fcntl.2 (85555) | fcntl.2 (92269) |
---|---|
1.\" Copyright (c) 1983, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 16 unchanged lines hidden (view full) --- 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" @(#)fcntl.2 8.2 (Berkeley) 1/12/94 | 1.\" Copyright (c) 1983, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 16 unchanged lines hidden (view full) --- 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" @(#)fcntl.2 8.2 (Berkeley) 1/12/94 |
33.\" $FreeBSD: head/lib/libc/sys/fcntl.2 85555 2001-10-26 17:38:20Z ru $ | 33.\" $FreeBSD: head/lib/libc/sys/fcntl.2 92269 2002-03-14 11:02:35Z maxim $ |
34.\" 35.Dd January 12, 1994 36.Dt FCNTL 2 37.Os 38.Sh NAME 39.Nm fcntl 40.Nd file control 41.Sh LIBRARY --- 288 unchanged lines hidden (view full) --- 330.Xr Flock 2 331is recommended for applications that want to ensure the integrity 332of their locks when using library routines or wish to pass locks 333to their children. 334Note that 335.Xr flock 2 336and 337.Xr fcntl 2 | 34.\" 35.Dd January 12, 1994 36.Dt FCNTL 2 37.Os 38.Sh NAME 39.Nm fcntl 40.Nd file control 41.Sh LIBRARY --- 288 unchanged lines hidden (view full) --- 330.Xr Flock 2 331is recommended for applications that want to ensure the integrity 332of their locks when using library routines or wish to pass locks 333to their children. 334Note that 335.Xr flock 2 336and 337.Xr fcntl 2 |
338locks may be safely used concurrently. | 338locks may be safely used concurrently but 339.Fn fcntl F_GETLK 340returns \-1 in 341.Fa l_pid 342if the process holding a blocking lock previously locked the 343file descriptor by 344.Xr flock 2 . |
339.Pp 340All locks associated with a file for a given process are 341removed when the process terminates. 342.Pp 343All locks obtained before a call to 344.Xr execve 2 345remain in effect until the new program releases them. 346If the new program does not know about the locks, they will not be --- 196 unchanged lines hidden --- | 345.Pp 346All locks associated with a file for a given process are 347removed when the process terminates. 348.Pp 349All locks obtained before a call to 350.Xr execve 2 351remain in effect until the new program releases them. 352If the new program does not know about the locks, they will not be --- 196 unchanged lines hidden --- |