the 18.0 release.
Forces an immediate garbage collection of the executing process. The function is not to be used unless it has been noticed (or there are good reasons to suspect) that the spontaneous garbage collection will occur too late or not at all.
Improper use can seriously degrade system performance.
The same as
Garbage collects the node local process identified by
The available
If
Notice that the same caveats apply as for
Failures:
Returns the process dictionary as a list of
> put(key1, merry), put(key2, lambs), put(key3, {are, playing}), get(). [{key1,merry},{key2,lambs},{key3,{are,playing}}]
Returns the value
Example:
> put(key1, merry), put(key2, lambs), put({any, [valid, term]}, {are, playing}), get({any, [valid, term]}). {are,playing}
Returns the magic cookie of the local node if the node is
alive, otherwise the atom
Returns a list of keys all keys present in the process dictionary.
> put(dog, {animal,1}), put(cow, {animal,2}), put(lamb, {animal,3}), get_keys(). [dog,cow,lamb]
Returns a list of keys that are associated with the value
> put(mary, {1, 2}), put(had, {1, 2}), put(a, {1, 2}), put(little, {1, 2}), put(dog, {1, 3}), put(lamb, {1, 2}), get_keys({1, 2}). [mary,had,a,little,lamb]
Gets the call stack back-trace (stacktrace) of the
last exception in the calling process as a list of
If there has not been any exceptions in a process, the
stacktrace is
The stacktrace is the same data as the
See also
Returns the process identifier of the group leader for the process evaluating the function.
Every process is a member of some process group and all
groups have a group leader. All I/O from the group
is channeled to the group leader. When a new process is
spawned, it gets the same group leader as the spawning
process. Initially, at system start-up,
Sets the group leader of
See also
The same as
Example:
> halt(). os_prompt%
The same as
Example:
> halt(17). os_prompt% echo $? 17 os_prompt%
On many platforms, the OS supports only status codes 0-255.
For integer
For statuses
Returns a hash value for
This BIF is deprecated, as the hash value can differ on
different architectures. The hash values for integer
terms higher than 2^27 and large binaries are
poor. The BIF is retained for backward compatibility
reasons (it can have been used to hash records into a file),
but all new code is to use one of the BIFs
Returns the head of
> hd([1,2,3,4,5]). 1
Allowed in guard tests.
Failure:
Puts the calling process into a wait state where its memory allocation has been reduced as much as possible. This is useful if the process does not expect to receive any messages soon.
The process is awaken when a message is sent to it, and control
resumes in
If the process has any message in its message queue, the process is awakened immediately in the same way as described earlier.
In more technical terms, what
If the size of the live data in the process is less than the minimum heap size, the first garbage collection occurring after the process is awakened ensures that the heap size is changed to a size not smaller than the minimum heap size.
Notice that emptying the call stack means that any surrounding
Returns a new tuple with element
Example:
> erlang:insert_element(2, {one, two, three}, new). {one,new,two,three}
Returns a binary corresponding to the text
representation of
> integer_to_binary(77). <<"77">>
Returns a binary corresponding to the text
representation of
> integer_to_binary(1023, 16). <<"3FF">>
Returns a string corresponding to the text
representation of
> integer_to_list(77). "77"
Returns a string corresponding to the text
representation of
> integer_to_list(1023, 16). "3FF"
Returns a binary that is made from the integers and
binaries in
> Bin1 = <<1,2,3>>. <<1,2,3>> > Bin2 = <<4,5>>. <<4,5>> > Bin3 = <<6>>. <<6>> > iolist_to_binary([Bin1,1,[2,3,Bin2],4|Bin3]). <<1,2,3,1,2,3,4,5,4,6>>
Returns an integer that is the size in bytes
of the binary that would be the result of
> iolist_size([1,2|<<3,4>>]). 4
Returns
Returns
Allowed in guard tests.
Returns
A binary always contains a complete number of bytes.
Allowed in guard tests.
Returns
Allowed in guard tests.
Returns
Allowed in guard tests.
This BIF is useful for builders of cross-reference tools.
Returns
Returns
Allowed in guard tests.
Returns
Allowed in guard tests.
Returns
Allowed in guard tests.
Returns
Allowed in guard tests.
Returns
Allowed in guard tests.
Returns
Allowed in guard tests.
Returns
Allowed in guard tests.
Returns
Allowed in guard tests.
Returns
Allowed in guard tests.
Returns
Returns
Normally the compiler treats calls to
Allowed in guard tests, if
Returns
Allowed in guard tests if
This BIF is documented for completeness. Usually
Returns
Allowed in guard tests.
Returns
Allowed in guard tests.
Returns the length of
> length([1,2,3,4,5,6,7,8,9]). 9
Allowed in guard tests.
Creates a link between the calling process and another
process (or port)
If
Returns the atom whose text representation is
Example:
> list_to_atom("Erlang"). 'Erlang'
Returns a binary that is made from the integers and
binaries in
> Bin1 = <<1,2,3>>. <<1,2,3>> > Bin2 = <<4,5>>. <<4,5>> > Bin3 = <<6>>. <<6>> > list_to_binary([Bin1,1,[2,3,Bin2],4|Bin3]). <<1,2,3,1,2,3,4,5,4,6>>
Returns a bitstring that is made from the integers and
bitstrings in
Example:
> Bin1 = <<1,2,3>>. <<1,2,3>> > Bin2 = <<4,5>>. <<4,5>> > Bin3 = <<6,7:4>>. <<6,7:4>> > list_to_bitstring([Bin1,1,[2,3,Bin2],4|Bin3]). <<1,2,3,1,2,3,4,5,4,6,7:4>>
Returns the atom whose text representation is
Failure:
Returns the float whose text representation is
> list_to_float("2.2017764e+0"). 2.2017764
Failure:
Returns an integer whose text representation is
> list_to_integer("123"). 123
Failure:
Returns an integer whose text representation in base
> list_to_integer("3FF", 16). 1023
Failure:
Returns a process identifier whose text representation is a
> list_to_pid("<0.4.1>"). <0.4.1>
Failure:
This BIF is intended for debugging and is not to be used in application programs.
Returns a tuple corresponding to
> list_to_tuple([share, ['Ericsson_B', 163]]). {share, ['Ericsson_B', 163]}
If
Returns either
The object code in
This BIF is intended for the code server (see
Before OTP R14B, NIFs were an
experimental feature. Versions before OTP R14B can
have different and possibly incompatible NIF semantics and
interfaces. For example, in OTP R13B03 the return value on
failure was
Loads and links a dynamic library containing native
implemented functions (NIFs) for a module.
The call to
Returns a list of all loaded Erlang modules (current and old code), including preloaded modules.
See also
Returns the current local date and time,
> erlang:localtime(). {{1996,11,6},{14,45,17}}
The time zone and Daylight Saving Time correction depend on the underlying OS.
Converts local date and time to Universal Time Coordinated
(UTC), if supported by the underlying OS. Otherwise
no conversion is done and
Example:
> erlang:localtime_to_universaltime({{1996,11,6},{14,45,17}}). {{1996,11,6},{13,45,17}}
Failure:
Converts local date and time to Universal Time Coordinated
(UTC) as
If
Examples:
> erlang:localtime_to_universaltime({{1996,11,6},{14,45,17}}, true). {{1996,11,6},{12,45,17}} > erlang:localtime_to_universaltime({{1996,11,6},{14,45,17}}, false). {{1996,11,6},{13,45,17}} > erlang:localtime_to_universaltime({{1996,11,6},{14,45,17}}, undefined). {{1996,11,6},{13,45,17}}
Failure:
Returns a
Known issue: When a node is restarted multiple times with the same node name, references created on a newer node can be mistaken for a reference created on an older node with the same node name.
Creates a new tuple of the given
> erlang:make_tuple(4, []). {[],[],[],[]}
Creates a tuple of size
Example:
> erlang:make_tuple(5, [], [{2,ignored},{5,zz},{2,aa}]). {{[],aa,[],[],zz}
Returns an integer, which is the number of key-value pairs
in
> map_size(#{a=>1, b=>2, c=>3}). 3
Allowed in guard tests.
Returns the largest of
Computes an MD5 message digest from
For more information about MD5, see RFC 1321 - The MD5 Message-Digest Algorithm.
The MD5 Message-Digest Algorithm is not considered safe for code-signing or software-integrity purposes.
Finishes the update of an MD5
Creates an MD5 context, to be used in subsequent calls to
Updates an MD5
Returns a list with information about memory
dynamically allocated by the Erlang emulator. Each list
element is a tuple
The memory types are as follows:
The total amount of memory currently allocated. This is
the same as the sum of the memory size for
The total amount of memory currently allocated for the Erlang processes.
The total amount of memory currently used by the Erlang
processes. This is part of the memory presented as
The total amount of memory currently allocated for
the emulator that is not directly related to any Erlang
process. Memory presented as
The total amount of memory currently allocated for atoms.
This memory is part of the memory presented as
The total amount of memory currently used for atoms.
This memory is part of the memory presented as
The total amount of memory currently allocated for
binaries. This memory is part of the memory presented
as
The total amount of memory currently allocated for
Erlang code. This memory is part of the memory presented
as
The total amount of memory currently allocated for ets
tables. This memory is part of the memory presented as
Only on 64-bit halfword emulator. The total amount of memory allocated in low memory areas that are restricted to less than 4 GB, although the system can have more memory.
Can be removed in a future release of the halfword emulator.
The maximum total amount of memory allocated since the emulator was started. This tuple is only present when the emulator is run with instrumentation.
For information on how to run the emulator with
instrumentation, see
The
When the emulator is run with instrumentation,
the
As the
The different amounts of memory that are summed are not gathered atomically, which introduces an error in the result.
The different values have the following relation to each other. Values beginning with an uppercase letter is not part of the result.
total = processes + system
processes = processes_used + ProcessesNotUsed
system = atom + binary + code + ets + OtherSystem
atom = atom_used + AtomNotUsed
RealTotal = processes + RealSystem
RealSystem = system + MissedSystem
More tuples in the returned list can be added in a future release.
The
Furthermore, because of fragmentation and prereservation of memory areas, the size of the memory segments containing the dynamically allocated memory blocks can be much larger than the total size of the dynamically allocated memory blocks.
As from
Failure:
Returns the memory size in bytes allocated for memory of
type
As from
Failures:
See also
Returns the smallest of
Returns
This BIF is intended for the code server (see
Send a monitor request of type
{Tag, MonitorRef , Type , Object, Info}
The monitor request is an asynchronous signal. That is, it takes time before the signal reaches its destination.
Valid
Monitor the existence of the process identified by
The process identifier of the process to monitor.
A tuple consisting of a registered name of a process and
a node name. The process residing on the node
The process locally registered as
When a registered name is used, the process that has the registered name when the monitor request reach its destination will be monitored. The monitor is not effected if the registered name is unregistered, or unregistered and later registered on another process.
The monitor is triggered either when the monitored process terminates, is non existing, or if the connection to it is lost. In the case the connection to it is lost, we do not know if it still exist or not. After this type of monitor has been triggered, the monitor is automatically removed.
When the monitor is triggered a
{'DOWN', MonitorRef, Type, Object, Info}
Here
equals:
Either the exit reason of the process,
The monitoring is turned off when the
If an attempt is made to monitor a process on an older node
(where remote process monitoring is not implemented or
where remote process monitoring by registered name is not
implemented), the call fails with
The format of the
Monitor changes in
The monitor is triggered when the time offset is changed.
This either if the time offset value is changed, or if the
offset is changed from preliminary to final during
If the runtime system is in
The monitor will not be automatically removed after it has been triggered. That is, repeated changes of the time offset will trigger the monitor repeatedly.
When the monitor is triggered a
{'CHANGE', MonitorRef, Type, Item, NewTimeOffset}
where
When the
Making several calls to
The monitor functionality is expected to be extended. That is,
other
If or when
Monitors the status of the node
Making several calls to
If
Nodes connected through hidden connections can be monitored as any other nodes.
Failure:
Behaves as
Option
Failure:
Returns the current
This is a
Different runtime system instances will use different
unspecified points in time as base for their Erlang monotonic clocks.
That is, it is pointless comparing monotonic times from
different runtime system instances. Different runtime system instances
may also place this unspecified point in time different relative
runtime system start. It may be placed in the future (time at start
is a negative value), the past (time at start is a
positive value), or the runtime system start (time at start is
zero). The monotonic time at runtime system start can be
retrieved by calling
Returns the current
Same as calling
Works exactly like
Works exactly like
Returns the name of the local node. If the node is not alive,
Allowed in guard tests.
Returns the node where
Allowed in guard tests.
Returns a list of all visible nodes in the system, except
the local node. Same as
Returns a list of nodes according to the argument given. The returned result when the argument is a list, is the list of nodes satisfying the disjunction(s) of the list elements.
Nodes connected to this node through normal connections.
Nodes connected to this node through hidden connections.
All nodes connected to this node.
This node.
Nodes that are known to this node. That is, connected
nodes and nodes referred to by process identifiers, port
identifiers and references located on this node.
The set of known nodes is garbage collected. Notice that
this garbage collection can be delayed. For more
information, see
Some equalities:
This function is deprecated! Do not use it!
See the users guide chapter
Returns the tuple
Can only be used to check the local time of day if the time-zone information of the underlying OS is properly configured.
Returns a port identifier as the result of opening a new Erlang port. A port can be seen as an external Erlang process.
The name of the executable as well as the arguments
given in
The characters in the name (if given as a list) can only be higher than 255 if the Erlang Virtual Machine is started in Unicode file name translation mode. Otherwise the name of the executable is limited to the ISO-latin-1 character set.
Starts an external program.
When starting external programs on Solaris, the system
call
For external programs,
Works like
Works like
The shell is usually not invoked to start the
program, it is executed directly.
Only if a shell script or
If
Allows an Erlang process to access any currently opened
file descriptors used by Erlang. The file descriptor
Messages are preceded by their length, sent in
Output messages are sent without packet lengths. A user-defined protocol must be used between the Erlang process and the external object.
Messages are delivered on a per line basis. Each line
(delimited by the OS-dependent new line sequence) is
delivered in a single message. The message data format
is
The
Only valid for
Only valid for
Only valid for
The arguments are not expanded by the shell before
being supplied to the executable. Most notably this
means that file wild card expansion does not happen.
To expand wild cards for the arguments, use
The executable name (also known as
If you explicitly want to set the
program name in the argument vector, option
Only valid for
Only valid for
When the external process connected to the port exits, a
message of the form
If option
If the port program closes its
Only valid for
The opposite of
Affects ports to external programs. The executed program
gets its standard error file redirected to its standard
output file.
Affects ports to external programs on Windows only. The
standard input and standard output handles of the port program
are, if this option is supplied, opened with flag
The port can only be used for input.
The port can only be used for output.
All I/O from the port is binary data objects as opposed to lists of bytes.
The port is not closed at the end of the file and does not
produce an exit signal. Instead, it remains open and
a
When running on Windows, suppresses creation of a new console window when spawning the port program. (This option has no effect on other platforms.)
Sets scheduler hint for port parallelism. If set to
Default is
Failure: If the port cannot be opened, the exit reason is
During use of a port opened using
The maximum number of ports that can be open at the same
time can be configured by passing command-line flag
Portable hash function that gives the same hash for
the same Erlang term regardless of machine architecture and
This BIF can be used instead of the old deprecated BIF
Portable hash function that gives the same hash for
the same Erlang term regardless of machine architecture and
This BIF is always to be used for hashing terms. It
distributes small integers better than
Notice that the range
Returns a string corresponding to the text
representation of
This BIF is intended for debugging and is not to be used in application programs.
Closes an open port. Roughly the same as
For comparison:
Notice that any process can close a port using
As from OTP R16,
Failure:
Sends data to a port. Same as
For comparison:
Notice that any process can send to a port using
If the port is busy, the calling process is suspended until the port is not busy any more.
As from OTP-R16,
Failures:
Sends data to a port.
If the port command is aborted,
If the port is busy, the calling process is suspended until the port is not busy any more.
The following
More options can be added in a future release.
Failures:
Sets the port owner (the connected port) to
The error behavior differs, see the following.
The port does not reply with
The new port owner gets linked to the port.
The old port owner stays linked to the port and must call
For comparison:
Notice that any process can set the port owner using
As from OTP-R16,
Failures:
Performs a synchronous control operation on a port.
The meaning of
Returns a list of integers in the range 0..255, or a binary, depending on the port driver. The meaning of the returned data also depends on the port driver.
Failures:
Performs a synchronous call to a port. The meaning of
Returns a term from the driver. The meaning of the returned data also depends on the port driver.
Failures:
Returns a list containing tuples with information about
The result contains information about the following
For more information about the different
Failure:
If the port identified by
Failure:
If the port identified by
Failure:
If the port identified by
Failure:
If the port identified by
Failure:
Notice that these results are highly implementation-specific and can change in a future release.
If the port identified by
Failure:
If the port identified by
Failure:
If the port identified by
Failure:
If the port identified by
Failure:
If the port identified by
Failure:
If the port identified by
Failure:
If the port identified by
Failure:
If the port identified by
Failure:
Returns a string corresponding to the text
representation of the port identifier
This BIF is intended for debugging. It is not to be used in application programs.
Returns a list of port identifiers corresponding to all the ports existing on the local node.
Notice that an exiting port exists, but is not open.
Returns a list of Erlang modules that are preloaded in
the system. As all loading of code is done through the file
system, the file system must have been loaded previously.
Hence, at least the module
Writes information about the local process
When
Returns the old value of the flag.
See also
Used by a process to redefine the error handler for undefined function calls and undefined registered processes. Inexperienced users are not to use this flag, as code auto-loading depends on the correct operation of the error handling module.
Returns the old value of the flag.
Changes the minimum heap size for the calling process.
Returns the old value of the flag.
Changes the minimum binary virtual heap size for the calling process.
Returns the old value of the flag.
Priority level
Internally in each priority level, processes are scheduled in a round robin fashion.
Execution of processes on priority
When there are runnable processes on priority
When there are runnable processes on priority
Scheduling is preemptive. Regardless of priority, a process is preempted when it has consumed more than a certain number of reductions since the last time it was selected for execution.
Do not depend on the scheduling to remain exactly as it is today. Scheduling, at least on the runtime system with SMP support, is likely to be changed in a future release to use available processor cores better.
There is no automatic mechanism for avoiding priority inversion, such as priority inheritance or priority ceilings. When using priorities, take this into account and handle such scenarios by yourself.
Making calls from a
Other priorities than
Returns the old value of the flag.
If
Returns the old value of the flag.
Sets or clears flag
Features that are disabled include (but are not limited to) the following:
Stack back-traces cannot be displayed for the process.
In crash dumps, the stack, messages, and the process dictionary are omitted.
If
Returns the old value of the flag.
Sets certain flags for the process
Failure:
Returns a list containing
The order of the
The
If the process identified by
For information about specific
This BIF is intended for debugging only. For
all other purposes, use
Failure:
Returns information about the process identified by
If the process is alive and a single
If
If
The following
Binary
Returns the current call stack back-trace (stacktrace)
of the process. The stack has the same format as returned by
The value is
A list of process identifiers monitoring the process (with
A list of monitors (started by
Notice that
Notice that not all implementations support all
these
Failures:
Returns a list of process identifiers corresponding to all the processes currently existing on the local node.
Notice that an exiting process exists, but is not alive.
That is,
Example:
> processes(). [<0.0.0>,<0.2.0>,<0.4.0>,<0.5.0>,<0.7.0>,<0.8.0>]
Removes old code for
This BIF is intended for the code server (see
Failure:
Adds a new
Example:
> X = put(name, walrus), Y = put(name, carpenter), Z = get(name), {X, Y, Z}. {undefined,walrus,carpenter}
The values stored when
Stops the execution of the calling process with an exception of given class, reason, and call stack backtrace (stacktrace).
This BIF is intended for debugging. Avoid to use it in applications, unless you really know what you are doing.
Element
The stacktrace is used as the exception stacktrace for the calling process; it is truncated to the current maximum stacktrace depth.
Since evaluating this function causes the process to
terminate, it has no return value unless the arguments are
invalid, in which case the function returns the error
reason
Read the state of a timer that has been created by either
Available
Asynchronous request for state information.
More
If
If
The timer service that manages the timer may be co-located
with another scheduler than the scheduler that the calling
process is executing on. If this is the case, communication
with the timer service takes much longer time than if it
is located locally. If the calling process is in critical
path, and can do other things while waiting for the result
of this operation, you want to use option
See also
Read the state of a timer. The same as calling
Returns a string corresponding to the text
representation of
This BIF is intended for debugging and is not to be used in application programs.
Associates the name
Example:
> register(db, Pid). true
Failures:
Returns a list of names that have been registered using
> registered(). [code_server, file_server, init, user, my_db]
Decreases the suspend count on the process identified by
This BIF is intended for debugging only.
Failures:
Returns an integer by rounding
round(5.5). 6
Allowed in guard tests.
Returns the process identifier of the calling process, for example:
> self(). <0.26.0>
Allowed in guard tests.
Sends a message and returns
Either sends a message and returns
The options are as follows:
If the sender would have to be suspended to do the send,
If the destination node would have to be auto-connected
to do the send,
As with
Starts a timer. When the timer expires, the message
Starts a timer. The same as calling
The same as
This function is intended for send operations to an
unreliable remote node without ever blocking the sending
(Erlang) process. If the connection to the remote node
(usually not a real Erlang node, but a node written in C or
Java) is overloaded, this function does not send the message
and returns
The same occurs if
This function is only to be used in rare circumstances
where a process communicates with Erlang nodes that can
disappear without any trace, causing the TCP buffers and
the drivers queue to be over-full before the node is
shut down (because of tick time-outs) by
Notice that ignoring the return value from this function would
result in an unreliable message passing, which is
contradictory to the Erlang programming model. The message is
not sent if this function returns
In many systems, transient states of
overloaded queues are normal. The fact that this function
returns
Use with extreme care.
The same as
This function behaves like
Whenever the function returns
Use with extreme care.
Sets the magic cookie of
Failure:
Returns a tuple that is a copy of argument
> setelement(2, {10, green, bottles}, red). {10,red,bottles}
Returns the number of elements in a tuple or the number of bytes in a binary or bitstring, for example:
> size({morni, mulle, bwange}). 3 > size(<<11, 22, 33>>). 3
For bitstrings the number of whole bytes is returned. That is, if the number of bits in the bitstring is not divisible by 8, the resulting number of bytes is rounded down.
Allowed in guard tests.
See also
Returns the process identifier of a new process started by the
application of
Returns the process identifier of a new process started
by the application of
Returns the process identifier of a new process started by
the application of
Example:
> spawn(speed, regulator, [high_speed, thin_cut]). <0.13.1>
Returns the process identifier (pid) of a new process started
by the application
of
Returns the process identifier of a new process started by
the application of
Returns the process identifier (pid) of a new process started
by the application of
Returns the process identifier of a new process started by
the application of
Returns the process identifier (pid) of a new process
started by the application
of
Returns the process identifier of a new process, started by
the application of
A new process is started by the application
of
Returns the process identifier (pid) of a new process
started by the application of
If option
Returns the process identifier (pid) of a new process started
by the application of
Works as
If option
The options are as follows:
Sets a link to the parent process (like
Monitors the new process (like
Sets the priority of the new process. Equivalent to
executing
Useful only for performance tuning. Do not use this option unless you know that there is problem with execution times or memory consumption, and ensure that the option improves matters.
The Erlang runtime system uses a generational garbage collection scheme, using an "old heap" for data that has survived at least one garbage collection. When there is no more room on the old heap, a fullsweep garbage collection is done.
Option
A few cases when it can be useful to change
Useful only for performance tuning. Do not use this option unless you know that there is problem with execution times or memory consumption, and ensure that the option improves matters.
Gives a minimum heap size, in words. Setting this value
higher than the system default can speed up some
processes because less garbage collection is done.
However, setting a too high value can waste memory and
slow down the system because of worse data locality.
Therefore, use this option only for
fine-tuning an application and to measure the execution
time with various
Useful only for performance tuning. Do not use this option unless you know that there is problem with execution times or memory consumption, and ensure that the option improves matters.
Gives a minimum binary virtual heap size, in words.
Setting this value
higher than the system default can speed up some
processes because less garbage collection is done.
However, setting a too high value can waste memory.
Therefore, use this option only for
fine-tuning an application and to measure the execution
time with various
Returns the process identifier (pid) of a new process started
by the application
of
Option
Returns a tuple containing the binaries that are the result
of splitting
Example:
> B = list_to_binary("0123456789"). <<"0123456789">> > byte_size(B). 10 > {B1, B2} = split_binary(B,3). {<<"012">>,<<"3456789">>} > byte_size(B1). 3 > byte_size(B2). 7
Starts a timer. When the timer expires, the message
Available
This is the default. It means the
Absolute
More
The absolute point in time, the timer is set to expire on,
has to be in the interval
If
If
See also
Failure:
Starts a timer. The same as calling
Returns the total number of context switches since the system started.
Returns the number of exact reductions.
Returns information about garbage collection, for example:
> statistics(garbage_collection). {85,23961,0}
This information can be invalid for some implementations.
Returns
Returns information about reductions, for example:
> statistics(reductions). {2046,11}
As from
Returns the total length of run-queues, that is, the number of processes that are ready to run on all available run-queues.
Returns information about runtime, in milliseconds.
This is the sum of the runtime for all threads in the Erlang runtime system and can therefore be greater than the wall clock time.
Example:
> statistics(runtime). {1690,1620}
Returns a list of tuples with
The definition of a busy scheduler is when it is not idle and is not scheduling (selecting) a process or port, that is:
Notice that a scheduler can also be busy even if the OS has scheduled out the scheduler thread.
Returns
The list of scheduler information is unsorted and can appear in different order between calls.
Using
> erlang:system_flag(scheduler_wall_time, true). false > Ts0 = lists:sort(erlang:statistics(scheduler_wall_time)), ok. ok
Some time later the user takes another snapshot and calculates scheduler-utilization per scheduler, for example:
> Ts1 = lists:sort(erlang:statistics(scheduler_wall_time)), ok. ok > lists:map(fun({{I, A0, T0}, {I, A1, T1}}) -> {I, (A1 - A0)/(T1 - T0)} end, lists:zip(Ts0,Ts1)). [{1,0.9743474730177548}, {2,0.9744843782751444}, {3,0.9995902361669045}, {4,0.9738012596572161}, {5,0.9717956667018103}, {6,0.9739235846420741}, {7,0.973237033077876}, {8,0.9741297293248656}]
Using the same snapshots to calculate a total scheduler-utilization:
> {A, T} = lists:foldl(fun({{_, A0, T0}, {_, A1, T1}}, {Ai,Ti}) -> {Ai + (A1 - A0), Ti + (T1 - T0)} end, {0, 0}, lists:zip(Ts0,Ts1)), A/T. 0.9769136803764825
Returns information about wall clock.
Increases the suspend count on the process identified by
A process can be suspended by multiple processes and can
be suspended multiple times by a single process. A suspended
process does not leave the suspended state until its suspend
count reaches zero. The suspend count of
The options (
If the suspend count on the process identified by
This BIF is intended for debugging only.
Failures:
Suspends the process identified by
This BIF is intended for debugging only.
Sets the maximum depth of call stack back-traces in the
exit reason element of
Returns the old value of the flag.
When this argument is removed, a final CPU topology to use is determined at emulator boot time.
Sets the user-defined
Returns the old value of the flag.
The CPU topology is used when binding schedulers to logical processors. If schedulers are already bound when the CPU topology is changed, the schedulers are sent a request to rebind according to the new CPU topology.
The user-defined CPU topology can also be set by passing
command-line argument
For information on type
Returns the old value of the flag.
The number of dirty CPU schedulers online can change if the
number of schedulers online changes. For example, if 12
schedulers and 6 dirty CPU schedulers are online, and
The dirty schedulers functionality is experimental. Enable support for dirty schedulers when building OTP to try out the functionality.
For more information, see
Sets system flag
Returns the old value of the flag.
In low-memory systems (especially without virtual
memory), setting the value to
This value can also be set through (OS)
environment variable
Sets the default minimum heap size for processes. The size
is given in words. The new
Returns the old value of the flag.
Sets the default minimum binary virtual heap size for
processes. The size is given in words.
The new
Returns the old value of the flag.
If
One process can block multi-scheduling multiple times. If a process has blocked multiple times, it must unblock exactly as many times as it has blocked before it has released its multi-scheduling block. If a process that has blocked multi-scheduling exits, it releases its blocking of multi-scheduling.
The return values are
Blocking of multi-scheduling is normally not needed. If you feel that you need to block multi-scheduling, consider it a few more times again. Blocking multi-scheduling is only to be used as a last resort, as it is most likely a very inefficient way to solve the problem.
See also
Controls if and how schedulers are bound to logical processors.
When
If a scheduler fails to bind, this is often silently
ignored, as it is not always possible to verify valid
logical processor identifiers. If an error is reported,
it is reported to
Schedulers can be bound on newer Linux, Solaris, FreeBSD, and Windows systems, but more systems will be supported in future releases.
In order for the runtime system to be able to bind schedulers,
the CPU topology must be known. If the runtime system fails
to detect the CPU topology automatically, it can be defined.
For more information on how to define the CPU topology, see
command-line flag
The runtime system does by default not bind schedulers to logical processors.
If the Erlang runtime system is the only OS process binding threads to logical processors, this improves the performance of the runtime system. However, if other OS processes (for example, another Erlang runtime system) also bind threads to logical processors, there can be a performance penalty instead. Sometimes this performance penalty can be severe. If so, it is recommended to not bind the schedulers.
Schedulers can be bound in different ways. Argument
Same as command-line argument
Same as command-line argument
Same as command-line argument
Same as command-line argument
Same as command-line argument
Same as command-line argument
Same as command-line argument
Same as command-line argument
Same as command-line argument
The returned value equals
Failures:
If binding of schedulers is not supported.
If
If CPU topology information is unavailable.
The scheduler bind type can also be set by passing
command-line argument
For more information, see
For more information, see
Returns the old value of the flag.
If the emulator was built with support for
For more information, see
Sets the value of the node trace control word to
Returns the old value of the flag.
Returns the old state identifier. That is:
If
If
If
Returns various information about the allocators of the
current system (emulator) as specified by
Returns a list of tuples with information about miscellaneous allocated memory areas.
Each tuple contains an atom describing the type of memory as first element and the amount of allocated memory in bytes as second element. When information about allocated and used memory is present, also a third element is present, containing the amount of used memory in bytes.
Notice that the sum of these values is not
the total amount of memory allocated by the emulator.
Some values are part of other values, and some memory
areas are not part of the result. For information about
the total amount of memory allocated by the emulator, see
Returns
See also "System Flags Effecting erts_alloc" in
Returns a list of the names of all allocators using
the
Returns information about the specified allocator.
As from
Notice that the information returned is highly implementation-dependent and can be changed or removed at any time without prior notice. It was initially intended as a tool when developing new allocators, but as it can be of interest for others it has been briefly documented.
The recognized allocators are listed in
If only one value is present, it is the current value.
Returns various size information for the specified
allocator. The information returned is a subset of the
information returned by
Returns various information about the CPU topology of
the current system (emulator) as specified by
Returns the
A level in term
Returns the user-defined
Returns the automatically detected
For more information, see argument
Returns
Returns various information about the current system
(emulator) as specified by
See
Returns an atom describing the build type of the runtime
system. This is normally the atom
Returns a two-tuple describing the C compiler used when
compiling the runtime system. The first element is an
atom describing the name of the compiler, or
Returns a list containing miscellaneous information about the emulators internal I/O checking. Notice that the content of the returned list can vary between platforms and over time. It is only guaranteed that a list is returned.
Returns the compatibility mode of the local node as
an integer. The integer returned represents the
Erlang/OTP release that the current emulator has been
set to be backward compatible with. The compatibility
mode can be configured at startup by using command-line flag
See
Returns the creation of the local node as an integer.
The creation is changed when a node is restarted. The
creation of a node is stored in process identifiers, port
identifiers, and references. This makes it (to some
extent) possible to distinguish between identifiers from
different incarnations of a node. The valid
creations are integers in the range 1..3, but this will
probably change in a future release. If the node is not
alive,
Returns
Returns the amount of time in seconds garbage collection
of an entry in a node table is delayed. This limit can be set
on startup by passing the command line flag
Returns the number of dirty CPU scheduler threads used by the emulator. Dirty CPU schedulers execute CPU-bound native functions, such as NIFs, linked-in driver code, and BIFs that cannot be managed cleanly by the normal emulator schedulers.
The number of dirty CPU scheduler threads is determined
at emulator boot time and cannot be changed after that.
However, the number of dirty CPU scheduler threads online
can be changed at any time. The number of dirty CPU
schedulers can be set at startup by passing
command-line flag
Notice that the dirty schedulers functionality is experimental. Enable support for dirty schedulers when building OTP to try out the functionality.
See also
Returns the number of dirty CPU schedulers online.
The return value satisfies
The number of dirty CPU schedulers online can be set at
startup by passing command-line flag
Notice that the dirty schedulers functionality is experimental. Enable support for dirty schedulers when building OTP to try out the functionality.
For more information, see
Returns the number of dirty I/O schedulers as an integer. Dirty I/O schedulers execute I/O-bound native functions, such as NIFs and linked-in driver code, which cannot be managed cleanly by the normal emulator schedulers.
This value can be set at startup by passing command-line
argument
Notice that the dirty schedulers functionality is experimental. Enable support for dirty schedulers when building OTP to try out the functionality.
For more information, see
Returns a binary containing a string of distribution
information formatted as in Erlang crash dumps. For more
information, see Section
Returns the value of the distribution buffer busy limit
in bytes. This limit can be set at startup by passing
command-line flag
Returns a list of tuples
Returns a string containing the Erlang driver version
used by the runtime system. It has the form
Returns an atom describing the dynamic trace framework
compiled into the virtual machine. It can be
Returns a
The last
This option will be removed in a future release.
The return value will always be
Returns the value of the
Returns the maximum number of ETS tables allowed. This
limit can be increased at startup by passing
command-line flag
Returns
Returns a list describing the default garbage collection
settings. A process spawned on the local node by a
Returns a list of integers representing valid heap sizes in words. All Erlang heaps are sized from sizes in this list.
Returns the heap type used by the current emulator. One heap type exists:
Each process has a heap reserved for its use and no references between heaps of different processes are allowed. Messages passed between processes are copied between heaps.
Returns a binary containing a string of miscellaneous
system information formatted as in Erlang crash dumps.
For more information, see Section
Returns
Returns a binary containing a string of loaded module
information formatted as in Erlang crash dumps. For more
information, see Section
Returns the detected number of logical processors configured
in the system. The return value is either an integer, or
the atom
Returns the detected number of logical processors available
to the Erlang runtime system. The return value is either an
integer, or the atom
Returns the detected number of logical processors online on
the system. The return value is either an integer,
or the atom
Returns a string containing the Erlang machine name.
Returns
Returns
Returns the modified timing-level (an integer) if
modified timing is enabled, otherwise,
Returns
The emulator has only one scheduler thread. The emulator does not have SMP support, or have been started with only one scheduler thread.
The emulator has more than one scheduler thread, but all scheduler threads except one are blocked, that is, only one scheduler thread schedules Erlang processes and executes Erlang code.
The emulator has more than one scheduler thread, and no scheduler threads are blocked, that is, all available scheduler threads schedule Erlang processes and execute Erlang code.
See also
Returns a list of
See also
Returns a string containing the version of the Erlang NIF interface used by the runtime system. It is on the form "<major ver>.<minor ver>".
Returns a string containing the OTP release number of the
OTP release that the currently executing
As from OTP 17, the OTP release number corresponds to
the major OTP version number. No
Returns a list containing information about the source of
If
This tuple only exist if
Highest possible
Returns a list containing information about the source of
The list contains two-tuples with
This tuple only exist if
Highest possible
Returns the default port parallelism scheduling hint used.
For more information, see command-line argument
Returns the number of ports currently existing at the
local node. The value is given as an integer. This is
the same value as returned by
Returns the maximum number of simultaneously existing
ports at the local node as an integer. This limit can be
configured at startup by using command-line flag
Returns the number of processes currently existing at the
local node. The value is given as an integer. This is
the same value as returned by
Returns the maximum number of simultaneously existing
processes at the local node. The value is given as an
integer. This limit can be configured at startup by using
command-line flag
Returns a binary containing a string of process and port
information formatted as in Erlang crash dumps. For more
information, see Section
Returns information about how the user has requested schedulers to be bound or not bound.
Notice that even though a user has requested
schedulers to be bound, they can silently have failed
to bind. To inspect the scheduler bindings, call
For more information, see command-line argument
Returns information about the currently used scheduler bindings.
A tuple of a size equal to
Notice that only schedulers online can be bound to logical processors.
For more information, see command-line argument
Returns the scheduler ID (
Returns the number of scheduler threads used by the emulator. Scheduler threads online schedules Erlang processes and Erlang ports, and execute Erlang code and Erlang linked-in driver code.
The number of scheduler threads is determined at emulator boot time and cannot be changed later. However, the number of schedulers online can be changed at any time.
See also
Returns the number of schedulers online. The scheduler
identifiers of schedulers online satisfy the relationship
For more information, see
Returns
The
Returns a string containing version number and some important properties, such as the number of schedulers.
Returns a string containing the processor and OS architecture the emulator is built for.
Returns
Returns the number of async threads in the async thread
pool used for asynchronous driver calls
(
Returns a boolean value indicating whether
Returns the state of the time offset:
The time offset is preliminary, and will be changed
at a later time when being finalized. The preliminary time offset
is used during the preliminary phase of the
The time offset is final. This either because
The time offset is volatile. That is, it can
change at any time. This is because
Returns a value identifying the
The
The
The
Returns whether a pre erts-7.0 backwards compatible compensation
for sudden changes of system time is
Returns the value of the node trace control word. For
more information, see function
The runtime system rereads the CPU information available
and updates its internally stored information about the
If the CPU information has changed since the last time
it was read, the atom
Returns a string containing the version number of the emulator.
Same as
Returns the size of Erlang term words in bytes as an integer, that is, 4 is returned on a 32-bit architecture, and 8 is returned on a pure 64-bit architecture. On a halfword 64-bit emulator, 4 is returned, as the Erlang terms are stored using a virtual word size of half the system word size.
Returns the true word size of the emulator, that is, the size of a pointer. The value is given in bytes as an integer. On a pure 32-bit architecture, 4 is returned. On both a half word and on a pure 64-bit architecture, 8 is returned.
Argument
Returns the current system monitoring settings set by
When called with argument
Calling the function with
Returns the previous system monitor settings just like
Sets the system performance monitoring options.
If a garbage collection in the system takes at least
One of the tuples is
If a process or port in the system runs uninterrupted
for at least
If a
If a
This can be used to detect problems with NIFs or drivers that take too long to execute. 1 ms is considered a good maximum time for a driver callback or a NIF. However, a time-sharing system is usually to consider everything below 100 ms as "possible" and fairly "normal". However, longer schedule times can indicate swapping or a misbehaving NIF/driver. Misbehaving NIFs and drivers can cause bad resource utilization and bad overall system performance.
If a garbage collection in the system results in
the allocated size of a heap being at least
As of
If a process in the system gets suspended because it
sends to a busy port, a message
If a process in the system gets suspended because it
sends to a process on a remote node whose inter-node
communication was handled by a busy port, a message
Returns the previous system monitor settings just like
If a monitoring process gets so large that it itself starts to cause system monitor messages when garbage collecting, the messages enlarge the process message queue and probably make the problem worse.
Keep the monitoring process neat and do not set the system monitor limits too tight.
Failures:
Returns the current system profiling settings set by
Sets system profiler options.
If a synchronous call to a port from a process is done, the
calling process is considered not runnable during the call
runtime to the port. The calling process is notified as
If a process is put into or removed from the run queue, a
message,
If a port is put into or removed from the run queue, a
message,
If a scheduler is put to sleep or awoken, a message,
Returns current
Calling
This time is not a monotonically increasing time
in the general case. For more information, see the documentation of
Returns current
Calling
This time is not a monotonically increasing time
in the general case. For more information, see the documentation of
Returns a binary data object that is the result of encoding
This can be used for various purposes, for example, writing a term to a file in an efficient way, or sending an Erlang term to some type of communications channel not supported by distributed Erlang.
See also
Returns a binary data object that is the result of encoding
If option
A compression level can be specified by giving option
Option
As from OTP 17.0,
As from OTP R11B-4,
See also
A non-local return from a function. If evaluated within a
Example:
> catch throw({hello, there}). {hello,there}
Failure:
Returns the current time as
The time zone and Daylight Saving Time correction depend on the underlying OS.
Example:
> time(). {9,42,44}
Returns the current time offset between
The time offset may or may not change during operation depending
on the
A change in time offset may be observed at slightly different points in time by different processes.
If the runtime system is in
Returns the current time offset between
Same as calling
Returns current
The
timestamp() ->
ErlangSystemTime = erlang:system_time(micro_seconds),
MegaSecs = ErlangSystemTime div 1000000000000,
Secs = ErlangSystemTime div 1000000 - MegaSecs*1000000,
MicroSecs = ErlangSystemTime rem 1000000,
{MegaSecs, Secs, MicroSecs}.
It, however, uses a native implementation which does not build garbage on the heap and with slightly better performance.
This time is not a monotonically increasing time
in the general case. For more information, see the documentation of
Returns the tail of
> tl([geesties, guilies, beasties]). [guilies, beasties]
Allowed in guard tests.
Failure:
Turns on (if
All currently existing processes.
All processes that are created in the future.
All currently existing processes and all processes that are created in the future.
Sets all trace flags except
Traces sending of messages.
Message tags:
Traces receiving of messages.
Message tags:
Traces process-related events.
Message tags:
Traces certain function calls. Specify which function
calls to trace by calling
Message tags:
Used with the
Silent mode is inhibited by executing
The
Message tags:
Used with the
The semantics is that a trace message is sent when a
call traced function returns, that is, when a
chain of tail recursive calls ends. Only one trace
message is sent per chain of tail recursive calls,
so the properties of tail recursiveness for
function calls are kept while tracing with this flag.
Using
To get trace messages containing return values from
functions, use the
Message tags:
Traces scheduling of processes.
Message tags:
Traces scheduling of exiting processes.
Message tags:
Traces garbage collections of processes.
Message tags:
Includes a time-stamp in all trace messages. The
time-stamp (Ts) has the same form as returned by
A global trace flag for the Erlang node that makes all
trace time-stamps to be in CPU time, not wall clock time.
Only allowed with
Used with the
Makes any process created by a traced process inherit
its trace flags, including flag
Makes the first process created by a traced process
inherit its trace flags, excluding flag
Makes any process linked by a traced process inherit its
trace flags, including flag
Makes the first process linked to by a traced process
inherit its trace flags, excluding flag
Specifies where to send the trace messages.
The effect of combining
The tracing process receives the trace messages described
in the following list.
If flag
When
When
When
When
Trace flag
When
When
When
When
When
When
When
When
When
When
When
When
When
Sent when garbage collection is about to be started.
All sizes are in words.
Sent when garbage collection is finished.
If the tracing process dies, the flags are silently removed.
Only one process can trace a particular process. Therefore, attempts to trace an already traced process fail.
Returns: A number indicating the number of processes that
matched
Failure:
The delivery of trace messages is dislocated on the time-line
compared to other events in the system. If you know that
Notice that message
Notice that that
Example: Process
Failure:
Returns trace information about a process or function.
To get information about a process,
The following
Returns a list of atoms indicating what kind of traces is
enabled for the process. The list is empty if no
traces are enabled, and one or more of the followings
atoms if traces are enabled:
Returns the identifier for process or port tracing this
process. If this process is not being traced, the return
value is
To get information about a function,
The following
Returns
Returns the match specification for this function, if it
has one. If the function is locally or globally traced but
has no match specification defined, the returned value
is
Returns the meta-trace tracer process or port for this
function, if it has one. If the function is not
meta-traced, the returned value is
Returns the meta-trace match specification for this
function, if it has one. If the function is meta-traced
but has no match specification defined, the returned
value is
Returns the call count value for this function or
Returns the call time values for this function or
Returns a list containing the
The return value is
If
The same as
Enables or disables call tracing for
one or more functions. Must be combined with
Conceptually, call tracing works as follows. Inside the Erlang Virtual Machine, a set of processes and a set of functions are to be traced. If a traced process calls a traced function, the trace action is taken. Otherwise, nothing happens.
To add or remove one or more processes to the set of traced
processes, use
To add or remove functions to the set of traced
functions, use
The BIF
Argument
All functions of any arity named
All functions in module
All functions in all loaded modules.
Other combinations, such as
If argument
Argument
Disables tracing for the matching functions. Any match specification is removed.
Enables tracing for the matching functions.
A list of match specifications. An empty list is
equivalent to
For the
For the
Parameter
Turns on or off call tracing for global function calls (that is, calls specifying the module explicitly). Only exported functions match and only global calls generate trace messages. This is the default.
Turns on or off call tracing for all types of function
calls. Trace messages are sent whenever any of
the specified functions are called, regardless of how they
are called. If flag
Turns on or off meta-tracing for all types of function
calls. Trace messages are sent to the tracer process
or port
Meta-tracing traces all processes and does not care
about the process trace flags set by
The match specification function
Starts (
If call count tracing is started while already running,
the count is restarted from zero. To pause running
counters, use
To read the counter value, use
Starts (
If call time tracing is started while already running,
the count and time is restarted from zero. To pause
running counters, use
To read the counter value, use
The options
When disabling trace, the option must match the type of trace
set on the function. That is, local tracing must be
disabled with option
Part of a match specification list cannot be changed directly.
If a function has a match specification, it can be replaced
with a new one. To change an existing match specification,
use the BIF
Returns the number of functions matching
argument
Returns an integer by truncating
> trunc(5.5). 5
Allowed in guard tests.
Returns an integer that is the number of elements in
> tuple_size({morni, mulle, bwange}). 3
Allowed in guard tests.
Returns a list corresponding to
Example:
> tuple_to_list({share, {'Ericsson_B', 163}}). [share,{'Ericsson_B',163}]
Returns the current date and time according to Universal
Time Coordinated (UTC) in the form
Example:
> erlang:universaltime(). {{1996,11,6},{14,18,43}}
Converts Universal Time Coordinated (UTC) date and time to
local date and time in the form
Example:
> erlang:universaltime_to_localtime({{1996,11,6},{14,18,43}}). {{1996,11,7},{15,18,43}}
Failure:
Generates and returns an
Generates and returns an
By default, when
Valid
Return only positive integers.
Note that by passing the
Return
These values can be used to determine order between events
on the runtime system instance. That is, if both
Strictly monotonically increasing values
are inherently quite expensive to generate and scales
poorly. This is because the values need to be
synchronized between cpu cores. That is, do not pass the
All valid
Note that the set of integers returned by
Failures:
Removes the link, if there is one, between the calling
process and the process or port referred to by
Returns
Once
Notice that the
unlink(Id),
receive
{'EXIT', Id, _} ->
true
after 0 ->
true
end
Prior to OTP release R11B (ERTS version 5.5)
The current behavior can be viewed as two combined operations: asynchronously send an "unlink signal" to the linked entity and ignore any future results of the link.
Removes the registered name
> unregister(db). true
Users are advised not to unregister system processes.
Failure:
Returns the process identifier or port identifier with
the registered name
Example:
> whereis(db). <0.43.0>
Voluntarily lets other processes (if any) get a chance to
execute. Using
There is seldom or never any need to use this BIF, especially in the SMP emulator, as other processes have a chance to run in another scheduler thread anyway. Using this BIF without a thorough grasp of how the scheduler works can cause performance degradation.