Lines Matching full:locking
2 Directory Locking
6 Locking scheme used for directory operations is based on two
16 1) read access. Locking rules: caller locks directory we are accessing.
19 2) object creation. Locking rules: same as above, but the lock is taken
22 3) object removal. Locking rules: caller locks parent, finds victim,
25 4) rename() that is _not_ cross-directory. Locking rules: caller locks the
30 NB: we might get away with locking the source (and target in exchange
33 5) link creation. Locking rules:
42 6) cross-directory rename. The trickiest in the whole bunch. Locking
59 All ->i_rwsem are taken exclusive. Again, we might get away with locking
122 But locking rules for cross-directory rename guarantee that we do not
138 While this locking scheme works for arbitrary DAGs, it relies on