[Devel] [PATCH RH9 06/22] ve/fs/sync: Per containter sync and syncfs and fs.fsync-enable sysctl
Andrey Zhadchenko
andrey.zhadchenko at virtuozzo.com
Thu Oct 7 13:57:30 MSK 2021
From: Konstantin Khorenko <khorenko at virtuozzo.com>
"sync/fsync" called from inside a Container might have different behavior.
Affects sys_sync, sys_fsync, sys_fdatasync, sys_sync_file_range
syscalls.
aio_fsync (sys_io_submit) not affected.
syncs cannot be disabled for ve0.
All values described below (even if set on ve0) affect veX behavior only.
Possible values for the Hardware Node:
======================================
0 (FSYNC_NEVER) CT fsync and syncs are ignored
1 (FSYNC_ALWAYS) CT fsync and syncs work as usual, all inodes
for all filesystem will be synced
2 (FSYNC_FILTERED) CT fsync as usual, syncs only its file data
(only CT-relayed files and filesystems will be flushed)
Possible values inside a Container:
======================================
0 CT fsync and syncs are ignored
2 Use HN global value
any other value Same as 2 (FSYNC_FILTERED)
Default kernel value (for both HN and CT): 2 (FSYNC_FILTERED).
=====================================================
ve/fs: Port fs.fsync-enable and fs.odirect_enable sysctls
This is a part of 74-diff-ve-mix-combined.
https://jira.sw.ru/browse/PSBM-17903
Signed-off-by: Kirill Tkhai <ktkhai at parallels.com>
=====================================================
ve/fs: check container odirect and fsync settings in __dentry_open
sys_open for conventional filesystems doesn't call dentry_open,
it calls __dentry_open (in nameidata_to_filp), so we have to move
checks for odirect and fsync behaviour to __dentry_open
to make them working on ploop containers.
https://jira.sw.ru/browse/PSBM-17157
Signed-off-by: Dmitry Guryanov <dguryanov at parallels.com>
Signed-off-by: Dmitry Monakhov <dmonakhov at openvz.org>
================================================
ve: initialize fsync_enable also for non ve0 environment
Patchset description:
ve: fix initialization and remove sysctl_fsync_enable
v2:
- initialize only on ve cgroup creation, remove get_ve_features
- rename setup_iptables_mask into ve_setup_iptables_mask
https://jira.sw.ru/browse/PSBM-34286
https://jira.sw.ru/browse/PSBM-34285
Pavel Tikhomirov (4):
ve: remove sysctl_fsync_enable and use ve_fsync_behavior instead
ve: initialize fsync_enable also for non ve0 environment
ve: iptables: fix mask initialization and changing
ve: cgroup: initialize odirect_enable, features and _randomize_va_space
=====================================================================
Combined several vz7 patches into one:
d35caf1 ("ve/fs/sync: per containter sync and syncfs")
3016bac ("ve: remove sync_mutex")
4cc281e ("ve: remove sysctl_fsync_enable and use ve_fsync_behavior instead")
c3e4103 ("ve/fs: introduce "fs.fsync-enable" and "fs.odirect_enable" sysctls")
fdbb570 ("fs: Restrict ve sync methods")
VZ 8 rebase part https://jira.sw.ru/browse/PSBM-127782
Signed-off-by: Alexander Mikhalitsyn <alexander.mikhalitsyn at virtuozzo.com>
khorenko@ changes:
- "2" -> "FSYNC_FILTERED" in a couple of places
- - if (!sb_rdonly(sb) && sb->s_root && sb->s_bdi)
+ if (!sb_rdonly(sb) && sb->s_root && (sb->s_flags & SB_BORN))
+++
ve/msync: fix wrong behaviour of fs.fsync-enable
When FSYNC_NEVER is set in container (in fs.fsync-enable sysctl) syncs
should be ignored instead of failing with ENOMEM as we have now.
https://jira.sw.ru/browse/PSBM-131652
Signed-off-by: Pavel Tikhomirov <ptikhomirov at virtuozzo.com>
Acked-by: Alexander Mikhalitsyn <alexander.mikhalitsyn at virtuozzo.com>
+++
ve/sync/mounts: skip cursor mounts when iterating over mnt_ns->list
After RHEL ported "proc/mounts: add cursor" we need to iterate over
mounts list in mntns more carefully:
- Export mnt_list_next and move it out from CONFIG_PROC_FS;
- Use mnt_list_next in sync_collect_filesystems to skip cursors.
Otherwise kernel would break at dereferencing something from
uninitialized cursor mount.
https://jira.sw.ru/browse/PSBM-131158
Signed-off-by: Pavel Tikhomirov <ptikhomirov at virtuozzo.com>
+++
fs/sync: fix nullptr dereference ve->ve_ns->mnt_ns
ve_ns is not guaranteed to be non-NULL. Fix
is_sb_ve_accessible() and sync_collect_filesystems()
Also add rcu_dereference since ve->ve_ns is rcu-protected
An example of shell commands to crash kernel:
# mkdir /sys/fs/cgroup/ve/10001
# echo 10001 > /sys/fs/cgroup/ve/10001/ve.veid
# echo $$ > /sys/fs/cgroup/ve/10001/tasks
# sync
[59390.889322] BUG: unable to handle kernel NULL pointer dereference at 0000000000000018
[59390.889395] PGD 0 P4D 0
[59390.889442] Oops: 0000 [#1] SMP PTI
[59390.889492] CPU: 1 PID: 8950 Comm: sync ve: 10001 Kdump: loaded Not tainted 4.18.0-240.1.1.vz8.5.47 #1 5.47
[59390.889554] Hardware name: Virtuozzo KVM, BIOS 1.10.2-3.1.vz7.3 04/01/2014
[59390.889622] RIP: 0010:sync_filesystems_ve+0x34/0x220
[59390.889673] Code: 55 41 54 55 53 48 83 ec 20 65 48 8b 04 25 28 00 00 00 48 89 44 24 18 31 c0 48 8b 87 98 01 00 00 48 8d 6c 24 08 48 89 6c 24 08 <4c> 8b 68 18 48 8b 44 24 08 48 89 6c 24 10 48 39 c5 0f 85 ce 01 00
[59390.889798] RSP: 0018:ffffb1b7810a7ec0 EFLAGS: 00010246
[59390.889849] RAX: 0000000000000000 RBX: ffff92309ab7c418 RCX: 0000000000000000
[59390.889903] RDX: ffff92308bbff180 RSI: 0000000000000000 RDI: ffff92309ab7c418
[59390.889958] RBP: ffffb1b7810a7ec8 R08: 0000000000000000 R09: 0000000000000000
[59390.890016] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[59390.890071] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[59390.890126] FS: 00007fd7880b6540(0000) GS:ffff9230bbb00000(0000) knlGS:0000000000000000
[59390.890184] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[59390.890235] CR2: 0000000000000018 CR3: 000000010b22e000 CR4: 00000000000006e0
[59390.890293] Call Trace:
[59390.890351] ? __do_page_fault+0x23a/0x4f0
[59390.890407] ksys_sync+0x10d/0x130
[59390.890456] __ia32_sys_sync+0xa/0x10
[59390.890509] do_syscall_64+0x5b/0x1a0
[59390.890562] entry_SYSCALL_64_after_hwframe+0x65/0xca
[59390.890620] RIP: 0033:0x7fd787fe4ffb
[59390.890667] Code: c3 48 8b 0d a7 8e 0c 00 f7 d8 64 89 01 b8 ff ff ff ff eb c2 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 a2 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 75 8e 0c 00 f7 d8 64 89 01 48
[59390.890791] RSP: 002b:00007ffd853dd328 EFLAGS: 00000246 ORIG_RAX: 00000000000000a2
[59390.890848] RAX: ffffffffffffffda RBX: 00007ffd853dd468 RCX: 00007fd787fe4ffb
[59390.890903] RDX: 00007fd7880b2001 RSI: 0000000000000000 RDI: 00007fd788079b5e
[59390.890957] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000
[59390.891012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[59390.891067] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fd7880ae1b4
[59390.896038] CR2: 0000000000000018
https://jira.sw.ru/browse/PSBM-130894
Signed-off-by: Andrey Zhadchenko <andrey.zhadchenko at virtuozzo.com>
v2: move new sync_filesystems code under namespace_sem to ensure mnt_ns
won't dissapear unexpectedly
(cherry picked from vz8 commit 5a96860dcd780c5caaaaf7c95cbefc764cd7f88a)
Signed-off-by: Andrey Zhadchenko <andrey.zhadchenko at virtuozzo.com>
---
fs/fcntl.c | 2 +
fs/mount.h | 2 +
fs/namespace.c | 8 +-
fs/open.c | 3 +
fs/sync.c | 213 +++++++++++++++++++++++++++++++++++++++++++++++++++-
include/linux/fs.h | 12 +++
include/linux/ve.h | 2 +
kernel/ve/ve.c | 3 +
kernel/ve/veowner.c | 8 ++
mm/msync.c | 2 +
10 files changed, 249 insertions(+), 6 deletions(-)
diff --git a/fs/fcntl.c b/fs/fcntl.c
index 2e0c851..8af146e 100644
--- a/fs/fcntl.c
+++ b/fs/fcntl.c
@@ -68,6 +68,8 @@ static int setfl(int fd, struct file * filp, unsigned long arg)
if (!may_use_odirect())
arg &= ~O_DIRECT;
+ if (ve_fsync_behavior() == FSYNC_NEVER)
+ arg &= ~O_SYNC;
/*
* O_APPEND cannot be cleared if the file is marked as append-only
* and the file is open for write.
diff --git a/fs/mount.h b/fs/mount.h
index e19f732..7c6b724 100644
--- a/fs/mount.h
+++ b/fs/mount.h
@@ -100,6 +100,8 @@ static inline int is_mounted(struct vfsmount *mnt)
return !IS_ERR_OR_NULL(real_mount(mnt)->mnt_ns);
}
+extern struct rw_semaphore namespace_sem;
+
extern struct mount *__lookup_mnt(struct vfsmount *, struct dentry *);
extern int __legitimize_mnt(struct vfsmount *, unsigned);
diff --git a/fs/namespace.c b/fs/namespace.c
index c106149..7af19eb 100644
--- a/fs/namespace.c
+++ b/fs/namespace.c
@@ -72,7 +72,7 @@ static int __init set_mphash_entries(char *str)
static struct hlist_head *mount_hashtable __read_mostly;
static struct hlist_head *mountpoint_hashtable __read_mostly;
static struct kmem_cache *mnt_cache __read_mostly;
-static DECLARE_RWSEM(namespace_sem);
+DECLARE_RWSEM(namespace_sem);
static HLIST_HEAD(unmounted); /* protected by namespace_sem */
static LIST_HEAD(ex_mountpoints); /* protected by namespace_sem */
@@ -1300,9 +1300,8 @@ struct vfsmount *mnt_clone_internal(const struct path *path)
return &p->mnt;
}
-#ifdef CONFIG_PROC_FS
-static struct mount *mnt_list_next(struct mnt_namespace *ns,
- struct list_head *p)
+struct mount *mnt_list_next(struct mnt_namespace *ns,
+ struct list_head *p)
{
struct mount *mnt, *ret = NULL;
@@ -1319,6 +1318,7 @@ static struct mount *mnt_list_next(struct mnt_namespace *ns,
return ret;
}
+#ifdef CONFIG_PROC_FS
/* iterator; we want it to have access to namespace_sem, thus here... */
static void *m_start(struct seq_file *m, loff_t *pos)
{
diff --git a/fs/open.c b/fs/open.c
index 040df8b..65e60aa 100644
--- a/fs/open.c
+++ b/fs/open.c
@@ -785,6 +785,9 @@ static int do_dentry_open(struct file *f,
if (!may_use_odirect())
f->f_flags &= ~O_DIRECT;
+ if (ve_fsync_behavior() == FSYNC_NEVER)
+ f->f_flags &= ~O_SYNC;
+
if (unlikely(f->f_flags & O_PATH)) {
f->f_mode = FMODE_PATH | FMODE_OPENED;
f->f_op = &empty_fops;
diff --git a/fs/sync.c b/fs/sync.c
index 1373a61..1c78756 100644
--- a/fs/sync.c
+++ b/fs/sync.c
@@ -8,6 +8,7 @@
#include <linux/fs.h>
#include <linux/slab.h>
#include <linux/export.h>
+#include <linux/mount.h>
#include <linux/namei.h>
#include <linux/sched.h>
#include <linux/writeback.h>
@@ -16,7 +17,9 @@
#include <linux/pagemap.h>
#include <linux/quotaops.h>
#include <linux/backing-dev.h>
+#include <linux/ve.h>
#include "internal.h"
+#include "mount.h"
#define VALID_FLAGS (SYNC_FILE_RANGE_WAIT_BEFORE|SYNC_FILE_RANGE_WRITE| \
SYNC_FILE_RANGE_WAIT_AFTER)
@@ -96,6 +99,160 @@ static void fdatawait_one_bdev(struct block_device *bdev, void *arg)
filemap_fdatawait_keep_errors(bdev->bd_inode->i_mapping);
}
+struct sync_sb {
+ struct list_head list;
+ struct super_block *sb;
+};
+
+static void sync_release_filesystems(struct list_head *sync_list)
+{
+ struct sync_sb *ss, *tmp;
+
+ list_for_each_entry_safe(ss, tmp, sync_list, list) {
+ list_del(&ss->list);
+ put_super(ss->sb);
+ kfree(ss);
+ }
+}
+
+static int sync_filesystem_collected(struct list_head *sync_list, struct super_block *sb)
+{
+ struct sync_sb *ss;
+
+ list_for_each_entry(ss, sync_list, list)
+ if (ss->sb == sb)
+ return 1;
+ return 0;
+}
+
+static int sync_collect_filesystems(struct ve_struct *ve, struct list_head *sync_list)
+{
+ struct mount *mnt;
+ struct mnt_namespace *mnt_ns;
+ struct nsproxy *ve_ns;
+ struct sync_sb *ss;
+ int ret = 0;
+
+ BUG_ON(!list_empty(sync_list));
+
+ down_read(&namespace_sem);
+
+ rcu_read_lock();
+ ve_ns = rcu_dereference(ve->ve_ns);
+ if (!ve_ns) {
+ rcu_read_unlock();
+ up_read(&namespace_sem);
+ return 0;
+ }
+ mnt_ns = ve_ns->mnt_ns;
+ rcu_read_unlock();
+
+ mnt = mnt_list_next(mnt_ns, &mnt_ns->list);
+ while (mnt) {
+ if (sync_filesystem_collected(sync_list, mnt->mnt.mnt_sb))
+ goto next;
+
+ ss = kmalloc(sizeof(*ss), GFP_KERNEL);
+ if (ss == NULL) {
+ ret = -ENOMEM;
+ break;
+ }
+ ss->sb = mnt->mnt.mnt_sb;
+ /*
+ * We hold mount point and thus can be sure, that superblock is
+ * alive. And it means, that we can safely increase it's usage
+ * counter.
+ */
+ spin_lock(&sb_lock);
+ ss->sb->s_count++;
+ spin_unlock(&sb_lock);
+ list_add_tail(&ss->list, sync_list);
+next:
+ mnt = mnt_list_next(mnt_ns, &mnt->mnt_list);
+ }
+ up_read(&namespace_sem);
+ return ret;
+}
+
+static void sync_filesystems_ve(struct ve_struct *ve, int wait)
+{
+ struct super_block *sb;
+ LIST_HEAD(sync_list);
+ struct sync_sb *ss;
+
+ /*
+ * We don't need to care about allocating failure here. At least we
+ * don't need to skip sync on such error.
+ * Let's sync what we collected already instead.
+ */
+ sync_collect_filesystems(ve, &sync_list);
+
+ list_for_each_entry(ss, &sync_list, list) {
+ sb = ss->sb;
+ down_read(&sb->s_umount);
+ if (!sb_rdonly(sb) && sb->s_root && (sb->s_flags & SB_BORN))
+ __sync_filesystem(sb, wait);
+ up_read(&sb->s_umount);
+ }
+
+ sync_release_filesystems(&sync_list);
+}
+
+static int is_sb_ve_accessible(struct ve_struct *ve, struct super_block *sb)
+{
+ struct mount *mnt;
+ struct mnt_namespace *mnt_ns;
+ struct nsproxy *ve_ns;
+ int ret = 0;
+
+ down_read(&namespace_sem);
+
+ rcu_read_lock();
+ ve_ns = rcu_dereference(ve->ve_ns);
+ if (!ve_ns) {
+ rcu_read_unlock();
+ up_read(&namespace_sem);
+ return 0;
+ }
+ mnt_ns = ve_ns->mnt_ns;
+ rcu_read_unlock();
+
+ list_for_each_entry(mnt, &mnt_ns->list, mnt_list) {
+ if (mnt->mnt.mnt_sb == sb) {
+ ret = 1;
+ break;
+ }
+ }
+ up_read(&namespace_sem);
+ return ret;
+}
+
+static int __ve_fsync_behavior(struct ve_struct *ve)
+{
+ /*
+ * - __ve_fsync_behavior() is not called for ve0
+ * - FSYNC_FILTERED for veX does NOT mean "filtered" behavior
+ * - FSYNC_FILTERED for veX means "get value from ve0"
+ */
+ if (ve->fsync_enable == FSYNC_FILTERED)
+ return get_ve0()->fsync_enable;
+ else if (ve->fsync_enable)
+ return FSYNC_FILTERED; /* sync forced by ve is always filtered */
+ else
+ return 0;
+}
+
+int ve_fsync_behavior(void)
+{
+ struct ve_struct *ve;
+
+ ve = get_exec_env();
+ if (ve_is_super(ve))
+ return FSYNC_ALWAYS;
+ else
+ return __ve_fsync_behavior(ve);
+}
+
/*
* Sync everything. We start by waking flusher threads so that most of
* writeback runs on all devices in parallel. Then we sync all inodes reliably
@@ -108,8 +265,32 @@ static void fdatawait_one_bdev(struct block_device *bdev, void *arg)
*/
void ksys_sync(void)
{
+ struct ve_struct *ve = get_exec_env();
int nowait = 0, wait = 1;
+ if (!ve_is_super(ve)) {
+ int fsb;
+ /*
+ * init can't sync during VE stop. Rationale:
+ * - NFS with -o hard will block forever as network is down
+ * - no useful job is performed as VE0 will call umount/sync
+ * by his own later
+ * Den
+ */
+ if (is_child_reaper(task_pid(current)))
+ return;
+
+ fsb = __ve_fsync_behavior(ve);
+ if (fsb == FSYNC_NEVER)
+ return;
+
+ if (fsb == FSYNC_FILTERED) {
+ sync_filesystems_ve(ve, nowait);
+ sync_filesystems_ve(ve, wait);
+ return;
+ }
+ }
+
wakeup_flusher_threads(WB_REASON_SYNC);
iterate_supers(sync_inodes_one_sb, NULL);
iterate_supers(sync_fs_one_sb, &nowait);
@@ -162,18 +343,42 @@ void emergency_sync(void)
{
struct fd f = fdget(fd);
struct super_block *sb;
- int ret, ret2;
+ int ret = 0, ret2 = 0;
+ struct ve_struct *ve;
if (!f.file)
return -EBADF;
sb = f.file->f_path.dentry->d_sb;
+ ve = get_exec_env();
+
+ if (!ve_is_super(ve)) {
+ int fsb;
+ /*
+ * init can't sync during VE stop. Rationale:
+ * - NFS with -o hard will block forever as network is down
+ * - no useful job is performed as VE0 will call umount/sync
+ * by his own later
+ * Den
+ */
+ if (is_child_reaper(task_pid(current)))
+ goto fdput;
+
+ fsb = __ve_fsync_behavior(ve);
+ if (fsb == FSYNC_NEVER)
+ goto fdput;
+
+ if ((fsb == FSYNC_FILTERED) && !is_sb_ve_accessible(ve, sb))
+ goto fdput;
+ }
+
down_read(&sb->s_umount);
ret = sync_filesystem(sb);
up_read(&sb->s_umount);
ret2 = errseq_check_and_advance(&sb->s_wb_err, &f.file->f_sb_err);
+fdput:
fdput(f);
return ret ? ret : ret2;
}
@@ -217,9 +422,13 @@ int vfs_fsync(struct file *file, int datasync)
static int do_fsync(unsigned int fd, int datasync)
{
- struct fd f = fdget(fd);
+ struct fd f;
int ret = -EBADF;
+ if (ve_fsync_behavior() == FSYNC_NEVER)
+ return 0;
+
+ f = fdget(fd);
if (f.file) {
ret = vfs_fsync(f.file, datasync);
fdput(f);
diff --git a/include/linux/fs.h b/include/linux/fs.h
index 01419db..42021f0 100644
--- a/include/linux/fs.h
+++ b/include/linux/fs.h
@@ -71,6 +71,7 @@
struct fs_context;
struct fs_parameter_spec;
struct fileattr;
+struct mnt_namespace;
extern void __init inode_init(void);
extern void __init inode_init_early(void);
@@ -2521,6 +2522,7 @@ extern struct dentry *mount_nodev(struct file_system_type *fs_type,
void kill_litter_super(struct super_block *sb);
void deactivate_super(struct super_block *sb);
void deactivate_locked_super(struct super_block *sb);
+void put_super(struct super_block *sb);
int set_anon_super(struct super_block *s, void *data);
int set_anon_super_fc(struct super_block *s, struct fs_context *fc);
int get_anon_bdev(dev_t *);
@@ -3146,6 +3148,13 @@ static inline void i_readcount_inc(struct inode *inode)
extern char *file_path(struct file *, char *, int);
+int ve_fsync_behavior(void);
+
+#define FSYNC_NEVER 0 /* ve syncs are ignored */
+#define FSYNC_ALWAYS 1 /* ve syncs work as ususal */
+#define FSYNC_FILTERED 2 /* ve syncs only its files */
+/* For non-ve0 FSYNC_FILTERED value means "get value from ve0". */
+
#include <linux/err.h>
/* needed for stackable file system support */
@@ -3495,6 +3504,9 @@ void setattr_copy(struct user_namespace *, struct inode *inode,
extern int file_update_time(struct file *file);
+extern struct mount *mnt_list_next(struct mnt_namespace *ns,
+ struct list_head *p);
+
static inline bool vma_is_dax(const struct vm_area_struct *vma)
{
return vma->vm_file && IS_DAX(vma->vm_file->f_mapping->host);
diff --git a/include/linux/ve.h b/include/linux/ve.h
index 3d5a1dc..ad1c4710 100644
--- a/include/linux/ve.h
+++ b/include/linux/ve.h
@@ -57,6 +57,8 @@ struct ve_struct {
struct kstat_lat_pcpu_struct sched_lat_ve;
int odirect_enable;
+ int fsync_enable;
+
#if IS_ENABLED(CONFIG_BINFMT_MISC)
struct binfmt_misc *binfmt_misc;
#endif
diff --git a/kernel/ve/ve.c b/kernel/ve/ve.c
index e8616d9..fe4c4d9 100644
--- a/kernel/ve/ve.c
+++ b/kernel/ve/ve.c
@@ -56,6 +56,7 @@ struct ve_struct ve0 = {
.sched_lat_ve.cur = &ve0_lat_stats,
.netns_avail_nr = ATOMIC_INIT(INT_MAX),
.netns_max_nr = INT_MAX,
+ .fsync_enable = FSYNC_FILTERED,
._randomize_va_space =
#ifdef CONFIG_COMPAT_BRK
1,
@@ -678,6 +679,8 @@ static struct cgroup_subsys_state *ve_create(struct cgroup_subsys_state *parent_
ve->meminfo_val = VE_MEMINFO_DEFAULT;
ve->odirect_enable = 2;
+ /* for veX FSYNC_FILTERED means "get value from ve0 */
+ ve->fsync_enable = FSYNC_FILTERED;
atomic_set(&ve->netns_avail_nr, NETNS_MAX_NR_DEFAULT);
ve->netns_max_nr = NETNS_MAX_NR_DEFAULT;
diff --git a/kernel/ve/veowner.c b/kernel/ve/veowner.c
index b0aba35..e255fe5 100644
--- a/kernel/ve/veowner.c
+++ b/kernel/ve/veowner.c
@@ -7,6 +7,7 @@
*
*/
+#include <linux/ve.h>
#include <linux/init.h>
#include <linux/module.h>
#include <linux/proc_fs.h>
@@ -66,6 +67,13 @@ static void prepare_proc(void)
.extra1 = &ve_mount_nr_min,
.extra2 = &ve_mount_nr_max,
},
+ {
+ .procname = "fsync-enable",
+ .data = &ve0.fsync_enable,
+ .maxlen = sizeof(int),
+ .mode = 0644 | S_ISVTX,
+ .proc_handler = &proc_dointvec_virtual,
+ },
{ }
};
diff --git a/mm/msync.c b/mm/msync.c
index 137d1c1..20737eb 100644
--- a/mm/msync.c
+++ b/mm/msync.c
@@ -51,6 +51,8 @@
if (end < start)
goto out;
error = 0;
+ if (ve_fsync_behavior() == FSYNC_NEVER)
+ goto out;
if (end == start)
goto out;
/*
--
1.8.3.1
More information about the Devel
mailing list