11-26-2008
10 More Discussions You Might Find Interesting
1. Programming
I have an application that is multithreaded and concurrent. Multiple instances of the application must run at the same time.
Each thread in each process accesses shared resources. For this purpose I've employed Butenhof's read-write locks. Inter-process locking is based on fcntl. For example,... (3 Replies)
Discussion started by: adamb
3 Replies
2. Solaris
Hi,
One of my prod jobs using Ab Initio (which is Solaris Based) returned this error:
========= Error from Reformat_3.000 on f7j21-01.xxxx3.com ========= Failed opening file for flow: Resource temporarily unavailable
Flow = "Flow_11.000" connected to output port "out0" of "Reformat_3.000"... (0 Replies)
Discussion started by: teenu18
0 Replies
3. UNIX for Advanced & Expert Users
What is the command for search the program name from the entire directory (all directories in the unix box, means including sub directories...) (2 Replies)
Discussion started by: gksenthilkumar
2 Replies
4. UNIX for Advanced & Expert Users
Hi,
We have an interesting problem with F-Secure SSH (v 3.1.0) running on HP-UX. It seems that when scp or sftp commands are issued they are successful but it counts as a 'strike' against the target user locking the account out after 3 attempts.
When the user is re-enabled in SAM - it reports... (4 Replies)
Discussion started by: b0bbins
4 Replies
5. HP-UX
Hi,
How to list the files which are not locked?
I want to read the files that are not locked by other user only.
can we do it using ls option? (5 Replies)
Discussion started by: vijaykrc
5 Replies
6. UNIX for Advanced & Expert Users
I want to know all the locks on a file - read, write etc acquired by various processes. Is there any way to know ? (2 Replies)
Discussion started by: radiatejava
2 Replies
7. AIX
Hi guys
I am running AIX 5.3 and a newbie to it.
And I am getting reports telling me that the Root Directory is reaching almost max capacity, can someone give m some advice to find out what files are causing it to grow? , or how I can identify the growing files?
Thanks (6 Replies)
Discussion started by: ryanbsc@gmail.c
6 Replies
8. AIX
We are finding sometimes after a user process has been killed, when the user tries to reconnect, he gets the message that there has been too many attempts and his password is locked.
Has anyone see this?
AIX 5.3 tl9 sp3
thanks (0 Replies)
Discussion started by: MizzGail
0 Replies
9. Programming
I need help!Many Thanks!
Now,I try to manage the shared memory inter-process .
Inevitably,I have to deal with the synchronous.
I know the pthread_rwlock in posix,and I compile ,then run successfully in Red Hat Enterprise 4.
I have a doubt about whether the Posix supports the system such as... (1 Reply)
Discussion started by: weizh
1 Replies
10. Solaris
hello;
I have inherited a SunOS sjcorpftp 5.10 Generic_118855-36 i86pc i386 i86pc
whenever someone needs a new password, I change it via
"passwd username"
then
"passwd -f username" so they can change their password
on my only sun sparc 5.9 you can "accessed denied" when you... (0 Replies)
Discussion started by: ikeleong
0 Replies
locks(4) Kernel Interfaces Manual locks(4)
NAME
locks - A directory that contains lock files for communication devices and remote systems that prevent multiple attempts to use the same
device or contact a remote system
SYNOPSIS
/var/spool/locks
DESCRIPTION
Lock files are created by the uucico daemon, the cu command, the tip command, and the uugetty command in the /var/spool/locks directory.
The files are created when the utility opens the serial line for communication.
The lock file locks the device or remote system so that another process cannot access it while it is in use. The file name of the lock file
uses one of the following forms: LCK..device_name LCK..system_name Where device_name is the name of the device (such as ttyd0) and sys-
tem_name is the name of the system (such as hera).
Normally, the process that creates a lock file will remove it when the process has finished using the line. However, it is possible for
lock files to be left behind (for example: system crash, phone line disconnects unexpectedly). This situation has been accounted for and
the commands that use lock files can handle the situation and overwrite these files, if appropriate.
Lock files contains the process ID (PID) of the process that created the lock. The lock file is a data file; to see its contents, use the
following command:
od -d lockfile
Where lockfile is the name of the file. For example: % od -d /var/spool/locks/LCK..ttyd0 0000000 06854 00000 0000004
In this example, the lock file (LCK..ttyd0) was created by the process with PID 6854.
FILES
Contains the uucico daemon and uugetty program. Contains the uucp, cu, and tip programs.
RELATED INFORMATION
Commands: cu(1), od(1), tip(1), uucp(1), uugetty(8)
Daemons: uucico(8) delim off
locks(4)