For detailed information on the m ulti-access and global m ulti-access options, refer to Accessing Files Programmer's Guide (32650-90017).

Figure 6-15. Actions Resulting from Multiaccess of Files

When a ￿le is shared among t wo or more processes and one or more of the processes is writing to it, the processes m ust be properly in terlocked to prevent undesirable results. The FLOCK and FUNLOCK intrinsics provide the necessary in terlocking by using a Resource Identi￿cation Number (RIN) as a ￿ag to in terlock multiple accessors. For detailed information on this topic, refer to Accessing Files Pr ogrammer's Guide (32650-90017) and MPE/iX Intrinsics R eference Manual (32650-90028).

Maintaining File Security

Three security features are a vailable on the MPE/iX system to restrict access to a single ￿le or all disc ￿les in a particular accoun t or group: loc kwords, the MPE/iX File Access System matrix, and access con trol de￿nitions (A CDs).

File System 6-37