| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Tidbits |
PT>> just another example of unixish dirty file system hacks, like doing
PT>> unlink() on an open file :)
TS>You can debate about whether this is WAD or BUG. When
TS>unlinking an open file it vanishes from all mounted
TS>filesystems and only the internal subsystems have access to
TS>the disk space via the stored inode number. This is quite
TS>nice for security reasons when you don't want _anyone_ to
TS>access the contents of the file.
You can do the same thing under OS/2 by opening the file in deny
read/write mode.
TS>As soon as the last reference to the file is closed the
TS>file is removed physically, i.e. the space is freed on the
TS>volume.
I believe that this is due to UNIX lacking effective file locking. So
you can't stop a process from deleting a file while another process is
using it. So you just allow the process with the open file to keep using
it - the deletion process will complete when there are no open handles to
the file.
OS/2 doesn't allow a process/thread to delete a file when another
process/thread has it open...
cya
___
X MR/2 2.0 NR X This virus requires Microsoft Windows 3.x.
--- Maximus/2 2.02
* Origin: Multi - 61-3-9739-7145 - multi.apana.org.au (3:633/363)SEEN-BY: 620/243 632/103 341 348 998 633/154 252 260 362 363 371 373 634/384 SEEN-BY: 635/301 502 503 638/102 639/100 640/820 690/660 711/409 410 413 430 SEEN-BY: 711/807 808 809 934 949 955 712/515 713/888 800/1 7877/2809 @PATH: 633/363 260 371 635/503 632/348 711/409 808 809 934 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.