⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 lockfix.h

📁 mgcp协议源代码。支持多种编码:g711
💻 H
字号:
/* * Program:	Safe function call for fcntl() locking * * Author:	Mark Crispin *		Networks and Distributed Computing *		Computing & Communications *		University of Washington *		Administration Building, AG-44 *		Seattle, WA  98195 *		Internet: MRC@CAC.Washington.EDU * * Date:	22 May 1997 * Last Edited:	5 June 1997 * * Copyright 1997 by the University of Washington * *  Permission to use, copy, modify, and distribute this software and its * documentation for any purpose and without fee is hereby granted, provided * that the above copyright notice appears in all copies and that both the * above copyright notice and this permission notice appear in supporting * documentation, and that the name of the University of Washington not be * used in advertising or publicity pertaining to distribution of the software * without specific, written prior permission.  This software is made available * "as is", and * THE UNIVERSITY OF WASHINGTON DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, * WITH REGARD TO THIS SOFTWARE, INCLUDING WITHOUT LIMITATION ALL IMPLIED * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, AND IN * NO EVENT SHALL THE UNIVERSITY OF WASHINGTON BE LIABLE FOR ANY SPECIAL, * INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, TORT * (INCLUDING NEGLIGENCE) OR STRICT LIABILITY, ARISING OUT OF OR IN CONNECTION * WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. * *//*  The purpose of this nonsense is to work around a bad bug in fcntl() * locking.  The cretins who designed it decided that a close() should * release any locks made by that process on the file opened on that * file descriptor.  Never mind that the lock wasn't made on that file * descriptor, but rather on some other file descriptor. * *  This bug is on every implementation of fcntl() locking that I have * tested.  Fortunately, on BSD systems and OSF/1, we can use the flock() * system call which doesn't have this bug. * *  On broken systems, we invoke an inferior fork to execute any driver * dispatches which are likely to tickle this bug; specifically, any * dispatch which may fiddle with a mailbox that is already selected.  As * of this writing, these are: delete, rename, status, copy, and append. * *  Delete and rename are pretty marginal (does anyone really want to * deleted or rename the selected mailbox?).  The same is true of status, * but there are people who don't understand why status of the selected * mailbox is bad news. * *  However, in copy and append it is reasonable to do this to a selected * mailbox. * *  It is still possible for an application to trigger this bug by doing * mail_open() on the same mailbox twice.  Don't do it. *//* Safe call to function * Accepts: driver dispatch table *	    return value *	    function to call *	    function arguments */#undef SAFE_FUNCTION#define SAFE_FUNCTION(dtb,ret,func,args) {			\  if (dtb->flags & DR_LOCKING) {				\    int pid = fork ();						\    if (pid < 0) mm_log ("Can't create execution fork",ERROR);	\    else if (pid) {						\      grim_pid_reap_status (pid,NIL,&ret);			\      ret = ((ret & 0177) == 0177) ? (ret >> 8) : 0;		\    }								\    else exit (func args);					\  }								\  else ret = func args;						\}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -