1 .\" $NetBSD: fcntl.2,v 1.6 1995/02/27 12:32:29 cgd Exp $
3 .\" Copyright (c) 1983, 1993
4 .\" The Regents of the University of California. All rights reserved.
6 .\" Redistribution and use in source and binary forms, with or without
7 .\" modification, are permitted provided that the following conditions
9 .\" 1. Redistributions of source code must retain the above copyright
10 .\" notice, this list of conditions and the following disclaimer.
11 .\" 2. Redistributions in binary form must reproduce the above copyright
12 .\" notice, this list of conditions and the following disclaimer in the
13 .\" documentation and/or other materials provided with the distribution.
14 .\" 3. All advertising materials mentioning features or use of this software
15 .\" must display the following acknowledgement:
16 .\" This product includes software developed by the University of
17 .\" California, Berkeley and its contributors.
18 .\" 4. Neither the name of the University nor the names of its contributors
19 .\" may be used to endorse or promote products derived from this software
20 .\" without specific prior written permission.
22 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 .\" @(#)fcntl.2 8.2 (Berkeley) 1/12/94
43 .Fd #include <fcntl.h>
45 .Fn fcntl "int fd" "int cmd" "int arg"
48 provides for control over descriptors.
51 is a descriptor to be operated on by
54 .Bl -tag -width F_WRITEBOOTSTRAPX
56 Return a new descriptor as follows:
58 .Bl -bullet -compact -offset 4n
60 Lowest numbered available descriptor greater than or equal to
63 Same object references as the original descriptor.
65 New descriptor shares the same file offset if the object
68 Same access mode (read, write or read/write).
70 Same file status flags (i.e., both file descriptors
71 share the same file status flags).
73 The close-on-exec flag associated with the new file descriptor
74 is set to remain open across
79 Get the close-on-exec flag associated with the file descriptor
81 If the low-order bit of the returned value is 0,
82 the file will remain open across
84 otherwise the file will be closed upon execution of
89 Set the close-on-exec flag associated with
91 to the low order bit of
95 Get descriptor status flags, as described below
99 Set descriptor status flags to
102 Get the process ID or process group
107 signals; process groups are returned
112 Set the process or process group
118 process groups are specified by supplying
120 as negative, otherwise
122 is interpreted as a process ID.
124 Preallocate file storage space.
126 Truncate a file without zeroing space.
127 The calling process must have root privileges.
129 Issue an advisory read async with no copy to user.
131 Turn read ahead off/on.
138 .It Dv F_READBOOTSTRAP
139 Read bootstrap from disk.
140 .It Dv F_WRITEBOOTSTRAP
141 Write bootstrap on disk.
142 The calling process must have root privileges.
144 Turns data caching off/on. A non-zero value in
146 turns data caching off.
149 turns data caching on.
151 Get disk device information.
152 Currently this only includes the
153 disk device address that corresponds
154 to the current file offset.
161 commands are as follows:
162 .Bl -tag -width O_NONBLOCKX -offset indent
164 Non-blocking I/O; if no data is available to a
168 operation would block,
169 the read or write call returns -1 with the error
172 Force each write to append at the end of file;
180 signal to be sent to the process group
181 when I/O is possible, e.g.,
182 upon availability of data to be read.
185 Several commands are available for doing advisory file locking;
186 they all operate on the following structure:
190 off_t l_start; /* starting offset */
191 off_t l_len; /* len = 0 means until end of file */
192 pid_t l_pid; /* lock owner */
193 short l_type; /* lock type: read/write, etc. */
194 short l_whence; /* type of l_start */
198 The commands available for advisory record locking are as follows:
199 .Bl -tag -width F_SETLKWX
201 Get the first lock that blocks the lock description pointed to by the
204 taken as a pointer to a
207 The information retrieved overwrites the information passed to
212 If no lock is found that would prevent this lock from being created,
213 the structure is left unchanged by this function call except for the
214 lock type which is set to
217 Set or clear a file segment lock according to the lock description
218 pointed to by the third argument,
220 taken as a pointer to a
224 is used to establish shared (or read) locks
226 or exclusive (or write) locks,
228 as well as remove either type of lock
230 If a shared or exclusive lock cannot be set,
232 returns immediately with
235 This command is the same as
237 except that if a shared or exclusive lock is blocked by other locks,
238 the process waits until the request can be satisfied.
239 If a signal that is to be caught is received while
241 is waiting for a region, the
243 will be interrupted if the signal handler has not specified the
249 When a shared lock has been set on a segment of a file,
250 other processes can set shared locks on that segment
252 A shared lock prevents any other process from setting an exclusive
253 lock on any portion of the protected area.
254 A request for a shared lock fails if the file descriptor was not
255 opened with read access.
257 An exclusive lock prevents any other process from setting a shared lock or
258 an exclusive lock on any portion of the protected area.
259 A request for an exclusive lock fails if the file was not
260 opened with write access.
269 to indicate that the relative offset,
271 bytes, will be measured from the start of the file,
272 current position, or end of the file, respectively.
275 is the number of consecutive bytes to be locked.
278 is negative, the result is undefined.
281 field is only used with
283 to return the process ID of the process holding a blocking lock.
286 request, the value of
291 Locks may start and extend beyond the current end of a file,
292 but may not start or extend before the beginning of the file.
293 A lock is set to extend to the largest possible value of the
294 file offset for that file if
300 point to the beginning of the file, and
302 is zero, the entire file is locked.
303 If an application wishes only to do entire file locking, the
305 system call is much more efficient.
307 There is at most one type of lock set for each byte in the file.
308 Before a successful return from an
312 request when the calling process has previously existing locks
313 on bytes in the region specified by the request,
314 the previous lock type for each byte in the specified
315 region is replaced by the new lock type.
316 As specified above under the descriptions
317 of shared locks and exclusive locks, an
321 request fails or blocks respectively when another process has existing
322 locks on bytes in the specified region and the type of any of those
323 locks conflicts with the type specified in the request.
325 This interface follows the completely stupid semantics of System V and
327 that require that all locks associated with a file for a given process are
328 removed when \fIany\fP file descriptor for that file is closed by that process.
329 This semantic means that applications must be aware of any files that
330 a subroutine library may access.
331 For example if an application for updating the password file locks the
332 password file database while making the update, and then calls
334 to retrieve a record,
335 the lock will be lost because
337 opens, reads, and closes the password database.
338 The database close will release all locks that the process has
339 associated with the database, even if the library routine never
340 requested a lock on the database.
341 Another minor semantic problem with this interface is that
342 locks are not inherited by a child process created using the
347 interface has much more rational last close semantics and
348 allows locks to be inherited by child processes.
350 is recommended for applications that want to ensure the integrity
351 of their locks when using library routines or wish to pass locks
357 locks may be safely used concurrently.
359 All locks associated with a file for a given process are
360 removed when the process terminates.
362 A potential for deadlock occurs if a process controlling a locked region
363 is put to sleep by attempting to lock the locked region of another process.
364 This implementation detects that sleeping until a locked region is unlocked
365 would cause a deadlock and fails with an
371 command operates on the following structure:
374 typedef struct fstore {
375 u_int32_t fst_flags; /* IN: flags word */
376 int fst_posmode; /* IN: indicates offset field */
377 off_t fst_offset; /* IN: start of the region */
378 off_t fst_length; /* IN: size of the region */
379 off_t fst_bytesalloc; /* OUT: number of bytes allocated */
383 The flags (fst_flags) for the
385 command are as follows:
386 .Bl -tag -width F_ALLOCATECONTIGX -offset indent
387 .It Dv F_ALLOCATECONTIG
388 Allocate contiguous space.
390 Allocate all requested space or no space at all.
393 The position modes (fst_posmode) for the
395 command indicate how to use the offset field.
396 The modes are as follows:
397 .Bl -tag -width F_PEOFPOSMODEX -offset indent
399 Allocate from the physical end of file.
401 Allocate from the volume offset.
406 command operates on the following structure
407 which holds information passed from the
412 off_t ra_offset; /* offset into the file */
413 int ra_count; /* size of the read */
418 .Dv F_READBOOTSTRAP and F_WRITEBOOTSTRAP
419 commands operate on the following structure.
422 typedef struct fbootstraptransfer {
423 off_t fbt_offset; /* IN: offset to start read/write */
424 size_t fbt_length; /* IN: number of bytes to transfer */
425 void *fbt_buffer; /* IN: buffer to be read/written */
426 } fbootstraptransfer_t;
431 command operates on the following structure.
435 u_int32_t l2p_flags; /* unused so far */
436 off_t l2p_contigbytes; /* unused so far */
437 off_t l2p_devoffset; /* bytes into device */
441 Upon successful completion, the value returned depends on
444 .Bl -tag -width F_GETOWNX -offset indent
446 A new file descriptor.
448 Value of flag (only the low-order bit is defined).
452 Value of file descriptor owner.
457 Otherwise, a value of -1 is returned and
459 is set to indicate the error.
475 and the segment of a file to be locked is already
476 exclusive-locked by another process;
477 or the type is an exclusive lock and some portion of the
478 segment of a file to be locked is already shared-locked or
479 exclusive-locked by another process.
487 and the calling process does not have root privileges.
490 is not a valid open file descriptor.
504 is not a valid file descriptor open for reading.
518 is not a valid file descriptor open for writing.
524 and the calling process does not have
525 file write permission.
533 is not a valid file descriptor open for reading.
538 and the maximum allowed number of file descriptors are currently
545 and a deadlock condition was detected.
551 and the function was interrupted by a signal.
558 is negative or greater than the maximum allowable number
560 .Xr getdtablesize 2 ) .
569 and the data to which
571 points is not valid, or
573 refers to a file that does not support locking.
591 is a negative or zero value.
599 and the operation was attempted on a non-HFS disk type.
605 and the maximum number of file descriptors permitted for the
606 process are already in use,
607 or no file descriptors greater than or equal to
617 and satisfying the lock or unlock request would result in the
618 number of locked regions in the system exceeding a system-imposed limit.
624 the process ID given as argument is not in use.
630 .Xr getdtablesize 2 ,
636 function call appeared in