10-08-2015
There is no way that a Solaris system is going to recycle a PID in 30 seconds unless someone has changed the system's maximum PID to be artificially low to make it happen.
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I'm trying to write a script to email the output of 'ls -lt' command that are 30 days old along with headers for eg. like owner, date, timestamp and a portion of some special character files like 'slfpay$/#:032508AA' in /home/test directory, I just want the numbers from the last field ($9), also... (3 Replies)
Discussion started by: mbak
3 Replies
2. UNIX for Dummies Questions & Answers
Hi,
I have a commands in a file called commands.file, I am using this file with the following commnad
xterm -e "commands.file"
After executing this file in the new xterm, it is closing automatically.
I want to use that xterm after that.
Please help me regarding this?
:)
... (4 Replies)
Discussion started by: chaitubek
4 Replies
3. UNIX for Advanced & Expert Users
Hi experts,
It would be grateful if you can guide me on the following,
1.How to find the time of excution of a particular unix command.
2. How to find the terminal (IP Address) from where that particular unix command was excuted.
3. How to find the user who executed that particular unix... (1 Reply)
Discussion started by: apsprabhu
1 Replies
4. Shell Programming and Scripting
HI guys,
I'm working on a code with the following specs:
1. Retrieving files with a particular extensions from a location specified by the users.
2. Copying those files to user specified location
i) but i need to pause copy if the network is busy
ii) and the copy process must... (3 Replies)
Discussion started by: bill88
3 Replies
5. Shell Programming and Scripting
Hi, my name is Steve Ngai from Malaysia. This is my first post. Hope to learn more about Unix from this forum.
My first question is can nmon be customized? When I run nmon, I need to manually type c to see CPU usage, then m for memory usage. Can I pass it some nmon option to automatically see... (2 Replies)
Discussion started by: ngaisteve1
2 Replies
6. Shell Programming and Scripting
Hi,
I have a function abc(). i am calling the function 9 times. it is working fine and completed the script execution 10 hours.
input files:
CUSTOMER_INFO_1111_12345.csv
CUSTOMER_INFO_1222_12345.csv
CUSTOMER_INFO_1322_12345.csv
CUSTOMER_INFO_1333_12345.csv
CUSTOMER_INFO_1151_12345.csv... (4 Replies)
Discussion started by: onesuri
4 Replies
7. Shell Programming and Scripting
Hi,
I got long list of referred file content:
CGTGCFTGCGTFREDG
PEOGDKGJDGKLJGKL
DFGDSFIODUFIODSUF
FSDOFJSODIFJSIODFJ
DSFSDFDFSDOFJFOSF
SDFOSDJFOJFPPIPIOP
.
.
.
Input file content:
>sample_1
SDFDSKLFKDSLSDFSDFDFGDSFIODUFIODSUFSDDSFDSSDFDSFAS (14 Replies)
Discussion started by: patrick87
14 Replies
8. Forum Support Area for Unregistered Users & Account Problems
Hi
i have registered but my username is set to default value ( my email). can i change this ? (2 Replies)
Discussion started by: customizeemai
2 Replies
9. Linux
Hi
Code:
nohup sar -u 10 $COUNT | awk 'NR>2 {$2=$4=$7="";}1' | tr -s ' ' '\t' 2>/dev/null >sar.out &
i have execute above line from shell script .. but sar.out is created with ZERO bite size..
Help on that what is the problem here (1 Reply)
Discussion started by: Mani_apr08
1 Replies
10. Programming
Hey Guys ,
iam trying to match to string in TCL scripts but it not working .
Its only working true condition to print yes.. When condtion fail then even it prints YES
Any suggestion this ??
if {} {
puts"yes" ... (3 Replies)
Discussion started by: hackerdilli
3 Replies
LEARN ABOUT OPENDARWIN
shlock
SHLOCK(1) BSD General Commands Manual SHLOCK(1)
NAME
shlock -- create or verify a lock file for shell scripts
SYNOPSIS
shlock -f lockfile [-p PID] [-u] [-v]
DESCRIPTION
The shlock command can create or verify a lock file on behalf of a shell or other script program. When it attempts to create a lock file, if
one already exists, shlock verifies that it is or is not valid. If valid, shlock will exit with a non-zero exit code. If invalid, shlock
will remove the lock file, and create a new one.
shlock uses the rename(2) system call to make the final target lock file, which is an atomic operation (i.e. "dot locking", so named for this
mechanism's original use for locking system mailboxes). It puts the process ID ("PID") from the command line into the requested lock file.
shlock verifies that an extant lock file is still valid by using kill(2) with a zero signal to check for the existence of the process that
holds the lock.
The -f argument with lockfile is always required.
The -p option with PID is given when the program is to create a lock file; when absent, shlock will simply check for the validity of the lock
file.
The -u option causes shlock to read and write the PID as a binary pid_t, instead of as ASCII, to be compatible with the locks created by
UUCP.
The -v option causes shlock to be verbose about what it is doing.
RETURN VALUES
A zero exit code indicates a valid lock file.
EXAMPLES
BOURNE SHELL
#!/bin/sh
lckfile=/tmp/foo.lock
if shlock -f ${lckfile} -p $$
then
# do what required the lock
rm ${lckfile}
else
echo Lock ${lckfile} already held by `cat ${lckfile}`
fi
C SHELL
#!/bin/csh -f
set lckfile=/tmp/foo.lock
shlock -f ${lckfile} -p $$
if ($status == 0) then
# do what required the lock
rm ${lckfile}
else
echo Lock ${lckfile} already held by `cat ${lckfile}`
endif
The examples assume that the filesystem where the lock file is to be created is writeable by the user, and has space available.
HISTORY
shlock was written for the first Network News Transfer Protocol (NNTP) software distribution, released in March 1986. The algorithm was sug-
gested by Peter Honeyman, from work he did on HoneyDanBer UUCP.
AUTHOR
Erik E. Fair <fair@clock.org>
BUGS
Does not work on NFS or other network filesystem on different systems because the disparate systems have disjoint PID spaces.
Cannot handle the case where a lock file was not deleted, the process that created it has exited, and the system has created a new process
with the same PID as in the dead lock file. The lock file will appear to be valid even though the process is unrelated to the one that cre-
ated the lock in the first place. Always remove your lock files after you're done.
BSD
June 29, 1997 BSD