3 lock \- run a command under lock
26 open and (over)writing at least one byte each minute
27 to keep the exclusive-access lock alive.
30 doesn't already have the exclusive-access bit set in
32 the exclusive-access bits are set in its mode and
38 waits for exclusive access to
40 instead of just trying once.
45 to contain the name of the lock file.
49 database while preventing collisions with other occurrences.
53 lock scan.lock replica/scan $dist/sources.replica
56 .B /sys/src/cmd/lock.c