From: Christoph Hellwig <hch@infradead.org>
To: Allison Henderson <achender@linux.vnet.ibm.com>
Cc: linux-kernel@vger.kernel.org,
Ext4 Developers List <linux-ext4@vger.kernel.org>,
Andreas Dilger <adilger@dilger.ca>
Subject: Re: lock i_mutex for fallocate?
Date: Thu, 1 Sep 2011 03:31:46 -0400 [thread overview]
Message-ID: <20110901073146.GA17100@infradead.org> (raw)
In-Reply-To: <4E5ED2D5.8040302@linux.vnet.ibm.com>
On Wed, Aug 31, 2011 at 05:33:25PM -0700, Allison Henderson wrote:
> Hi All,
>
> In ext4 punch hole, we realized that the punch hole operation needs
> to be done under i_mutex just like truncate. i_mutex for truncate
> is held in the vfs layer, so we dont need to lock it at the file
> system layer, but vfs does not lock i_mutex for fallocate. We can
> lock i_mutex for fallocate at the fs layer, but question was raised
> then: should i_mutex for fallocate be held in the vfs layer instead?
> I do not know if other file systems need i_mutex to be locked for
> fallocate, or if they might be locking it already, so I am doing
> some investigating on this idea, and also the appropriate use of
> i_mutex in general. Can someone provide some insight this topic?
Don't do it.
i_mutex is already overloaded, and this does not fit into any
of the somewhat reasonable uses cases for it, which are:
a) for directories the VFS uses it to protect the tree topology
b) for regular files all generic I/O code currently uses it to
serialize writers.
c) the VFS uses it around truncate, and setxattr updates
d) filesystems abuse it for internal metadata in various places
As you can see right now we do not hold it over any file operation,
and I'm absolutely against adding that. I'd rather untange the
current uses, specificly:
- push synchronization of setattr into the filesystems
- push synchronization of xattr write operations into the filesystems
- move the read/write synchronization to a separate shared/exclusive
lock like it's already done in XFS, and like Lukas proposed for
ext4. This fixes the Posix compliance corner cases about reads
beeing atomic vs writes, simplifies direct I/O locking a lot,
and allows for more parallel direct I/O support like XFS supports.
- try to get rid of the abuses inside filesystems as much as possible.
next prev parent reply other threads:[~2011-09-01 7:31 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2011-09-01 0:33 lock i_mutex for fallocate? Allison Henderson
2011-09-01 1:10 ` Yongqiang Yang
2011-09-01 1:12 ` Allison Henderson
2011-09-01 17:59 ` Josef Bacik
2011-09-01 7:08 ` Dave Chinner
2011-09-01 7:31 ` Christoph Hellwig [this message]
2011-09-01 17:47 ` Allison Henderson
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20110901073146.GA17100@infradead.org \
--to=hch@infradead.org \
--cc=achender@linux.vnet.ibm.com \
--cc=adilger@dilger.ca \
--cc=linux-ext4@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).