TIP: Click on subject to list as thread! ANSI
echo: os2prog
to: Thomas Seeling
from: Russell Coker
date: 1995-09-20 00:30:04
subject: Tidbits

PT>> just another example of unixish dirty file system hacks, like doing
 PT>> unlink() on an open file :)

TS>You can debate about whether this is WAD or BUG. When 
TS>unlinking an open file it vanishes from all mounted 
TS>filesystems and only the internal subsystems have access to 
TS>the disk space via the stored inode number. This is quite 
TS>nice for security reasons when you don't want _anyone_ to 
TS>access the contents of the file.

   You can do the same thing under OS/2 by opening the file in deny
read/write mode.

TS>As soon as the last reference to the file is closed the 
TS>file is removed physically, i.e. the space is freed on the 
TS>volume.

   I believe that this is due to UNIX lacking effective file locking.  So
you can't stop a process from deleting a file while another process is
using it.  So you just allow the process with the open file to keep using
it - the deletion process will complete when there are no open handles to
the file.

    OS/2 doesn't allow a process/thread to delete a file when another
process/thread has it open...


  cya
___
 X MR/2 2.0 NR X This virus requires Microsoft Windows 3.x.

--- Maximus/2 2.02
* Origin: Multi - 61-3-9739-7145 - multi.apana.org.au (3:633/363)
SEEN-BY: 620/243 632/103 341 348 998 633/154 252 260 362 363 371 373 634/384
SEEN-BY: 635/301 502 503 638/102 639/100 640/820 690/660 711/409 410 413 430
SEEN-BY: 711/807 808 809 934 949 955 712/515 713/888 800/1 7877/2809
@PATH: 633/363 260 371 635/503 632/348 711/409 808 809 934

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.