From Wikipedia, the free encyclopedia
<!-- start content -->
File locking is a mechanism that restricts access to a computer file by only allowing one user or process access at any specific time. The purpose of locking is to prevent the classic interceding update scenario (see race condition).
The interceding update problem may be illustrated as in the following example:
-
Process A reads a customer record from a file containing account information, including the customer's account balance and phone number.
- Process B now reads the same record from the same file so it has its own copy.
- Process A changes the account balance in its copy of the customer record and writes the record back to the file.
- Process B--which still has the original stale value for the account balance in its copy of the customer record--updates the customer's phone number and writes the customer record back to the file.
- Process B has now written its stale account balance value to the file, causing the changes made by process A to be lost.
File locking prevents this problem by enforcing the serialization of update processes to any given file. Most operating systems support the concept of record locking which means that individual records within any given file may be locked, so increasing the number of concurrent update processes.
One use of file locking is in database maintenance where it can serialize access to the entire physical file underlying a database. While this prevents any other process from accessing the file it can actually be more efficient than individually locking a large number of regions in the file by removing the overhead of achieving and releasing each lock.
Poor use of file locks, like any computer lock, can result in poor performance or deadlock.
<script type="text/javascript"></script>
[edit] File locking in Microsoft Windows
Shared file access in Windows is managed by three distinct mechanisms:
- Using share access controls that allow applications to specify whole-file access sharing for read, write or delete;
- Using byte range locks to arbitrate read and write access to regions within a single file; and
- By Windows file systems disallowing executing files from being opened for write or delete access.
The semantics of share access controls in Windows are inherited from the original MS-DOS system (where sharing was introduced in MS-DOS 3.3) Thus, an application must explicitly allow sharing - otherwise an application has exclusive read, write and delete access to the file (other types of access, such as those to retrieve the attributes of a file are allowed.)
For a file with shared access, applications may then use byte range locking to control access to specific regions of the file. Such byte range locks specify a region of the file (offset and length) and the type of lock (shared or exclusive). Note that the region of the file being locked is not required to have data within the file and applications sometimes exploit this ability to implement their functionality.
For applications that use the file read/write APIs in Windows, byte range locks are enforced (also referred to as mandatory locks) by the file systems that execute within Windows. For applications that use the file mapping APIs in Windows, byte range locks are not enforced (also referred to as advisory locks.) Byte range locking may also have other side-effects on the Windows system. For example, the Windows file sharing mechanism will typically disable client side caching of a file for all clients when byte range locks are used on any client to control access of the file. The client will observe slower access to the file because all read and write operations must be sent to the file server where the file is stored.
Improper error handling in an application program can lead to a situation where a file is locked (either using share access or with byte range file locking) and cannot be accessed by other applications. In this case the user may be able to restore access to the file by terminating the malfunctioning program manually. This is typically done through the Task Manager utility.
File sharing is determined by the sharing mode parameter in the CreateFile function used to open files. Files can be opened to allow sharing the file for read, write or delete access. Subsequent attempts to open the file must be compatible with all previously granted sharing access to the file. When the file is closed, the sharing access restrictions are adjusted to remove the restrictions imposed by that specific file open.
Byte range locking type is determined by the dwFlags parameter in the LockFileEx function used to lock a region of a file. The Windows API function LockFile can also be used and acquires an exclusive lock on the region of the file.
Any file that is executing on the computer system as a program (e.g., an EXE, COM, DLL, CPL or other binary program file format) is normally prevented by the file system from being opened for write or delete access, reporting a sharing violation, despite the fact that the program is not opened by any application. However, some access is still allowed. For example, a running application file can be renamed or copied (read) even when executing.
Files are accessed by applications in Windows by using file handles. These file handles can be explored with the Process Explorer utility. This utility can also be used to force-close handles without needing to terminate the application holding them.
Microsoft Windows XP and Server 2003 editions have introduced volume snapshot capability to NTFS, allowing open files to be accessed by backup software despite any exclusive locks. However, unless software is rewritten to specifically support this feature, the snapshot will be crash consistent only, while properly supported applications can assist the operating system in creating "transactionally consistent" snapshots. Other windows commercial software for accessing locked files include File Access Manager, and Open File Manager. It operates by installing its own drivers to access the files in kernel mode.
[edit] File locking in UNIX
Open files and programs are not automatically locked in UNIX. There are different kinds of file locking mechanisms available in different flavours of UNIX and many operating systems support more than one kind for compatibility. The two most common mechanisms are fcntl(2)
and flock(2)
. Although some types of locks can be configured to be mandatory, file locks under UNIX are by default advisory. This means that cooperating processes may use locks to coordinate access to a file between themselves, but programs are also free to ignore locks and access the file in any way they choose to.
Two kinds of locks are offered: shared locks and exclusive locks. In the case of fcntl, different kinds of locks may be applied to different sections (byte ranges) of a file, or else to the whole file. Shared locks can be acquired by an unlimited number of processes at the same time, but an exclusive lock can only be acquired by one process, and cannot coexist with a shared lock. To acquire a shared lock, a process must wait until there are no processes holding any exclusive locks. To acquire an exclusive lock, a process must wait until there are no processes holding either kind of lock.
Shared locks are sometimes called "read locks" and exclusive locks are sometimes called "write locks". However, because locks on UNIX are advisory, this isn't enforced. Thus it is possible for a database to have a concept of "shared writes" vs. "exclusive writes"; for example, changing a field in place may be permitted under shared access, whereas garbage-collecting and rewriting the database may require exclusive access.
File locks are based on inode instead of file name, since UNIX allows multiple names to refer to the same file. This combination of inode usage and non-mandatory locking leads to great flexibility in accessing files from multiple or many processes. On the other hand, the cooperative locking approach can lead to problems when a process writes to a file without obeying file locks set by other processes. For this reason, some UNIX and UNIX-like operating systems support mandatory locking as well.
[edit] Problems
Both flock and fcntl have quirks which occasionally puzzle programmers from other operating systems.
Mandatory locks have no effect on the unlink function. As a result, certain programs may, effectively, circumvent mandatory locking. The authors of Advanced Programming in the UNIX Environment(Second Edition) observed that the ed editor did so (page 456).
Whether flock locks work on network filesystems, such as NFS, is implementation-dependent. On BSD systems flock calls are successful no-ops. On Linux prior to 2.6.12 flock calls on NFS files would only act locally. Kernel 2.6.12 and above implement flock calls on NFS files using POSIX byte range locks. These locks will be visible to other NFS clients that implement fcntl()/POSIX locks.[1]
Lock upgrades and downgrades release the old lock before applying the new lock. If an application downgrades an exclusive lock to a shared lock while another application is blocked waiting for an exclusive lock, the latter application will get the exclusive lock and the first application will be locked out.
All fcntl locks associated with a file for a given process are removed when any file descriptor for that file is closed by that process, even if a lock was never requested for that file descriptor. Also, fcntl locks are not inherited by a child process. The fcntl close semantics are particularly troublesome for applications which call subroutine libraries that may access files.
Linux 2.4 and later added notification of external changes to files with dnotify mechanism (through the F_NOTIFY parameter in fcntl). This mechanism is replaced by the superior inotify, which was introduced in Linux 2.6.13. Linux also supports mandatory locking through the special "mount(8)
-o mand" parameter for filesystem mounting, but this is rarely used.
[edit] Lock files
A system similar to the use of file locking is often used by shell scripts and other programs: creation of lock files, which are files whose contents are irrelevant (although often one will find the Process identifier of the holder of the lock in the file) and whose only purpose is to signal by their presence that some resource is locked. A lock file is often the best approach if the resource to be controlled is not a regular file at all, so using methods for locking files does not apply.
When using lock files, care must be taken to ensure that operations are atomic. In order to obtain a lock, the process must verify that the lock file does not exist and then create it, whilst preventing another process from creating it in the meantime. Various methods are used to achieve this, such as taking advantage of a system call for this purpose (such system calls are usually unavailable to shell scripts) or by creating the lock file under a temporary name and then attempting to move it into place.
Certain Mozilla products (such as Firefox, Thunderbird, Sunbird) use this type of file resource lock mechanism (using a temporary file named "parent.lock".)
[edit] Unlocker software
An unlocker is a utility used to determine what file a process is using if a user tried to delete it, and displays a list of processes as well as choices on what to do with the process (kill task, unlock, etc.) along with a drop-down list for file functions (delete, rename, move).
[edit] References
-
^ "Linux NFS FAQ: D. Commonly occurring error messages". http://nfs.sourceforge.net/.
<!--
NewPP limit report
Preprocessor node count: 593/1000000
Post-expand include size: 2887/2048000 bytes
Template argument size: 958/2048000 bytes
Expensive parser function count: 0/500
--><!-- Saved in parser cache with key enwiki:pcache:idhash:1415812-0!1!0!default!!en!2 and timestamp 20090416233808 -->
相关推荐
使用VS2019开发,Qt 界面程序。详细演示了锁对多线程访问资源时的影响,文件锁,消费生产锁模型,对学习线程同步和 Qt GUI 编程开发具有指导意义。如有不懂可私信博主,支持自定义更新。
linux文件锁flock
很好用的文件锁
linux文件锁的使用linux文件锁的使用
锁文件,可设置不同用户使用不同的权限,锁文件,可设置不同用户使用不同的权限
非常简单的DOS文件锁,这个软件的制作是用易语言开发的,简单上手,先打开文件锁,再拖动到文件锁的画面,之后显示要你输入密码两次之后就成功加密了,此时那被加密的文件是打不开的,你想打开的时候再把它拖动到...
文件锁1222222222222222222222
这是一个文件锁,用于所住自己的隐私文件,我自己用易语言编程编的,还不错哈,有问题找我哦!
7z文件枷锁器dll 适合7z文件枷锁器dll 7z文件枷锁器dll
解决无法删除文件问题, 删除文件解锁工具 解决无法删除文件问题, 删除文件解锁工具
:Java新IO】_文件锁笔记032003
在linux下实现守护进程并加上排它锁(文件锁),避免重复启动进程
免费文件锁。。。绝对安全。谁用谁知道啊!!! ( ⊙ o ⊙ )啊!
上锁的流程图,利用文件锁和redis,redis存储信息解锁。请结合帖子一起看。帖子是《基于文件锁和redis的方案》
强力文件解锁删除工具,如果你的电脑中有文件无法删除,提示文件被占用,你可以使用这个工具解锁需要删除的文件,然后再进行删除,非常方便.
特别好用的加密文件锁;这是一个功能强大的文件;不要后悔
操作系统文件锁,经典读者作者C程序实现。自己上操作系统课程时候写的。完全原创。当然借鉴了一些前人经验。
文件锁功能实现
免费版文件锁,为你的文档加水印。需要使用时再解水印,可以单独存在U盘中,运行会被报危险程序,无毒放心使用。