| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Tidbits |
Hallo, Russell! *** Am Mittwoch 20. September 1995 um 00:30 schrieb Russell Coker an Thomas Seeling: PT>>> just another example of unixish dirty file system hacks, like doing PT>>> unlink() on an open file :) RC> You can do the same thing under OS/2 by opening the file in deny RC> read/write mode. This is not just quite the same. RC> I believe that this is due to UNIX lacking effective file locking. So RC> you can't stop a process from deleting a file while another process is RC> using it. So you just allow the process with the open file to keep using RC> it - the deletion process will complete when there are no open handles to RC> the file. This is false in this general speaking. Of course there are enough implementations whose API offers nice mechanisms like semaphores, shared memory, file locking etc. Tschau...Thomas --- E3-32/1.11-32/2.50+* Origin: Die TeX-Box +49-6034-1455 V.34 -930022 ISDN 24h (2:244/1130.42) SEEN-BY: 105/42 620/243 711/401 409 410 413 430 807 808 809 934 955 712/407 SEEN-BY: 712/515 628 704 713/888 800/1 7877/2809 @PATH: 244/1130 24/999 2/777 105/42 712/515 711/808 809 934 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.