Concurrent read / write of serial port

Posted on 2006-07-14
Last Modified: 2010-04-21
I have a serial port access class which wraps the termios API. This serial port in some situations is used in a multithreaded environment. In this case it will be shared by 2 threads but I can guarantee that 1 will perform output only, and the other will perform input only. Does this require a mutex to access the object?

I can't find any documentation on the thread-safety of read(2) and write(2), or termios(3). I guess it really depends on the implementation, but given that read, write and the termios API are POSIX-compliant, does anyone know if POSIX specifies the thread-safety of these functions?

Question by:boycy
  • 2
  • 2

Expert Comment

ID: 17106913
> does anyone know if POSIX specifies the thread-safety of these functions?

No the POSIX does not say anything about thread safety of those functions. This means that thread safety is not guranteed and one should assume that they are not thread safe.

> Does this require a mutex to access the object?
At the hardware level, Serial ports have seperate pins for data transmission and reception.
So, you may not need to protect read from writes.

Manish Regmi

Author Comment

ID: 17106951
Granted the hardware level is fine for concurrent read/write - after all, it is full duplex. I would *assume* that providing an API which removes this full duplex ability would be a really silly idea; however assumptions are not good things. If there is any doubt at all as to whether these functions are thread-safe then I cannot use them. I'm having real trouble finding any information on this subject.

Accepted Solution

manish_regmi earned 125 total points
ID: 17106982
A discussion on red hat forum also suggests it is safe.
So under Linux it may be safe but may not be for other OS.

Also since POSIX does not confirm thread safety. You can protect them with mutex for safety.

Manish Regmi

Author Comment

ID: 17107000
Manish, thanks :)

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Chinese translation in RedHat 10 46
A "Helper" for python 2 87
whats a headless user in linux 3 192
Linux : when to add the entries in /etc/hosts file 22 94
The purpose of this article is to fix the unknown display problem in Linux Mint operating system. After installing the OS if you see Display monitor is not recognized then we can install "MESA" utilities to fix this problem or we can install additio…
The purpose of this article is to demonstrate how we can upgrade Python from version 2.7.6 to Python 2.7.10 on the Linux Mint operating system. I am using an Oracle Virtual Box where I have installed Linux Mint operating system version 17.2. Once yo…
Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
Concerto provides fully managed cloud services and the expertise to provide an easy and reliable route to the cloud. Our best-in-class solutions help you address the toughest IT challenges, find new efficiencies and deliver the best application expe…

939 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

4 Experts available now in Live!

Get 1:1 Help Now