diff options
| author | Michael Kerrisk <mtk.manpages@gmail.com> | 2007-05-12 09:06:04 +0000 |
|---|---|---|
| committer | Michael Kerrisk <mtk.manpages@gmail.com> | 2007-05-12 09:06:04 +0000 |
| commit | 60a90ecdae7bf6d1a91dc5d1d7177e400b114e47 (patch) | |
| tree | 9f7c19a897084607a9688be5414d0d4cd6391b54 /man2/open.2 | |
| parent | d92a60f2575c95cd532b822e4fb983c3a9e35641 (diff) | |
| download | man-pages-60a90ecdae7bf6d1a91dc5d1d7177e400b114e47.tar.gz | |
Convert function formatting of the form "\fBname\fP()" to ".BR name ()".
Diffstat (limited to 'man2/open.2')
| -rw-r--r-- | man2/open.2 | 20 |
1 files changed, 15 insertions, 5 deletions
diff --git a/man2/open.2 b/man2/open.2 index 7ac28d93da..99d6f689cf 100644 --- a/man2/open.2 +++ b/man2/open.2 @@ -183,7 +183,9 @@ If \fIpathname\fR is not a directory, cause the open to fail. .\" [PATCH] open: O_DIRECTORY and O_CREAT together should fail .\" O_DIRECTORY | O_CREAT causes O_DIRECTORY to be ignored. This flag is Linux-specific, and was added in kernel version 2.1.126, to -avoid denial-of-service problems if \fBopendir\fR(3) is called on a +avoid denial-of-service problems if +.BR opendir (3) +is called on a FIFO or tape device, but should not be used outside of the implementation of \fBopendir\fR. .TP @@ -203,7 +205,9 @@ atomic file locking using a lockfile is to create a unique file on the same file system (e.g., incorporating hostname and pid), use .BR link (2) to make a link to the lockfile. -If \fBlink\fP(2) returns 0, the lock is +If +.BR link (2) +returns 0, the lock is successful. Otherwise, use .BR stat (2) @@ -373,10 +377,16 @@ cannot create them; use .BR mknod (2) instead. .LP -On NFS file systems with UID mapping enabled, \fBopen\fP() may -return a file descriptor but e.g. \fBread\fP(2) requests are denied +On NFS file systems with UID mapping enabled, +.BR open () +may +return a file descriptor but e.g. +.BR read (2) +requests are denied with \fBEACCES\fP. -This is because the client performs \fBopen\fP() by checking the +This is because the client performs +.BR open () +by checking the permissions, but UID mapping is performed by the server upon read and write requests. |
