1 .\" $NetBSD: fcntl.2,v 1.6 1995/02/27 12:32:29 cgd Exp $
3 .\" Copyright (c) 1983, 1993
4 .\" The Regents of the University of California. All rights reserved.
6 .\" Redistribution and use in source and binary forms, with or without
7 .\" modification, are permitted provided that the following conditions
9 .\" 1. Redistributions of source code must retain the above copyright
10 .\" notice, this list of conditions and the following disclaimer.
11 .\" 2. Redistributions in binary form must reproduce the above copyright
12 .\" notice, this list of conditions and the following disclaimer in the
13 .\" documentation and/or other materials provided with the distribution.
14 .\" 3. All advertising materials mentioning features or use of this software
15 .\" must display the following acknowledgement:
16 .\" This product includes software developed by the University of
17 .\" California, Berkeley and its contributors.
18 .\" 4. Neither the name of the University nor the names of its contributors
19 .\" may be used to endorse or promote products derived from this software
20 .\" without specific prior written permission.
22 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 .\" @(#)fcntl.2 8.2 (Berkeley) 1/12/94
43 .Fd #include <fcntl.h>
45 .Fn fcntl "int fd" "int cmd" "int arg"
48 provides for control over descriptors.
51 is a descriptor to be operated on by
54 .Bl -tag -width F_WRITEBOOTSTRAPX
56 Return a new descriptor as follows:
58 .Bl -bullet -compact -offset 4n
60 Lowest numbered available descriptor greater than or equal to
63 Same object references as the original descriptor.
65 New descriptor shares the same file offset if the object
68 Same access mode (read, write or read/write).
70 Same file status flags (i.e., both file descriptors
71 share the same file status flags).
73 The close-on-exec flag associated with the new file descriptor
74 is set to remain open across
79 Get the close-on-exec flag associated with the file descriptor
81 If the low-order bit of the returned value is 0,
82 the file will remain open across
84 otherwise the file will be closed upon execution of
89 Set the close-on-exec flag associated with
91 to the low order bit of
95 Get descriptor status flags, as described below
99 Set descriptor status flags to
102 Get the process ID or process group
107 signals; process groups are returned
112 Set the process or process group
118 process groups are specified by supplying
120 as negative, otherwise
122 is interpreted as a process ID.
124 Preallocate file storage space.
126 Truncate a file without zeroing space.
127 The calling process must have root privileges.
129 Issue an advisory read async with no copy to user.
131 Turn read ahead off/on.
138 .It Dv F_READBOOTSTRAP
139 Read bootstrap from disk.
140 .It Dv F_WRITEBOOTSTRAP
141 Write bootstrap on disk.
142 The calling process must have root privileges.
144 Turns data caching off/on. A non-zero value in
146 turns data caching off.
149 turns data caching on.
151 Get disk device information.
152 Currently this only includes the
153 disk device address that corresponds
154 to the current file offset.
156 Does the same thing as
158 then asks the drive to
159 flush all buffered data to
160 the permanent storage device
164 only implemented on HFS filesystems and
165 the operation may take quite a while to
166 complete. Certain FireWire drives have
167 also been known to ignore this request.
174 commands are as follows:
175 .Bl -tag -width O_NONBLOCKX -offset indent
177 Non-blocking I/O; if no data is available to a
181 operation would block,
182 the read or write call returns -1 with the error
185 Force each write to append at the end of file;
193 signal to be sent to the process group
194 when I/O is possible, e.g.,
195 upon availability of data to be read.
198 Several commands are available for doing advisory file locking;
199 they all operate on the following structure:
203 off_t l_start; /* starting offset */
204 off_t l_len; /* len = 0 means until end of file */
205 pid_t l_pid; /* lock owner */
206 short l_type; /* lock type: read/write, etc. */
207 short l_whence; /* type of l_start */
211 The commands available for advisory record locking are as follows:
212 .Bl -tag -width F_SETLKWX
214 Get the first lock that blocks the lock description pointed to by the
217 taken as a pointer to a
220 The information retrieved overwrites the information passed to
225 If no lock is found that would prevent this lock from being created,
226 the structure is left unchanged by this function call except for the
227 lock type which is set to
230 Set or clear a file segment lock according to the lock description
231 pointed to by the third argument,
233 taken as a pointer to a
237 is used to establish shared (or read) locks
239 or exclusive (or write) locks,
241 as well as remove either type of lock
243 If a shared or exclusive lock cannot be set,
245 returns immediately with
248 This command is the same as
250 except that if a shared or exclusive lock is blocked by other locks,
251 the process waits until the request can be satisfied.
252 If a signal that is to be caught is received while
254 is waiting for a region, the
256 will be interrupted if the signal handler has not specified the
262 When a shared lock has been set on a segment of a file,
263 other processes can set shared locks on that segment
265 A shared lock prevents any other process from setting an exclusive
266 lock on any portion of the protected area.
267 A request for a shared lock fails if the file descriptor was not
268 opened with read access.
270 An exclusive lock prevents any other process from setting a shared lock or
271 an exclusive lock on any portion of the protected area.
272 A request for an exclusive lock fails if the file was not
273 opened with write access.
282 to indicate that the relative offset,
284 bytes, will be measured from the start of the file,
285 current position, or end of the file, respectively.
288 is the number of consecutive bytes to be locked.
291 is negative, the result is undefined.
294 field is only used with
296 to return the process ID of the process holding a blocking lock.
299 request, the value of
304 Locks may start and extend beyond the current end of a file,
305 but may not start or extend before the beginning of the file.
306 A lock is set to extend to the largest possible value of the
307 file offset for that file if
313 point to the beginning of the file, and
315 is zero, the entire file is locked.
316 If an application wishes only to do entire file locking, the
318 system call is much more efficient.
320 There is at most one type of lock set for each byte in the file.
321 Before a successful return from an
325 request when the calling process has previously existing locks
326 on bytes in the region specified by the request,
327 the previous lock type for each byte in the specified
328 region is replaced by the new lock type.
329 As specified above under the descriptions
330 of shared locks and exclusive locks, an
334 request fails or blocks respectively when another process has existing
335 locks on bytes in the specified region and the type of any of those
336 locks conflicts with the type specified in the request.
338 This interface follows the completely stupid semantics of System V and
340 that require that all locks associated with a file for a given process are
341 removed when \fIany\fP file descriptor for that file is closed by that process.
342 This semantic means that applications must be aware of any files that
343 a subroutine library may access.
344 For example if an application for updating the password file locks the
345 password file database while making the update, and then calls
347 to retrieve a record,
348 the lock will be lost because
350 opens, reads, and closes the password database.
351 The database close will release all locks that the process has
352 associated with the database, even if the library routine never
353 requested a lock on the database.
354 Another minor semantic problem with this interface is that
355 locks are not inherited by a child process created using the
360 interface has much more rational last close semantics and
361 allows locks to be inherited by child processes.
363 is recommended for applications that want to ensure the integrity
364 of their locks when using library routines or wish to pass locks
370 locks may be safely used concurrently.
372 All locks associated with a file for a given process are
373 removed when the process terminates.
375 A potential for deadlock occurs if a process controlling a locked region
376 is put to sleep by attempting to lock the locked region of another process.
377 This implementation detects that sleeping until a locked region is unlocked
378 would cause a deadlock and fails with an
384 command operates on the following structure:
387 typedef struct fstore {
388 u_int32_t fst_flags; /* IN: flags word */
389 int fst_posmode; /* IN: indicates offset field */
390 off_t fst_offset; /* IN: start of the region */
391 off_t fst_length; /* IN: size of the region */
392 off_t fst_bytesalloc; /* OUT: number of bytes allocated */
396 The flags (fst_flags) for the
398 command are as follows:
399 .Bl -tag -width F_ALLOCATECONTIGX -offset indent
400 .It Dv F_ALLOCATECONTIG
401 Allocate contiguous space.
403 Allocate all requested space or no space at all.
406 The position modes (fst_posmode) for the
408 command indicate how to use the offset field.
409 The modes are as follows:
410 .Bl -tag -width F_PEOFPOSMODEX -offset indent
412 Allocate from the physical end of file.
414 Allocate from the volume offset.
419 command operates on the following structure
420 which holds information passed from the
425 off_t ra_offset; /* offset into the file */
426 int ra_count; /* size of the read */
431 .Dv F_READBOOTSTRAP and F_WRITEBOOTSTRAP
432 commands operate on the following structure.
435 typedef struct fbootstraptransfer {
436 off_t fbt_offset; /* IN: offset to start read/write */
437 size_t fbt_length; /* IN: number of bytes to transfer */
438 void *fbt_buffer; /* IN: buffer to be read/written */
439 } fbootstraptransfer_t;
444 command operates on the following structure.
448 u_int32_t l2p_flags; /* unused so far */
449 off_t l2p_contigbytes; /* unused so far */
450 off_t l2p_devoffset; /* bytes into device */
454 Upon successful completion, the value returned depends on
457 .Bl -tag -width F_GETOWNX -offset indent
459 A new file descriptor.
461 Value of flag (only the low-order bit is defined).
465 Value of file descriptor owner.
470 Otherwise, a value of -1 is returned and
472 is set to indicate the error.
488 and the segment of a file to be locked is already
489 exclusive-locked by another process;
490 or the type is an exclusive lock and some portion of the
491 segment of a file to be locked is already shared-locked or
492 exclusive-locked by another process.
500 and the calling process does not have root privileges.
503 is not a valid open file descriptor.
517 is not a valid file descriptor open for reading.
531 is not a valid file descriptor open for writing.
537 and the calling process does not have
538 file write permission.
546 is not a valid file descriptor open for reading.
551 and the maximum allowed number of file descriptors are currently
558 and a deadlock condition was detected.
564 and the function was interrupted by a signal.
571 is negative or greater than the maximum allowable number
573 .Xr getdtablesize 2 ) .
582 and the data to which
584 points is not valid, or
586 refers to a file that does not support locking.
604 is a negative or zero value.
612 and the operation was attempted on a non-HFS disk type.
618 and the maximum number of file descriptors permitted for the
619 process are already in use,
620 or no file descriptors greater than or equal to
630 and satisfying the lock or unlock request would result in the
631 number of locked regions in the system exceeding a system-imposed limit.
637 the process ID given as argument is not in use.
643 .Xr getdtablesize 2 ,
649 function call appeared in