Deleted Added
full compact
fcntl.2 (85555) fcntl.2 (92269)
1.\" Copyright (c) 1983, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 16 unchanged lines hidden (view full) ---

25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)fcntl.2 8.2 (Berkeley) 1/12/94
1.\" Copyright (c) 1983, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 16 unchanged lines hidden (view full) ---

25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)fcntl.2 8.2 (Berkeley) 1/12/94
33.\" $FreeBSD: head/lib/libc/sys/fcntl.2 85555 2001-10-26 17:38:20Z ru $
33.\" $FreeBSD: head/lib/libc/sys/fcntl.2 92269 2002-03-14 11:02:35Z maxim $
34.\"
35.Dd January 12, 1994
36.Dt FCNTL 2
37.Os
38.Sh NAME
39.Nm fcntl
40.Nd file control
41.Sh LIBRARY

--- 288 unchanged lines hidden (view full) ---

330.Xr Flock 2
331is recommended for applications that want to ensure the integrity
332of their locks when using library routines or wish to pass locks
333to their children.
334Note that
335.Xr flock 2
336and
337.Xr fcntl 2
34.\"
35.Dd January 12, 1994
36.Dt FCNTL 2
37.Os
38.Sh NAME
39.Nm fcntl
40.Nd file control
41.Sh LIBRARY

--- 288 unchanged lines hidden (view full) ---

330.Xr Flock 2
331is recommended for applications that want to ensure the integrity
332of their locks when using library routines or wish to pass locks
333to their children.
334Note that
335.Xr flock 2
336and
337.Xr fcntl 2
338locks may be safely used concurrently.
338locks may be safely used concurrently but
339.Fn fcntl F_GETLK
340returns \-1 in
341.Fa l_pid
342if the process holding a blocking lock previously locked the
343file descriptor by
344.Xr flock 2 .
339.Pp
340All locks associated with a file for a given process are
341removed when the process terminates.
342.Pp
343All locks obtained before a call to
344.Xr execve 2
345remain in effect until the new program releases them.
346If the new program does not know about the locks, they will not be

--- 196 unchanged lines hidden ---
345.Pp
346All locks associated with a file for a given process are
347removed when the process terminates.
348.Pp
349All locks obtained before a call to
350.Xr execve 2
351remain in effect until the new program releases them.
352If the new program does not know about the locks, they will not be

--- 196 unchanged lines hidden ---