Table of Contents
\1. fcntl" >\1. fcntl
2. Read-write lock example" >2. Read-write lock example
3. First execute the read lock, and then execute the write lock. The results are as follows: " >3. First execute the read lock, and then execute the write lock. The results are as follows:
4. If you run the write lock first and then the read lock, the results will be as follows: " >4. If you run the write lock first and then the read lock, the results will be as follows:
Home System Tutorial LINUX A technique for Linux system programming: using fcntl() to implement read-write locks

A technique for Linux system programming: using fcntl() to implement read-write locks

Feb 13, 2024 pm 04:03 PM
linux linux tutorial linux system linux command shell script Synchronization mechanism embeddedlinux Getting started with linux linux learning

Read-write lock is a commonly used synchronization mechanism, which allows multiple processes or threads to perform concurrent read operations or mutually exclusive write operations on the same resource, thereby improving the efficiency and security of the system. In Linux system programming, there are many ways to implement read-write locks, such as using the pthread library, using file locks, etc. This article will introduce you to a method of using the fcntl() system call to implement read-write locks, as well as its principles, usage, advantages and disadvantages, so that you can better use and understand this technique in Linux system programming.

Linux 系统编程的一种技巧:使用 fcntl() 实现读写锁

When multiple processes read and write access to the same file, in order to ensure the integrity of the data, the file needs to be locked. Files can be locked and unlocked through the fcntl() function.

\1. fcntl

1.1. Function description: Manipulate file characteristics based on file descriptors.

1.2. Usage:

int fcntl(int fd, int cmd);

int fcntl(int fd, int cmd, long arg);

int fcntl(int fd, int cmd, struct flock *lock);

fd: File descriptor.

cmd: Operation command.

arg: Parameters used by the command. Whether the arg parameter is required depends on the cmd command.

lock: lock information.

2. Read-write lock example

Create two new files, the source code is shown in 2.1 and 2.2 below.

2.1. Add read lock to the file

#include 

\#include 

\#include 

\#include 

\#include 

int main(int argc, const char * argv [ ])

{

int fd = open("test.c", O_RDONLY);

if (fd == -1)

{

perror("open failed:");

return -1;

}

struct stat sta;

fstat(fd,&sta);

struct flock lock;  

lock.l_len = sta.st_size;

lock.l_pid = getpid();

lock.l_start = 0;

lock.l_type = F_RDLCK;

lock.l_whence = SEEK_SET;

printf("进程pid: %d\n",lock.l_pid);

if(fcntl(fd,F_SETLK,&lock) == -1)

{

perror("fcntl fail ");

return -1;

}

else

{

printf("add read lock success!\n");

}

sleep(10);

close(fd);

return 0;

}

2.2.给文件加写锁

\#include 

\#include 

\#include 

\#include 

\#include 

int main(int argc, const char * argv [ ])

{

int fd = open("test.c", O_WRONLY);

if (fd == -1)

{

perror("open failed:");

return -1;

}

struct stat sta;

fstat(fd,&sta);

struct flock lock;  

lock.l_len = sta.st_size;

lock.l_pid = getpid();

lock.l_start = 0;

lock.l_type = F_WRLCK;

lock.l_whence = SEEK_SET;

printf("进程pid: %d\n",lock.l_pid);

while(fcntl(fd,F_SETLK,&lock) == -1 )

{

perror("fcntl:");

sleep(1);

struct flock lock_1;

lock_1 = lock;

lock_1.l_type = F_WRLCK;  //

fcntl(fd,F_GETLK,&lock_1);//获取文件锁状态,及加锁(lock_1.l_type)能否成功

switch(lock_1.l_type)

{

case F_RDLCK:

printf("检测到读锁 pid = %d \n",lock_1.l_pid);

break;

case F_WRLCK:

printf("检测到写锁 pid = %d \n",lock_1.l_pid);

break;

case F_UNLCK:

printf("检测到已解锁.pid = %d \n",lock_1.l_pid);

}

}

printf("写锁设置成功\n");

getchar();

close(fd);

return 0;

}


Copy after login

/*

Notice:

1. Lock_1 in fcntl(fd,F_GETLK,&lock_1) must be initialized, and lock_1.l_type must be set to the corresponding lock to determine whether the lock can be successful and the reason for the failure.

2. When GETLK, fcntl first detects whether there is a lock that can prevent this locking. If there is, it overwrites the information of the flock structure (lock_1). If not, set the type of lock_1.l_type to F_UNLCK.

*/

For write locks (F_WRLCK exclusive locks), only one process can enjoy an exclusive lock on any specific area of ​​the file.

For read locks (F_RDLCK shared locks), many different processes can hold shared locks on the same area on the file at the same time. In order to hold a shared lock, the file must be opened for reading or read/write. As long as any process owns a shared lock, no other process can obtain an exclusive lock.

Compile and execute separately:

3. First execute the read lock, and then execute the write lock. The results are as follows:

liu@ubuntu:~/learn/lrn_linux$ ./readlock.out 

进程pid: 16458

add read lock success!

liu@ubuntu:~/learn/lrn_linux$ ./writelock.out 

进程pid: 16459

fcntl:: Resource temporarily unavailable

检测到读锁 pid = 16458 

fcntl:: Resource temporarily unavailable

检测到读锁 pid = 16458 

fcntl:: Resource temporarily unavailable

检测到读锁 pid = 16458 

fcntl:: Resource temporarily unavailable

检测到读锁 pid = 16458 

fcntl:: Resource temporarily unavailable

检测到读锁 pid = 16458 

fcntl:: Resource temporarily unavailable

检测到读锁 pid = 16458 

fcntl:: Resource temporarily unavailable

检测到读锁 pid = 16458 

fcntl:: Resource temporarily unavailable

检测到已解锁.pid = 16459 
Copy after login

Write lock set successfully

It can be seen that when the file is occupied by a read lock, a write lock (exclusive lock) cannot be added

4. If you run the write lock first and then the read lock, the results will be as follows:

liu@ubuntu:~/learn/lrn_linux$ ./writelock.out 
Copy after login

Process pid: 16349

Write lock set successfully

liu@ubuntu:~/learn/lrn_linux$ ./readlock.out 
Copy after login

Process pid: 16350

fcntl fail : Resource temporarily unavailable
Copy after login

So, the locking is successful.

Through this article, you should have a basic understanding of the method of using fcntl() to implement read-write locks in Linux system programming, and know its principles, usage, advantages and disadvantages. You should also understand the purpose and impact of using fcntl() to implement read-write locks, and how to correctly use and configure fcntl() in Linux system programming. We recommend that you use fcntl() to achieve your goals in scenarios where you need to implement read-write locks. At the same time, we also remind you to pay attention to some potential issues and challenges when using fcntl(), such as compatibility, portability, performance, etc. I hope this article can help you better use Linux system programming and let you master the skills and advantages of fcntl() under Linux.

The above is the detailed content of A technique for Linux system programming: using fcntl() to implement read-write locks. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

deepseek web version entrance deepseek official website entrance deepseek web version entrance deepseek official website entrance Feb 19, 2025 pm 04:54 PM

DeepSeek is a powerful intelligent search and analysis tool that provides two access methods: web version and official website. The web version is convenient and efficient, and can be used without installation; the official website provides comprehensive product information, download resources and support services. Whether individuals or corporate users, they can easily obtain and analyze massive data through DeepSeek to improve work efficiency, assist decision-making and promote innovation.

How to install deepseek How to install deepseek Feb 19, 2025 pm 05:48 PM

There are many ways to install DeepSeek, including: compile from source (for experienced developers) using precompiled packages (for Windows users) using Docker containers (for most convenient, no need to worry about compatibility) No matter which method you choose, Please read the official documents carefully and prepare them fully to avoid unnecessary trouble.

Ouyi okx installation package is directly included Ouyi okx installation package is directly included Feb 21, 2025 pm 08:00 PM

Ouyi OKX, the world's leading digital asset exchange, has now launched an official installation package to provide a safe and convenient trading experience. The OKX installation package of Ouyi does not need to be accessed through a browser. It can directly install independent applications on the device, creating a stable and efficient trading platform for users. The installation process is simple and easy to understand. Users only need to download the latest version of the installation package and follow the prompts to complete the installation step by step.

BITGet official website installation (2025 beginner's guide) BITGet official website installation (2025 beginner's guide) Feb 21, 2025 pm 08:42 PM

BITGet is a cryptocurrency exchange that provides a variety of trading services including spot trading, contract trading and derivatives. Founded in 2018, the exchange is headquartered in Singapore and is committed to providing users with a safe and reliable trading platform. BITGet offers a variety of trading pairs, including BTC/USDT, ETH/USDT and XRP/USDT. Additionally, the exchange has a reputation for security and liquidity and offers a variety of features such as premium order types, leveraged trading and 24/7 customer support.

Get the gate.io installation package for free Get the gate.io installation package for free Feb 21, 2025 pm 08:21 PM

Gate.io is a popular cryptocurrency exchange that users can use by downloading its installation package and installing it on their devices. The steps to obtain the installation package are as follows: Visit the official website of Gate.io, click "Download", select the corresponding operating system (Windows, Mac or Linux), and download the installation package to your computer. It is recommended to temporarily disable antivirus software or firewall during installation to ensure smooth installation. After completion, the user needs to create a Gate.io account to start using it.

Ouyi Exchange Download Official Portal Ouyi Exchange Download Official Portal Feb 21, 2025 pm 07:51 PM

Ouyi, also known as OKX, is a world-leading cryptocurrency trading platform. The article provides a download portal for Ouyi's official installation package, which facilitates users to install Ouyi client on different devices. This installation package supports Windows, Mac, Android and iOS systems. Users can choose the corresponding version to download according to their device type. After the installation is completed, users can register or log in to the Ouyi account, start trading cryptocurrencies and enjoy other services provided by the platform.

How to automatically set permissions of unixsocket after system restart? How to automatically set permissions of unixsocket after system restart? Mar 31, 2025 pm 11:54 PM

How to automatically set the permissions of unixsocket after the system restarts. Every time the system restarts, we need to execute the following command to modify the permissions of unixsocket: sudo...

How to solve the permissions problem encountered when viewing Python version in Linux terminal? How to solve the permissions problem encountered when viewing Python version in Linux terminal? Apr 01, 2025 pm 05:09 PM

Solution to permission issues when viewing Python version in Linux terminal When you try to view Python version in Linux terminal, enter python...

See all articles