Where do you see that the some JVMs map to fcntl, from what I can see they map 
to flock?

-----Original Message-----
>From: Marvin Humphrey <[EMAIL PROTECTED]>
>Sent: Jan 24, 2007 10:11 AM
>To: java-dev@lucene.apache.org
>Subject: Re: [jira] Commented: (LUCENE-710) Implement
>
>
>On Jan 24, 2007, at 8:04 AM, Robert Engels wrote:
>
>> Curious, I guess I don't understand the BSD disclaimer. The  
>> application should not need to track any of this. The OS should be  
>> tracking open FD and locks for the process, and when it closes a FD  
>> on behalf of a process it should also remove the locks.
>
>You're right.  A less aggressively truncated excerpt should make  
>things clear.  Here's the whole paragraph:
>
>      This interface follows the completely stupid semantics of  
>System V and
>      IEEE Std 1003.1-1988 (``POSIX.1'') that require that all locks  
>associated
>      with a file for a given process are removed when any file  
>descriptor for
>      that file is closed by that process.  This semantic means that  
>applica-
>      tions must be aware of any files that a subroutine library may  
>access.
>      For example if an application for updating the password file  
>locks the
>      password file database while making the update, and then calls
>      getpwname(3) to retrieve a record, the lock will be lost because
>      getpwname(3) opens, reads, and closes the password database.   
>The data-
>      base close will release all locks that the process has  
>associated with
>      the database, even if the library routine never requested a  
>lock on the
>      database.  Another minor semantic problem with this interface  
>is that
>      locks are not inherited by a child process created using the  
>fork(2)
>      function.  The flock(2) interface has much more rational last  
>close
>      semantics and allows locks to be inherited by child processes.   
>Flock(2)
>      is recommended for applications that want to ensure the  
>integrity of
>      their locks when using library routines or wish to pass locks  
>to their
>      children.  Note that flock(2) and fcntl(2) locks may be safely  
>used con-
>      currently.
>
>Marvin Humphrey
>Rectangular Research
>http://www.rectangular.com/
>
>
>
>---------------------------------------------------------------------
>To unsubscribe, e-mail: [EMAIL PROTECTED]
>For additional commands, e-mail: [EMAIL PROTECTED]
>




---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to