Provided by: manpages-dev_6.16-1_all 

NAME
F_GETLK, F_SETLK, F_SETLKW, F_OFD_GETLK, F_OFD_SETLK, F_OFD_SETLKW - locking
LIBRARY
Standard C library (libc, -lc)
SYNOPSIS
#include <fcntl.h>
int fcntl(int fd, F_GETLK, struct flock *lock);
int fcntl(int fd, F_SETLK, const struct flock *lock);
int fcntl(int fd, F_SETLKW, const struct flock *lock);
int fcntl(int fd, F_OFD_GETLK, struct flock *lock);
int fcntl(int fd, F_OFD_SETLK, const struct flock *lock);
int fcntl(int fd, F_OFD_SETLKW, const struct flock *lock);
DESCRIPTION
Advisory record locking
Linux implements traditional ("process-associated") UNIX record locks, as standardized by POSIX. For a
Linux-specific alternative with better semantics, see the discussion of open file description locks
below.
F_SETLK, F_SETLKW, and F_GETLK are used to acquire, release, and test for the existence of record locks
(also known as byte-range, file-segment, or file-region locks). The third argument, lock, is a pointer
to a structure that has at least the following fields (in unspecified order).
struct flock {
...
short l_type; /* Type of lock: F_RDLCK,
F_WRLCK, F_UNLCK */
short l_whence; /* How to interpret l_start:
SEEK_SET, SEEK_CUR, SEEK_END */
off_t l_start; /* Starting offset for lock */
off_t l_len; /* Number of bytes to lock */
pid_t l_pid; /* PID of process blocking our lock
(set by F_GETLK and F_OFD_GETLK) */
...
};
The l_whence, l_start, and l_len fields of this structure specify the range of bytes we wish to lock.
Bytes past the end of the file may be locked, but not bytes before the start of the file.
l_start is the starting offset for the lock, and is interpreted relative to either: the start of the file
(if l_whence is SEEK_SET); the current file offset (if l_whence is SEEK_CUR); or the end of the file (if
l_whence is SEEK_END). In the final two cases, l_start can be a negative number provided the offset does
not lie before the start of the file.
l_len specifies the number of bytes to be locked. If l_len is positive, then the range to be locked
covers bytes l_start up to and including l_start+l_len-1. Specifying 0 for l_len has the special
meaning: lock all bytes starting at the location specified by l_whence and l_start through to the end of
file, no matter how large the file grows.
POSIX.1-2001 allows (but does not require) an implementation to support a negative l_len value; if l_len
is negative, the interval described by lock covers bytes l_start+l_len up to and including l_start-1.
This is supported since Linux 2.4.21 and Linux 2.5.49.
The l_type field can be used to place a read (F_RDLCK) or a write (F_WRLCK) lock on a file. Any number
of processes may hold a read lock (shared lock) on a file region, but only one process may hold a write
lock (exclusive lock). An exclusive lock excludes all other locks, both shared and exclusive. A single
process can hold only one type of lock on a file region; if a new lock is applied to an already-locked
region, then the existing lock is converted to the new lock type. (Such conversions may involve
splitting, shrinking, or coalescing with an existing lock if the byte range specified by the new lock
does not precisely coincide with the range of the existing lock.)
F_SETLK
Acquire a lock (when l_type is F_RDLCK or F_WRLCK) or release a lock (when l_type is F_UNLCK) on
the bytes specified by the l_whence, l_start, and l_len fields of lock. If a conflicting lock is
held by another process, this call returns -1 and sets errno to EACCES or EAGAIN. (The error
returned in this case differs across implementations, so POSIX requires a portable application to
check for both errors.)
F_SETLKW
As for F_SETLK, but if a conflicting lock is held on the file, then wait for that lock to be
released. If a signal is caught while waiting, then the call is interrupted and (after the signal
handler has returned) returns immediately (with return value -1 and errno set to EINTR; see
signal(7)).
F_GETLK
On input to this call, lock describes a lock we would like to place on the file. If the lock
could be placed, fcntl() does not actually place it, but returns F_UNLCK in the l_type field of
lock and leaves the other fields of the structure unchanged.
If one or more incompatible locks would prevent this lock being placed, then fcntl() returns
details about one of those locks in the l_type, l_whence, l_start, and l_len fields of lock. If
the conflicting lock is a traditional (process-associated) record lock, then the l_pid field is
set to the PID of the process holding that lock. If the conflicting lock is an open file
description lock, then l_pid is set to -1. Note that the returned information may already be out
of date by the time the caller inspects it.
In order to place a read lock, fd must be open for reading. In order to place a write lock, fd must be
open for writing. To place both types of lock, open a file read-write.
When placing locks with F_SETLKW, the kernel detects deadlocks, whereby two or more processes have their
lock requests mutually blocked by locks held by the other processes. For example, suppose process A
holds a write lock on byte 100 of a file, and process B holds a write lock on byte 200. If each process
then attempts to lock the byte already locked by the other process using F_SETLKW, then, without deadlock
detection, both processes would remain blocked indefinitely. When the kernel detects such deadlocks, it
causes one of the blocking lock requests to immediately fail with the error EDEADLK; an application that
encounters such an error should release some of its locks to allow other applications to proceed before
attempting regain the locks that it requires. Circular deadlocks involving more than two processes are
also detected. Note, however, that there are limitations to the kernel's deadlock-detection algorithm;
see BUGS.
As well as being removed by an explicit F_UNLCK, record locks are automatically released when the process
terminates.
Record locks are not inherited by a child created via fork(2), but are preserved across an execve(2).
Because of the buffering performed by the stdio(3) library, the use of record locking with routines in
that package should be avoided; use read(2) and write(2) instead.
The record locks described above are associated with the process (unlike the open file description locks
described below). This has some unfortunate consequences:
• If a process closes any file descriptor referring to a file, then all of the process's locks on that
file are released, regardless of the file descriptor(s) on which the locks were obtained. This is
bad: it means that a process can lose its locks on a file such as /etc/passwd or /etc/mtab when for
some reason a library function decides to open, read, and close the same file.
• The threads in a process share locks. In other words, a multithreaded program can't use record
locking to ensure that threads don't simultaneously access the same region of a file.
Open file description locks solve both of these problems.
Open file description locks (non-POSIX)
Open file description locks are advisory byte-range locks whose operation is in most respects identical
to the traditional record locks described above. This lock type is Linux-specific, and available since
Linux 3.15. (There is a proposal with the Austin Group to include this lock type in the next revision of
POSIX.1.) For an explanation of open file descriptions, see open(2).
The principal difference between the two lock types is that whereas traditional record locks are
associated with a process, open file description locks are associated with the open file description on
which they are acquired, much like locks acquired with flock(2). Consequently (and unlike traditional
advisory record locks), open file description locks are inherited across fork(2) (and clone(2) with
CLONE_FILES), and are only automatically released on the last close of the open file description, instead
of being released on any close of the file.
Conflicting lock combinations (i.e., a read lock and a write lock or two write locks) where one lock is
an open file description lock and the other is a traditional record lock conflict even when they are
acquired by the same process on the same file descriptor.
Open file description locks placed via the same open file description (i.e., via the same file
descriptor, or via a duplicate of the file descriptor created by fork(2), dup(2), F_DUPFD(2const), and so
on) are always compatible: if a new lock is placed on an already locked region, then the existing lock is
converted to the new lock type. (Such conversions may result in splitting, shrinking, or coalescing with
an existing lock as discussed above.)
On the other hand, open file description locks may conflict with each other when they are acquired via
different open file descriptions. Thus, the threads in a multithreaded program can use open file
description locks to synchronize access to a file region by having each thread perform its own open(2) on
the file and applying locks via the resulting file descriptor.
As with traditional advisory locks, the third argument to fcntl(), lock, is a pointer to an flock
structure. By contrast with traditional record locks, the l_pid field of that structure must be set to
zero when using the operations described below.
The operations for working with open file description locks are analogous to those used with traditional
locks:
F_OFD_SETLK
Acquire an open file description lock (when l_type is F_RDLCK or F_WRLCK) or release an open file
description lock (when l_type is F_UNLCK) on the bytes specified by the l_whence, l_start, and
l_len fields of lock. If a conflicting lock is held by another process, this call returns -1 and
sets errno to EAGAIN.
F_OFD_SETLKW
As for F_OFD_SETLK, but if a conflicting lock is held on the file, then wait for that lock to be
released. If a signal is caught while waiting, then the call is interrupted and (after the signal
handler has returned) returns immediately (with return value -1 and errno set to EINTR; see
signal(7)).
F_OFD_GETLK
On input to this call, lock describes an open file description lock we would like to place on the
file. If the lock could be placed, fcntl() does not actually place it, but returns F_UNLCK in the
l_type field of lock and leaves the other fields of the structure unchanged. If one or more
incompatible locks would prevent this lock being placed, then details about one of these locks are
returned via lock, as described above for F_GETLK.
In the current implementation, no deadlock detection is performed for open file description locks. (This
contrasts with process-associated record locks, for which the kernel does perform deadlock detection.)
Mandatory locking
Warning: the Linux implementation of mandatory locking is unreliable. See BUGS below. Because of these
bugs, and the fact that the feature is believed to be little used, since Linux 4.5, mandatory locking has
been made an optional feature, governed by a configuration option (CONFIG_MANDATORY_FILE_LOCKING). This
feature is no longer supported at all in Linux 5.15 and above.
By default, both traditional (process-associated) and open file description record locks are advisory.
Advisory locks are not enforced and are useful only between cooperating processes.
Both lock types can also be mandatory. Mandatory locks are enforced for all processes. If a process
tries to perform an incompatible access (e.g., read(2) or write(2)) on a file region that has an
incompatible mandatory lock, then the result depends upon whether the O_NONBLOCK flag is enabled for its
open file description. If the O_NONBLOCK flag is not enabled, then the system call is blocked until the
lock is removed or converted to a mode that is compatible with the access. If the O_NONBLOCK flag is
enabled, then the system call fails with the error EAGAIN.
To make use of mandatory locks, mandatory locking must be enabled both on the filesystem that contains
the file to be locked, and on the file itself. Mandatory locking is enabled on a filesystem using the
"-o mand" option to mount(8), or the MS_MANDLOCK flag for mount(2). Mandatory locking is enabled on a
file by disabling group execute permission on the file and enabling the set-group-ID permission bit (see
chmod(1) and chmod(2)).
Mandatory locking is not specified by POSIX. Some other systems also support mandatory locking, although
the details of how to enable it vary across systems.
Lost locks
When an advisory lock is obtained on a networked filesystem such as NFS it is possible that the lock
might get lost. This may happen due to administrative action on the server, or due to a network
partition (i.e., loss of network connectivity with the server) which lasts long enough for the server to
assume that the client is no longer functioning.
When the filesystem determines that a lock has been lost, future read(2) or write(2) requests may fail
with the error EIO. This error will persist until the lock is removed or the file descriptor is closed.
Since Linux 3.12, this happens at least for NFSv4 (including all minor versions).
Some versions of UNIX send a signal (SIGLOST) in this circumstance. Linux does not define this signal,
and does not provide any asynchronous notification of lost locks.
RETURN VALUE
Zero.
On error, -1 is returned, and errno is set to indicate the error.
ERRORS
See fcntl(2).
EBADF op is F_SETLK or F_SETLKW and the file descriptor open mode doesn't match with the type of lock
requested.
EDEADLK
It was detected that the specified F_SETLKW operation would cause a deadlock.
EFAULT lock is outside your accessible address space.
EINTR op is F_SETLKW or F_OFD_SETLKW and the operation was interrupted by a signal; see signal(7).
EINTR op is F_GETLK, F_SETLK, F_OFD_GETLK, or F_OFD_SETLK, and the operation was interrupted by a signal
before the lock was checked or acquired. Most likely when locking a remote file (e.g., locking
over NFS), but can sometimes happen locally.
EINVAL op is F_OFD_SETLK, F_OFD_SETLKW, or F_OFD_GETLK, and l_pid was not specified as zero.
ENOLCK Too many segment locks open, lock table is full, or a remote locking protocol failed (e.g.,
locking over NFS).
STANDARDS
POSIX.1-2024.
HISTORY
F_GETLK
F_SETLK
F_SETLKW
SVr4, 4.3BSD, POSIX.1-2001.
F_OFD_SETLK
F_OFD_SETLKW
F_OFD_GETLK
POSIX.1-2024.
NOTES
File locking
The original Linux fcntl() system call was not designed to handle large file offsets (in the flock
structure). Consequently, an fcntl64() system call was added in Linux 2.4. The newer system call
employs a different structure for file locking, flock64, and corresponding operations, F_GETLK64,
F_SETLK64, and F_SETLKW64. However, these details can be ignored by applications using glibc, whose
fcntl() wrapper function transparently employs the more recent system call where it is available.
Record locks
Since Linux 2.0, there is no interaction between the types of lock placed by flock(2) and fcntl().
Several systems have more fields in struct flock such as, for example, l_sysid (to identify the machine
where the lock is held). Clearly, l_pid alone is not going to be very useful if the process holding the
lock may live on a different machine; on Linux, while present on some architectures (such as MIPS32),
this field is not used.
The original Linux fcntl() system call was not designed to handle large file offsets (in the flock
structure). Consequently, an fcntl64() system call was added in Linux 2.4. The newer system call
employs a different structure for file locking, flock64, and corresponding operations, F_GETLK64,
F_SETLK64, and F_SETLKW64. However, these details can be ignored by applications using glibc, whose
fcntl() wrapper function transparently employs the more recent system call where it is available.
Record locking and NFS
Before Linux 3.12, if an NFSv4 client loses contact with the server for a period of time (defined as more
than 90 seconds with no communication), it might lose and regain a lock without ever being aware of the
fact. (The period of time after which contact is assumed lost is known as the NFSv4 leasetime. On a
Linux NFS server, this can be determined by looking at /proc/fs/nfsd/nfsv4leasetime, which expresses the
period in seconds. The default value for this file is 90.) This scenario potentially risks data
corruption, since another process might acquire a lock in the intervening period and perform file I/O.
Since Linux 3.12, if an NFSv4 client loses contact with the server, any I/O to the file by a process
which "thinks" it holds a lock will fail until that process closes and reopens the file. A kernel
parameter, nfs.recover_lost_locks, can be set to 1 to obtain the pre-3.12 behavior, whereby the client
will attempt to recover lost locks when contact is reestablished with the server. Because of the
attendant risk of data corruption, this parameter defaults to 0 (disabled).
BUGS
Deadlock detection
The deadlock-detection algorithm employed by the kernel when dealing with F_SETLKW requests can yield
both false negatives (failures to detect deadlocks, leaving a set of deadlocked processes blocked
indefinitely) and false positives (EDEADLK errors when there is no deadlock). For example, the kernel
limits the lock depth of its dependency search to 10 steps, meaning that circular deadlock chains that
exceed that size will not be detected. In addition, the kernel may falsely indicate a deadlock when two
or more processes created using the clone(2) CLONE_FILES flag place locks that appear (to the kernel) to
conflict.
Mandatory locking
The Linux implementation of mandatory locking is subject to race conditions which render it unreliable: a
write(2) call that overlaps with a lock may modify data after the mandatory lock is acquired; a read(2)
call that overlaps with a lock may detect changes to data that were made only after a write lock was
acquired. Similar races exist between mandatory locks and mmap(2). It is therefore inadvisable to rely
on mandatory locking.
SEE ALSO
fcntl(2), flock(2), lockf(3), lslocks(8)
locks.txt, mandatory-locking.txt, and dnotify.txt in the Linux kernel source directory
Documentation/filesystems/ (on older kernels, these files are directly under the Documentation/
directory, and mandatory-locking.txt is called mandatory.txt)
Linux man-pages 6.16 2025-10-29 fcntl_locking(2)